Rethinking IT Security: What Needs to Be Said — How Can We Solve the IT Security Problem Long Term?
Written by Svavar Ingi Hermannsson
Narrated by Svavar Ingi Hermannsson
()
About this audiobook
This audiobook tries to provide provocative new ways of looking at IT security and how we can realistically solve the lack of IT security long term.
It is frequently said that people have a problem seeing the trees from the forest, but this audiobook inverts the saying and implies that it seems to be hard for people to see the forest from the trees. Implying, that people have been looking for solutions addressing IT security within their own companies or environments, instead of thinking of ways to address and solve it on a large scale.
Related to Rethinking IT Security
Related audiobooks
A Leader's Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Rating: 0 out of 5 stars0 ratingsISO 27001 Controls – A guide to implementing and auditing Rating: 0 out of 5 stars0 ratingsZero Trust and Third-Party Risk: Reduce the Blast Radius Rating: 0 out of 5 stars0 ratingsStart-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit Rating: 0 out of 5 stars0 ratings8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 4 out of 5 stars4/5How to Measure Anything in Cybersecurity Risk, 2nd Edition Rating: 0 out of 5 stars0 ratingsThe CISO Evolution: Business Knowledge for Cybersecurity Executives Rating: 5 out of 5 stars5/5NIST Cloud Security: Cyber Threats, Policies, And Best Practices Rating: 5 out of 5 stars5/5Malware Analysis: Digital Forensics, Cybersecurity, And Incident Response Rating: 0 out of 5 stars0 ratingsHow Cyber Security Can Protect Your Business: A guide for all stakeholders Rating: 0 out of 5 stars0 ratingsAlice and Bob Learn Application Security Rating: 5 out of 5 stars5/5NIST Cybersecurity Framework: A pocket guide Rating: 0 out of 5 stars0 ratingsThe Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Rating: 5 out of 5 stars5/5Building a Cyber Risk Management Program: Evolving Security for the Digital Age Rating: 0 out of 5 stars0 ratingsThe Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks Rating: 0 out of 5 stars0 ratingsSolving the Technology Challenge for IT Managers: Technologies that IT Managers Can Use in Order to Make Their Teams More Productive Rating: 0 out of 5 stars0 ratingsCybersecurity Fundamentals: How to Establish Effective Security Management Functions Rating: 5 out of 5 stars5/5Creating Business Agility: How Convergence of Cloud, Social, Mobile, Video, and Big Data Enables Competitive Advantage Rating: 0 out of 5 stars0 ratingsCyber Security: Essential principles to secure your organisation Rating: 5 out of 5 stars5/5Business Continuity Management: Building an Effective Incident Management Plan Rating: 5 out of 5 stars5/5You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Rating: 0 out of 5 stars0 ratingsHackable: How to Do Application Security Right Rating: 0 out of 5 stars0 ratingsDigital Trailblazer: Essential Lessons to Jumpstart Transformation and Accelerate Your Technology Leadership Rating: 5 out of 5 stars5/5Ethical Hacking Rating: 0 out of 5 stars0 ratingsDigital Resilience: Is Your Company Ready for the Next Cyber Threat? Rating: 4 out of 5 stars4/5Proactive Risk Management: Controlling Uncertainty in Product Development Rating: 3 out of 5 stars3/5
Information Technology For You
Alone Together: Why We Expect More from Technology and Less from Each Other Rating: 4 out of 5 stars4/5Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems Rating: 5 out of 5 stars5/5Coders at Work: Reflections on the Craft of Programming Rating: 4 out of 5 stars4/5An Introduction to Information Theory: Symbols, Signals and Noise Rating: 4 out of 5 stars4/5Clean Architecture: A Craftsman's Guide to Software Structure and Design Rating: 5 out of 5 stars5/5Failure Is Not an Option: Mission Control from Mercury to Apollo 13 and Beyond Rating: 5 out of 5 stars5/5Getting Started With ChatGPT Rating: 4 out of 5 stars4/5The Master Algorithm: How the Quest for the Ultimate Learning Machine Will Remake Our World Rating: 5 out of 5 stars5/5Stick and Rudder: An Explanation of the Art of Flying Rating: 5 out of 5 stars5/5A Mind at Play: How Claude Shannon Invented the Information Age Rating: 4 out of 5 stars4/5Clean Code: A Handbook of Agile Software Craftsmanship Rating: 5 out of 5 stars5/5Hackers & Painters: Big Ideas from the Computer Age Rating: 4 out of 5 stars4/5ChatGPT BIBLE: The Untold Potential of Conversational AI: Secrets Revealed for Unlocking Hidden Opportunities to Make Money Online Rating: 0 out of 5 stars0 ratingsSoftware Engineering at Google: Lessons Learned from Programming Over Time Rating: 4 out of 5 stars4/5Fundamentals of Software Architecture: An Engineering Approach Rating: 4 out of 5 stars4/5Clean Agile: Back to Basics Rating: 4 out of 5 stars4/5Package, Price, Profit: The Essential Guide to Packaging and Pricing Your MSP Plans Rating: 5 out of 5 stars5/5Information Technology Law: The Law and Society 4th Edition Rating: 0 out of 5 stars0 ratingsDark Data: Why What You Don’t Know Matters Rating: 5 out of 5 stars5/5Risk Management: Concepts and Guidance, Fifth Edition Rating: 4 out of 5 stars4/5AI and Machine Learning for Coders: A Programmer's Guide to Artificial Intelligence Rating: 4 out of 5 stars4/5The Clean Coder: A Code of Conduct for Professional Programmers Rating: 5 out of 5 stars5/5Site Reliability Engineering: How Google Runs Production Systems Rating: 5 out of 5 stars5/5Relationship Equity: Your Cornerstone Investment to Great Gains in Business and Life Rating: 0 out of 5 stars0 ratingsHBR's 10 Must Reads on Leading Digital Transformation Rating: 4 out of 5 stars4/5Trafficking Data: How China is Winning the Battle for Digital Sovereignty Rating: 5 out of 5 stars5/5Information Architecture: For the Web and Beyond Rating: 4 out of 5 stars4/5Forensic Data Collections 2.0: The Guide for Defensible & Efficient Processes Rating: 0 out of 5 stars0 ratingsInfo We Trust: How to Inspire the World with Data Rating: 4 out of 5 stars4/5
Reviews for Rethinking IT Security
0 ratings0 reviews