Rethinking IT Security: What Needs to Be Said — How Can We Solve the IT Security Problem Long Term?
Written by Svavar Ingi Hermannsson
Narrated by Svavar Ingi Hermannsson
()
About this audiobook
This audiobook tries to provide provocative new ways of looking at IT security and how we can realistically solve the lack of IT security long term.
It is frequently said that people have a problem seeing the trees from the forest, but this audiobook inverts the saying and implies that it seems to be hard for people to see the forest from the trees. Implying, that people have been looking for solutions addressing IT security within their own companies or environments, instead of thinking of ways to address and solve it on a large scale.
Related to Rethinking IT Security
Related audiobooks
A Leader's Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Rating: 0 out of 5 stars0 ratingsNIST Cloud Security: Cyber Threats, Policies, And Best Practices Rating: 5 out of 5 stars5/5CISSP: Tips and Tricks to Learn and Study about Information Systems Security from A-Z Rating: 4 out of 5 stars4/58 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 4 out of 5 stars4/5The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Rating: 5 out of 5 stars5/5Solving the Technology Challenge for IT Managers: Technologies that IT Managers Can Use in Order to Make Their Teams More Productive Rating: 0 out of 5 stars0 ratingsStart-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit Rating: 0 out of 5 stars0 ratingsThe Service Desk Handbook – A guide to service desk implementation, management and support Rating: 0 out of 5 stars0 ratingsThe CISO Evolution: Business Knowledge for Cybersecurity Executives Rating: 5 out of 5 stars5/5ISO/IEC 27001:2022: An introduction to information security and the ISMS standard Rating: 5 out of 5 stars5/5How to Measure Anything in Cybersecurity Risk, 2nd Edition Rating: 0 out of 5 stars0 ratingsAlice and Bob Learn Application Security Rating: 5 out of 5 stars5/5The Basics of Hacking Rating: 5 out of 5 stars5/5RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals Rating: 0 out of 5 stars0 ratingsZero Trust and Third-Party Risk: Reduce the Blast Radius Rating: 0 out of 5 stars0 ratingsBuilding a Cyber Risk Management Program: Evolving Security for the Digital Age Rating: 0 out of 5 stars0 ratingsThe Psychology of Information Security: Resolving conflicts between security compliance and human behaviour Rating: 0 out of 5 stars0 ratingsNIST Cybersecurity Framework: A pocket guide Rating: 0 out of 5 stars0 ratingsEnd of Abundance in Tech: How IT Leaders Can Find Efficiencies to Drive Business Value Rating: 0 out of 5 stars0 ratingsYou CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Rating: 0 out of 5 stars0 ratingsHow Cyber Security Can Protect Your Business: A guide for all stakeholders Rating: 0 out of 5 stars0 ratingsThe Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Rating: 0 out of 5 stars0 ratingsHack Your Way to Security Bundle, 2 in 1 Bundle Rating: 0 out of 5 stars0 ratingsHackable: How to Do Application Security Right Rating: 0 out of 5 stars0 ratingsMalware Analysis: Digital Forensics, Cybersecurity, And Incident Response Rating: 0 out of 5 stars0 ratingsProactive Risk Management: Controlling Uncertainty in Product Development Rating: 3 out of 5 stars3/5
Information Technology For You
Clean Architecture: A Craftsman's Guide to Software Structure and Design Rating: 5 out of 5 stars5/5Relationship Equity: Your Cornerstone Investment to Great Gains in Business and Life Rating: 0 out of 5 stars0 ratingsSoftware Engineering at Google: Lessons Learned from Programming Over Time Rating: 4 out of 5 stars4/5Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems Rating: 5 out of 5 stars5/5Fundamentals of Software Architecture: An Engineering Approach Rating: 4 out of 5 stars4/5AI and Machine Learning for Coders: A Programmer's Guide to Artificial Intelligence Rating: 4 out of 5 stars4/5Stick and Rudder: An Explanation of the Art of Flying Rating: 5 out of 5 stars5/5Coders at Work: Reflections on the Craft of Programming Rating: 4 out of 5 stars4/5Fiber: The Coming Tech Revolution—and Why America Might Miss It Rating: 4 out of 5 stars4/5An Introduction to Information Theory: Symbols, Signals and Noise Rating: 4 out of 5 stars4/5Clean Code: A Handbook of Agile Software Craftsmanship Rating: 5 out of 5 stars5/5What Are The Benefits Of ChatGPT Powered By The New Gpt-4 Technology Version 2: ChatGPT: The Next Generation of AI-Powered Chatbots Rating: 0 out of 5 stars0 ratingsForensic Data Collections 2.0: The Guide for Defensible & Efficient Processes Rating: 0 out of 5 stars0 ratingsBitcoin: An Essential Beginner’s Guide to Bitcoin Investing, Mining, and Cryptocurrency Technologies Rating: 0 out of 5 stars0 ratingsThe Adventures of an IT Leader (Updated Edition) Rating: 5 out of 5 stars5/5HBR's 10 Must Reads on Leading Digital Transformation Rating: 4 out of 5 stars4/5Clean Agile: Back to Basics Rating: 4 out of 5 stars4/5Failure Is Not an Option: Mission Control from Mercury to Apollo 13 and Beyond Rating: 5 out of 5 stars5/5Summary of Chris Dixon's Read Write Own Rating: 5 out of 5 stars5/5Site Reliability Engineering: How Google Runs Production Systems Rating: 5 out of 5 stars5/5Info We Trust: How to Inspire the World with Data Rating: 4 out of 5 stars4/5Package, Price, Profit: The Essential Guide to Packaging and Pricing Your MSP Plans Rating: 5 out of 5 stars5/5The Clean Coder: A Code of Conduct for Professional Programmers Rating: 5 out of 5 stars5/5Hackers & Painters: Big Ideas from the Computer Age Rating: 4 out of 5 stars4/5Getting Started With ChatGPT Rating: 4 out of 5 stars4/5Information Architecture: For the Web and Beyond Rating: 4 out of 5 stars4/5Cybersecurity: The Hacker Proof Guide to Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks Rating: 4 out of 5 stars4/5
Reviews for Rethinking IT Security
0 ratings0 reviews