Rethinking IT Security: What Needs to Be Said — How Can We Solve the IT Security Problem Long Term?
Written by Svavar Ingi Hermannsson
Narrated by Svavar Ingi Hermannsson
()
About this audiobook
This audiobook tries to provide provocative new ways of looking at IT security and how we can realistically solve the lack of IT security long term.
It is frequently said that people have a problem seeing the trees from the forest, but this audiobook inverts the saying and implies that it seems to be hard for people to see the forest from the trees. Implying, that people have been looking for solutions addressing IT security within their own companies or environments, instead of thinking of ways to address and solve it on a large scale.
Related to Rethinking IT Security
Related audiobooks
A Leader's Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Rating: 0 out of 5 stars0 ratingsThe Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Rating: 5 out of 5 stars5/5How to Measure Anything in Cybersecurity Risk, 2nd Edition Rating: 0 out of 5 stars0 ratingsStart-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit Rating: 0 out of 5 stars0 ratingsZero Trust and Third-Party Risk: Reduce the Blast Radius Rating: 0 out of 5 stars0 ratingsThe CISO Evolution: Business Knowledge for Cybersecurity Executives Rating: 5 out of 5 stars5/58 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 4 out of 5 stars4/5Business Continuity Management: Building an Effective Incident Management Plan Rating: 5 out of 5 stars5/5Malware Analysis: Digital Forensics, Cybersecurity, And Incident Response Rating: 0 out of 5 stars0 ratingsNIST Cloud Security: Cyber Threats, Policies, And Best Practices Rating: 0 out of 5 stars0 ratingsCybersecurity Fundamentals: How to Establish Effective Security Management Functions Rating: 5 out of 5 stars5/5NIST Cybersecurity Framework: A pocket guide Rating: 0 out of 5 stars0 ratingsSolving the Technology Challenge for IT Managers: Technologies that IT Managers Can Use in Order to Make Their Teams More Productive Rating: 0 out of 5 stars0 ratingsYou CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Rating: 0 out of 5 stars0 ratingsAlice and Bob Learn Application Security Rating: 5 out of 5 stars5/5ISO 27001 Controls – A guide to implementing and auditing Rating: 0 out of 5 stars0 ratingsCertified Information Security Manager CISM Study Guide Rating: 0 out of 5 stars0 ratingsCyber Security: Essential principles to secure your organisation Rating: 5 out of 5 stars5/5Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career Rating: 0 out of 5 stars0 ratingsCreating Business Agility: How Convergence of Cloud, Social, Mobile, Video, and Big Data Enables Competitive Advantage Rating: 0 out of 5 stars0 ratingsHackable: How to Do Application Security Right Rating: 0 out of 5 stars0 ratingsHow Cyber Security Can Protect Your Business: A guide for all stakeholders Rating: 0 out of 5 stars0 ratingsCybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5The DevSecOps Playbook: Deliver Continuous Security at Speed Rating: 0 out of 5 stars0 ratingsSecurity Awareness For Dummies Rating: 5 out of 5 stars5/5Ethical Hacking Rating: 0 out of 5 stars0 ratings
Information Technology For You
Fiber: The Coming Tech Revolution—and Why America Might Miss It Rating: 4 out of 5 stars4/5Fundamentals of Software Architecture: An Engineering Approach Rating: 4 out of 5 stars4/5Software Engineering at Google: Lessons Learned from Programming Over Time Rating: 4 out of 5 stars4/5Risk Management: Concepts and Guidance, Fifth Edition Rating: 4 out of 5 stars4/5Clean Code: A Handbook of Agile Software Craftsmanship Rating: 5 out of 5 stars5/5The Impact of New Technologies on Society: A Blueprint for the Future Rating: 5 out of 5 stars5/5Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems Rating: 5 out of 5 stars5/5An Introduction to Information Theory: Symbols, Signals and Noise Rating: 4 out of 5 stars4/5AI and Machine Learning for Coders: A Programmer's Guide to Artificial Intelligence Rating: 4 out of 5 stars4/5The Clean Coder: A Code of Conduct for Professional Programmers Rating: 5 out of 5 stars5/5Forensic Data Collections 2.0: The Guide for Defensible & Efficient Processes Rating: 0 out of 5 stars0 ratingsStick and Rudder: An Explanation of the Art of Flying Rating: 5 out of 5 stars5/5Clean Architecture: A Craftsman's Guide to Software Structure and Design Rating: 5 out of 5 stars5/5Trafficking Data: How China is Winning the Battle for Digital Sovereignty Rating: 5 out of 5 stars5/5Clean Agile: Back to Basics Rating: 4 out of 5 stars4/5Cybersecurity: The Hacker Proof Guide to Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks Rating: 4 out of 5 stars4/5Info We Trust: How to Inspire the World with Data Rating: 4 out of 5 stars4/5The Adventures of an IT Leader (Updated Edition) Rating: 5 out of 5 stars5/5What Are The Benefits Of ChatGPT Powered By The New Gpt-4 Technology Version 2: ChatGPT: The Next Generation of AI-Powered Chatbots Rating: 0 out of 5 stars0 ratingsInformation Architecture: For the Web and Beyond Rating: 4 out of 5 stars4/5The Autonomous Revolution: Reclaiming the Future We’ve Sold to Machines Rating: 0 out of 5 stars0 ratingsSmall Wars, Big Data: The Information Revolution in Modern Conflict Rating: 3 out of 5 stars3/5Coders at Work: Reflections on the Craft of Programming Rating: 4 out of 5 stars4/5A Mind at Play: How Claude Shannon Invented the Information Age Rating: 4 out of 5 stars4/5The Master Algorithm: How the Quest for the Ultimate Learning Machine Will Remake Our World Rating: 5 out of 5 stars5/5Failure Is Not an Option: Mission Control from Mercury to Apollo 13 and Beyond Rating: 5 out of 5 stars5/5Package, Price, Profit: The Essential Guide to Packaging and Pricing Your MSP Plans Rating: 5 out of 5 stars5/5Our Data, Ourselves: A Personal Guide to Digital Privacy, First Edition Rating: 0 out of 5 stars0 ratings
Reviews for Rethinking IT Security
0 ratings0 reviews