article thumbnail

Review: Practical Security Architecture

Adam Shostack

” Similarly, everybody has both enterprise and product architecture. I have to say that because “architecture” is much maligned for being heavyweight, disconnected, and irrelevant in today’s world of Dev-Opsy CI/CD moving fast and breaking things. They say nice things about my Threat Modeling book.

article thumbnail

NBlog Mar 11 - book review on "Cyber Strategy"

Notice Bored

Siegel and Mark Sweeney Publisher: Auerbach/CRC Press ISBN: 978-0-367-45817-1 Price: ~ US$100 + shipping from Amazon Outline This book lays out a systematic process for developing corporate strategy in the area of cyber (meaning IT) security and resilience. The book makes it a little easier. This stuff is hard.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mentions

Adam Shostack

Lastly, I’m interviewed as part of Ed Moyle & Diana Kelley’s new book, “ Practical Cybersecurity Architecture ,” now available for pre-order. At 6PM BST (London) today the 23rd, I’ll be joining Gamification of threat modelling using OWASP Cornucopia with Grant Ongers.

article thumbnail

Nurturing Our Cyber Talent

IT Security Guru

I remember when I set out in IT Architecture and was making the switch to Cybersecurity. For example, I experienced first-hand when I started in this sector that the cost of books, courses and accreditations was and remains astronomical. I wrote several books to share knowledge with those embarking on a career in cybersecurity.

CISO 117
article thumbnail

Building a Ransomware Resilient Architecture

eSecurity Planet

While security teams layer essential preventative measures, resilience measures also need to be implemented in an architecture to reduce the impact of ransomware attacks on your backups. Figure 1: Typical VLAN architecture. Figure 2: Resilient VLAN architecture. How could this have been prevented? Does this add latency?

article thumbnail

Could this 'Unhackable' Chip Be a Security Moonshot?

SecureWorld News

Undefined semantics are nooks and crannies of the computing architecture—for example the location, format, and content of program code. was discussing his recent book about fixing cybersecurity. This is from the back cover of his book: "In The Cyber Conundrum. He told the audience that security needs a game changer.

CISO 125
article thumbnail

Michelin Drives Sustainable Mobility Using Data and DevOps

Security Boulevard

Plus, he gives a preview of his latest book called “ The Lean Approach to Digital Transformation.”. Jedidiah Yueh: Would you please share with us what inspired the book? The subtitle of the book is “From Customer to Code,” and the book says you have to master both. Otherwise, they'll be in trouble. Then it's about tools.

Mobile 111