Co-author of new book: The Definitive Guide to PCI DSS Version 4: Documentation, Compliance, and Management.
https://amzn.to/3WhEfh1
brothke.medium.com/how-to-tell-...
brothke.medium.com/how-to-tell-...
Jeny Teheran discusses why Dr. Susan Landau’s 𝙇𝙞𝙨𝙩𝙚𝙣𝙞𝙣𝙜 𝙄𝙣 is a must-read exploration of privacy, encryption, and the ongoing struggle over government access to secure systems, recommending it for the CyberCanon Hall of Fame.
📝Review: cybercanon.org/listening-in...
(1/2..)
Jeny Teheran discusses why Dr. Susan Landau’s 𝙇𝙞𝙨𝙩𝙚𝙣𝙞𝙣𝙜 𝙄𝙣 is a must-read exploration of privacy, encryption, and the ongoing struggle over government access to secure systems, recommending it for the CyberCanon Hall of Fame.
📝Review: cybercanon.org/listening-in...
(1/2..)
cybersec.picussecurity.com/s/ferocious-...
cybersec.picussecurity.com/s/ferocious-...
This week, Kevin Magee provides a Hall of Fame recommendation for Sarah Armstrong-Smith’s 𝙐𝙣𝙙𝙚𝙧𝙨𝙩𝙖𝙣𝙙 𝙩𝙝𝙚 𝘾𝙮𝙗𝙚𝙧 𝘼𝙩𝙩𝙖𝙘𝙠𝙚𝙧 𝙈𝙞𝙣𝙙𝙨𝙚𝙩
Read why he believes it will help you "transform your response to threats" ➡️ tinyurl.com/56nzxp5z
#CISO #SecurityAwareness #ThreatIntelligence
This week, Kevin Magee provides a Hall of Fame recommendation for Sarah Armstrong-Smith’s 𝙐𝙣𝙙𝙚𝙧𝙨𝙩𝙖𝙣𝙙 𝙩𝙝𝙚 𝘾𝙮𝙗𝙚𝙧 𝘼𝙩𝙩𝙖𝙘𝙠𝙚𝙧 𝙈𝙞𝙣𝙙𝙨𝙚𝙩
Read why he believes it will help you "transform your response to threats" ➡️ tinyurl.com/56nzxp5z
#CISO #SecurityAwareness #ThreatIntelligence
Jeffrey Pierdomenico dives into Mark Bailey’s Unknowable Minds, exploring AI, ethics, and security.
“Putting humanity above all else” has never felt more urgent.
🔗 cybercanon.org/unknowable-minds
From: @imprintacademic.bsky.social
#AIsecurity #CybersecurityBooks
Jeffrey Pierdomenico dives into Mark Bailey’s Unknowable Minds, exploring AI, ethics, and security.
“Putting humanity above all else” has never felt more urgent.
🔗 cybercanon.org/unknowable-minds
From: @imprintacademic.bsky.social
#AIsecurity #CybersecurityBooks
The 11 risk categories detail the many threats and vulnerabilities inherent in AI deployments.
api.cyfluencer.com/s/build-your...
The 11 risk categories detail the many threats and vulnerabilities inherent in AI deployments.
api.cyfluencer.com/s/build-your...
brothke.medium.com/get-on-a-boa...
brothke.medium.com/get-on-a-boa...
api.cyfluencer.com/s/columbia-u...
api.cyfluencer.com/s/columbia-u...
brothke.medium.com/the-big-lie-...
brothke.medium.com/the-big-lie-...
Learn more about writing a book review for the Cybersecurity Canon here📚
https://icdt.osu.edu/news/2020/08/want-submit-review
Learn more about writing a book review for the Cybersecurity Canon here📚
https://icdt.osu.edu/news/2020/08/want-submit-review