Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036
Cover for The Cyber Conundrum: How Do We Fix Cybersecurity?

The Cyber Conundrum: How Do We Fix Cybersecurity?

8 Bedømmelse

2.4

Varighed
2T 37M
Sprog
Engelsk
Format
Kategori

Fakta

The 2016 presidential election was chaotic for many reasons. Perhaps the most troubling was news that a foreign power used new cyber warfare tactics to influence our views and skew the election. These new revelations come to light as many grow weary of a new reality where hackers always seem to be one step ahead of us. Author Peter K. Chronis claims we need a “moonshot” to bolster our cybersecurity—an astonishing achievement on the scale of wiping out polio, defeating the Nazis, or landing on the moon. The author uses inspiration and lessons from these other complex “moonshots” as a guide to help us develop a comprehensive cybersecurity strategy.

Written with a nontechnical audience in mind, The Cyber Conundrum examines the many flaws in global cybersecurity strategy and proposes solutions the tech industry, governments, and companies need to explore to address fundamental cybersecurity challenges. Without fundamental change, our democratic institutions, the critical services we rely on every day (electricity, communications, financial institutions and more), and the free flow of information are in jeopardy—making this an issue important to everyone.

© 2018 Pro Audio Voices (Lydbog): 9780998749068

Udgivelsesdato

Lydbog: 2. oktober 2018

Andre kan også lide...

