“The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy” (Book Review)

Get Internet, computer, and mobile device safety tips from the book “The Basics of Cyber Safety.”
The post “The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy” (Book Review) appeared first on Defending Digital.
The post… Continue reading “The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy” (Book Review)

A Raspberry Pi Grimoire For The Command Line Wizard

Who says there’s no such thing as magic? Not anyone who knows what a Unix pipe is, that’s for sure. If you do some of your best incantations at a blinking cursor, this scratch-built Raspberry Pi Zero “Spellbook” laptop created by [Kamitech] might be just what the apothecary ordered. Lucky …read more

Continue reading A Raspberry Pi Grimoire For The Command Line Wizard

“Cyber Attack Survival Manual” (Book Summary)

Personal cybersecurity and privacy advice from the book “Cyber Attack Survival Manual.”
The post “Cyber Attack Survival Manual” (Book Summary) appeared first on Security Boulevard.
Continue reading “Cyber Attack Survival Manual” (Book Summary)

70 real-life hackers and cybersecurity practitioners share their personal insights

Entering the information security industry can be a formidable undertaking and renowned professionals often seem larger than life and unapproachable (even though most are on Twitter and their email address is public). Luckily for us all, Marcus J. Care… Continue reading 70 real-life hackers and cybersecurity practitioners share their personal insights

The Dawn of the Code War, or ‘The Blurred World War’

John P. Carlin has a fascinating new book out, “Dawn of the Code War,” which discusses “how we tried to take cyberthreats out of the shadows and used the criminal justice system to shine light on cyberattacks.” Co-authored by journalist an… Continue reading The Dawn of the Code War, or ‘The Blurred World War’

“Cyber Smart” Interview with Bart McDonough

Bart McDonough, author of “Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals,” interviewed by Defending Digital. Watch the interview video and read the questions and answers.
The post “Cyber Smart” Interview with… Continue reading “Cyber Smart” Interview with Bart McDonough

Strategies for expertly protecting industrial control systems

Andrew Ginter is the Vice President of Industrial Security at Waterfall Security Solutions. We sat down with him to learn more about his new book, Secure Operations Technology, a collection of affordable and practical approaches that thoroughly defeat … Continue reading Strategies for expertly protecting industrial control systems

Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals (Book Summary)

Step-by-step personal cybersecurity guidance from the book “Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals” by Bart R. McDonough.
The post Cyber Smart: Five Habits to Protect Your Family, Money, and Identity f… Continue reading Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals (Book Summary)

Software: It Is All In The Details

Who’s the better programmer? The guy that knows 10 different languages, or someone who knows just one? It depends. Programming is akin to math, or perhaps it is that we treat some topics differently than others which leads to misconceptions about what makes a good programmer, mathematician, or engineer. We submit that to be a great programmer is less about the languages you know and more about the algorithms and data structures you understand. If you know how to solve the problem, mapping it to a particular computer language should be almost an afterthought. While there are many places that …read more

Continue reading Software: It Is All In The Details