Hören und Lesen

Tritt ein in eine Welt voller Geschichten

  • Mehr als 600.000 Hörbücher und E-Book
  • Jederzeit kündbar
  • Exklusive Titel und Originals
  • komfortabler Kinder-Modus
Abonniere jetzt
se-device-image-1200x1200
Cover for The Cyber Conundrum: How Do We Fix Cybersecurity?

The Cyber Conundrum: How Do We Fix Cybersecurity?

8 Bewertung

2.4

Länge
2 Std 37 Min
Sprachen
Englisch
Format
Kategorie

Sachbuch

The 2016 presidential election was chaotic for many reasons. Perhaps the most troubling was news that a foreign power used new cyber warfare tactics to influence our views and skew the election. These new revelations come to light as many grow weary of a new reality where hackers always seem to be one step ahead of us. Author Peter K. Chronis claims we need a “moonshot” to bolster our cybersecurity—an astonishing achievement on the scale of wiping out polio, defeating the Nazis, or landing on the moon. The author uses inspiration and lessons from these other complex “moonshots” as a guide to help us develop a comprehensive cybersecurity strategy.

Written with a nontechnical audience in mind, The Cyber Conundrum examines the many flaws in global cybersecurity strategy and proposes solutions the tech industry, governments, and companies need to explore to address fundamental cybersecurity challenges. Without fundamental change, our democratic institutions, the critical services we rely on every day (electricity, communications, financial institutions and more), and the free flow of information are in jeopardy—making this an issue important to everyone.

© 2018 Pro Audio Voices (Hörbuch): 9780998749068

Erscheinungsdatum

Hörbuch: 2. Oktober 2018

Anderen gefällt...

  1. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
    The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  2. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond
    Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  3. Hacking the Hacker: Learn From the Experts Who Take Down Hackers
    Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  4. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
    A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  5. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
    Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  6. Cybercrime Investigators Handbook
    Cybercrime Investigators Handbook Graeme Edwards
  7. The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World
    The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World Alexis Wichowski
  8. Exploding Data: Reclaiming Our Cyber Security in the Digital Age
    Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  9. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test
    Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
  10. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals
    Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
  11. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
    Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  12. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
    CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  13. The Art of Attack: Attacker Mindset for Security Professionals
    The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
  14. What is the Dark Web?: The truth about the hidden part of the internet
    What is the Dark Web?: The truth about the hidden part of the internet Evan J. Rodgers
  15. Cybersecutity First Principles
    Cybersecutity First Principles Rick Howard
  16. Data For the People: How to Make Our Post-Privacy Economy Work for You
    Data For the People: How to Make Our Post-Privacy Economy Work for You Andreas S. Weigend
  17. The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power
    The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power Joseph Turow
  18. Cybersecurity For Dummies
    Cybersecurity For Dummies Joseph Steinberg
  19. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1
    Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
  20. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
    8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  21. A Vulnerable System: The History of Information Security in the Computer Age
    A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
  22. Digital Resilience: Is Your Company Ready for the Next Cyber Threat?
    Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Ray A. Rothrock
  23. Industry of Anonymity: Inside the Business of Cybercrime
    Industry of Anonymity: Inside the Business of Cybercrime Jonathan Lusthaus
  24. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1
    Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
  25. All You Can Pay: How Companies Use Our Data to Empty Our Wallets
    All You Can Pay: How Companies Use Our Data to Empty Our Wallets Anna Bernasek
  26. Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity
    Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity Ben Malisow
  27. Hacking: How to Hack
    Hacking: How to Hack Alex Wagner
  28. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies
    CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
  29. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
    (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  30. The Language of Deception: Weaponizing Next Generation AI
    The Language of Deception: Weaponizing Next Generation AI Justin Hutchens
  31. Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST
    Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST ATTILA KOVACS
  32. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
    Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
  33. Democratic Capitalism at the Crossroads: Technological Change and the Future of Politics
    Democratic Capitalism at the Crossroads: Technological Change and the Future of Politics Carles Boix
  34. Of Privacy and Power: The Transatlantic Struggle over Freedom and Security
    Of Privacy and Power: The Transatlantic Struggle over Freedom and Security Henry Farrell
  35. The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe
    The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe William Poundstone
  36. Deep Learning
    Deep Learning John D. Kelleher
  37. The Vanishing American Corporation: Navigating the Hazards of a New Economy
    The Vanishing American Corporation: Navigating the Hazards of a New Economy Gerald F. Davis
  38. Fear Your Strengths: What You Are Best at Could Be Your Biggest Problem
    Fear Your Strengths: What You Are Best at Could Be Your Biggest Problem Robert D. Kaplan
  39. What the Luck?: The Surprising Role of Chance in Our Everyday Lives
    What the Luck?: The Surprising Role of Chance in Our Everyday Lives Gary Smith
  40. New Laws of Robotics: Defending Human Expertise in the Age of AI
    New Laws of Robotics: Defending Human Expertise in the Age of AI Frank Pasquale
  41. Knowledge and Power: The Information Theory of Capitalism and How It Is Revolutionizing Our World
    Knowledge and Power: The Information Theory of Capitalism and How It Is Revolutionizing Our World George Gilder
  42. Lecturing Birds on Flying: Can Mathematical Theories Destroy the Financial Markets
    Lecturing Birds on Flying: Can Mathematical Theories Destroy the Financial Markets Pablo Triana
  43. Digital Cash: The Unknown History of the Anarchists, Utopians, and Technologists Who Created Cryptocurrency
    Digital Cash: The Unknown History of the Anarchists, Utopians, and Technologists Who Created Cryptocurrency Finn Brunton
  44. Artificial Intelligence: Modern Magic or Dangerous Future?
    Artificial Intelligence: Modern Magic or Dangerous Future? Yorick Wilks
  45. Cloud Computing
    Cloud Computing Nayan B. Ruparella
  46. Between Debt and the Devil: Money, Credit, and Fixing Global Finance
    Between Debt and the Devil: Money, Credit, and Fixing Global Finance Adair Turner
  47. GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights
    GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights Ferris Eanfar
  48. The Things We Make: The Unknown History of Invention from Cathedrals to Soda Cans
    The Things We Make: The Unknown History of Invention from Cathedrals to Soda Cans Bill Hammack

Wähle dein Abo-Modell

  • Über 600.000 Titel

  • Lade Titel herunter mit dem Offline Modus

  • Exklusive Titel und Storytel Originals

  • Sicher für Kinder (Kindermodus)

  • Einfach jederzeit kündbar

Am beliebtesten!
Angebot für begrenzte Zeit

Unlimited

Unbegrenzte Geschichten, die dir helfen, innezuhalten und dich zu inspirieren.

18.90 € /Monat
Spare 41%
  • 1 Konto

  • Unbegrenzter Zugriff

  • Jederzeit kündbar

  • Wechsel zu Basic jederzeit möglich

Jetzt ausprobieren

Basic

Für alle, die gelegentlich hören und lesen.

7.90 € /Monat
7 Tage kostenlos
  • 1 Konto

  • 20 Stunden/pro Monat

  • Jederzeit kündbar

  • Abo-Upgrade jederzeit möglich

Jetzt ausprobieren