The Cybersecurity Book You Should Read

Analogue Network SecurityRecently Cyber Defense Magazine released the top 100 cybersecurity books and the top recommended book is one of our Top Faves as well.

The book is titled, "Analogue Network Security: Time, Broken Stuff, Engineering, Systems, My Audio Career, and Other Musings on Six Decades of Thinking about It All" by author Winn Schwartau.

This book is packed with powerful information on questions your organization should consider, like if security can be quantified or measured. Winn also takes a more analytical approach to phishing and social engineering techniques. 

Winn shares his ideas on how we can be looking into security in a different way. In the description he describes the book as, "It's all about getting rid of '0's and '1's and looking in-between.... in the analogue realm that security professionals have ignored for 50+ years."

You can purchase the book on Amazon here. Cyber Defense Magazine also has an array of other books you should look into, including "The Art of Invisibility" or "The Art of Deception" by our very own Kevin Mitnick and "Cryptography Apocalypse" by Roger Grimes, Data-Driven Defense Evangelist at KnowBe4. 

It's important for you to continually keep up with all of the latest ideas on you and your users can stay safe. A first step would be new-school security awareness training so then your users can stay up to date on the latest attacks. 

Request A Demo: Security Awareness Training

products-KB4SAT6-2-1New-school Security Awareness Training is critical to enabling you and your IT staff to connect with users and help them make the right security decisions all of the time. This isn't a one and done deal, continuous training and simulated phishing are both needed to mobilize users as your last line of defense. Request your one-on-one demo of KnowBe4's security awareness training and simulated phishing platform and see how easy it can be!

Save My Spot!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

Subscribe To Our Blog

Ransomware Hostage Rescue Manual

Get the latest about social engineering

Subscribe to CyberheistNews