  1. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
    The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  2. Exploding Data: Reclaiming Our Cyber Security in the Digital Age
    Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  3. Cybercrime Investigators Handbook
    Cybercrime Investigators Handbook Graeme Edwards
  4. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
    Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  5. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond
    Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  6. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
    Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  7. Cybersecutity First Principles
    Cybersecutity First Principles Rick Howard
  8. The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe
    The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe William Poundstone
  9. The Vanishing American Corporation: Navigating the Hazards of a New Economy
    The Vanishing American Corporation: Navigating the Hazards of a New Economy Gerald F. Davis
  10. Data For the People: How to Make Our Post-Privacy Economy Work for You
    Data For the People: How to Make Our Post-Privacy Economy Work for You Andreas S. Weigend
  11. Haptics
    Haptics Lynette Jones
  12. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
    A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  13. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
    Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
  14. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
    CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  15. The Art of Attack: Attacker Mindset for Security Professionals
    The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
  16. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test
    Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
  17. What is the Dark Web?: The truth about the hidden part of the internet
    What is the Dark Web?: The truth about the hidden part of the internet Evan J. Rodgers
  18. Waves
    Waves Fredric Raichlen
  19. 3D Printing
    3D Printing John M. Jordan
  20. Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers
    Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers Robb Wilson
  21. Distrust: Big Data, Data-Torturing, and the Assault on Science
    Distrust: Big Data, Data-Torturing, and the Assault on Science Gary Smith
  22. The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age
    The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age Nicholas Sullivan
  23. The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power
    The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power Joseph Turow
  24. Deep Learning
    Deep Learning John D. Kelleher
  25. The Road to Reinvention: How to Drive Disruption and Accelerate Transformation
    The Road to Reinvention: How to Drive Disruption and Accelerate Transformation Josh Linkner
  26. The Great Persuasion: Reinventing Free Markets Since the Depression
    The Great Persuasion: Reinventing Free Markets Since the Depression Angus Burgin
  27. All You Can Pay: How Companies Use Our Data to Empty Our Wallets
    All You Can Pay: How Companies Use Our Data to Empty Our Wallets Anna Bernasek
  28. Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science
    Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science Peter J. Hotez
  29. Hacking the Hacker: Learn From the Experts Who Take Down Hackers
    Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  30. Auctions
    Auctions Timothy P. Hubbard
  31. Curiosity Studies: A New Ecology of Knowledge
    Curiosity Studies: A New Ecology of Knowledge Arjun Shankar
  32. The New Roaring Twenties: Prosper in Volatile Times
    The New Roaring Twenties: Prosper in Volatile Times Paul Zane Pilzer
  33. Fake Photos
    Fake Photos Hany Farid
  34. The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World
    The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World Alexis Wichowski
  35. Digital Resilience: Is Your Company Ready for the Next Cyber Threat?
    Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Ray A. Rothrock
  36. Spatial Computing
    Spatial Computing Pamela Vold
  37. Chain Blame: How Wall Street Caused the Mortgage and Credit Crisis
    Chain Blame: How Wall Street Caused the Mortgage and Credit Crisis Padilla Muolo
  38. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1
    Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
  39. Billionaires in World Politics
    Billionaires in World Politics Peter Hagel
  40. Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI
    Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI Reid Blackman
  41. How Big-Tech Barons Smash Innovation—and How to Strike Back
    How Big-Tech Barons Smash Innovation—and How to Strike Back Maurice E. Stucke
  42. Cybersecurity For Dummies
    Cybersecurity For Dummies Joseph Steinberg
  43. Certified Information Security Manager CISM Study Guide
    Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  44. Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser
    Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser Dan Levy
  45. Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity
    Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity Ben Malisow
  46. Future Rising: A Journey from the Past to the Edge of Tomorrow
    Future Rising: A Journey from the Past to the Edge of Tomorrow Andrew Maynard
  47. Competition Overdose: How Free Market Mythology Transformed Us from Citizen Kings to Market Servants
    Competition Overdose: How Free Market Mythology Transformed Us from Citizen Kings to Market Servants Maurice E. Stucke
  48. Completing Capitalism: Heal Business to Heal the World
    Completing Capitalism: Heal Business to Heal the World Bruno Roche
  49. The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World
    The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World Shaun Rein
  50. The New Technology Elite: How Great Companies Optimize Both Technology Consumption and Production
    The New Technology Elite: How Great Companies Optimize Both Technology Consumption and Production Vinnie Mirchandani
  51. Web3: Charting the Internet's Next Economic and Cultural Frontier
    Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
  52. Critical Decisions
    Critical Decisions Peter A. Ubel
  53. Darwin’s House of Cards: A Journalist’s Odyssey Through the Darwin Debates
    Darwin’s House of Cards: A Journalist’s Odyssey Through the Darwin Debates Tom Bethell
  54. New Laws of Robotics: Defending Human Expertise in the Age of AI
    New Laws of Robotics: Defending Human Expertise in the Age of AI Frank Pasquale
  55. Lecturing Birds on Flying: Can Mathematical Theories Destroy the Financial Markets
    Lecturing Birds on Flying: Can Mathematical Theories Destroy the Financial Markets Pablo Triana
  56. What You're Really Meant To Do: A Road Map for Reaching Your Unique Potential
    What You're Really Meant To Do: A Road Map for Reaching Your Unique Potential Robert D. Kaplan
  57. Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI
    Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI Beena Ammanath
  58. Catching Lightning in a Bottle: How Merrill Lynch Revolutionized the Financial World
    Catching Lightning in a Bottle: How Merrill Lynch Revolutionized the Financial World Winthrop H. Smith
  59. The Money Makers: How Roosevelt and Keynes Ended the Depression, Defeated Fascism, and Secured a Prosperous Peace
    The Money Makers: How Roosevelt and Keynes Ended the Depression, Defeated Fascism, and Secured a Prosperous Peace Eric Rauchway
  60. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
    8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  61. What the Luck?: The Surprising Role of Chance in Our Everyday Lives
    What the Luck?: The Surprising Role of Chance in Our Everyday Lives Gary Smith
  62. Ludicrous: The Unvarnished Story of Tesla Motors
    Ludicrous: The Unvarnished Story of Tesla Motors Edward Niedermeyer
  63. Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST
    Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST ATTILA KOVACS
  64. All These Worlds Are Yours: The Scientific Search for Alien Life
    All These Worlds Are Yours: The Scientific Search for Alien Life Jon Willis
  65. The Problem of Democracy: America, the Middle East, and the Rise and Fall of an Idea
    The Problem of Democracy: America, the Middle East, and the Rise and Fall of an Idea Shadi Hamid
  66. Virtual Reality
    Virtual Reality Samuel Greengard
  67. Chinese Rules: Mao's Dog, Deng's Cat, and Five Timeless Lessons from the Front Lines in China
    Chinese Rules: Mao's Dog, Deng's Cat, and Five Timeless Lessons from the Front Lines in China Tim Clissold
  68. Human Work in the Age of Smart Machines
    Human Work in the Age of Smart Machines Jamie Merisotis
  69. Everybody Hertz: The Amazing World of Frequency, from Bad Vibes to Good Vibrations
    Everybody Hertz: The Amazing World of Frequency, from Bad Vibes to Good Vibrations Richard Mainwaring
  70. Balance: How It Works and What It Means
    Balance: How It Works and What It Means Paul Thagard
  71. Is That a Fact?: Frauds, Quacks, and the Real Science of Everyday Life
    Is That a Fact?: Frauds, Quacks, and the Real Science of Everyday Life Dr. Joe Schwarcz
  72. In the Year of the Tiger: Why it's not too late to learn from China
    In the Year of the Tiger: Why it's not too late to learn from China Dr. Angelika Berger-Sodian
  73. Genentech: The Beginnings of Biotech
    Genentech: The Beginnings of Biotech Sally Smith Hughes
  74. The Money Illusion: Market Monetarism, the Great Recession, and the Future of Monetary Policy
    The Money Illusion: Market Monetarism, the Great Recession, and the Future of Monetary Policy Scott Sumner
  75. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies
    CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
  76. Autonomy: The Quest to Build the Driverless Car - And How It Will Reshape Our World
    Autonomy: The Quest to Build the Driverless Car - And How It Will Reshape Our World Lawrence Burns
  77. Applied Minds: How Engineers Think
    Applied Minds: How Engineers Think Guru Madhavan
  78. Survival: Tips, Tactics, and Tricks to Stay Alive Longer
    Survival: Tips, Tactics, and Tricks to Stay Alive Longer Jordan Gunner
  79. Cosmic Careers: Exploring the Universe of Opportunities in the Space Industries
    Cosmic Careers: Exploring the Universe of Opportunities in the Space Industries Maryann Karinch
  80. Quantum Physics Made Easy: The Introduction Guide For Beginners Who Flunked Maths And Science In Plain Simple English
    Quantum Physics Made Easy: The Introduction Guide For Beginners Who Flunked Maths And Science In Plain Simple English Donald B. Grey
  81. Thinking Like an Economist: How Efficiency Replaced Equality in U.S. Public Policy
    Thinking Like an Economist: How Efficiency Replaced Equality in U.S. Public Policy Elizabeth Popp Berman
  82. The Illusion of Control: Why Financial Crises Happen, and What We Can (and Can't) Do About It
    The Illusion of Control: Why Financial Crises Happen, and What We Can (and Can't) Do About It Jon Danielsson
  83. Unbound: How Inequality Constricts Our Economy and What We Can Do about It
    Unbound: How Inequality Constricts Our Economy and What We Can Do about It Heather Boushey
  84. Artificial Intelligence: From Medieval Robots to Neural Networks
    Artificial Intelligence: From Medieval Robots to Neural Networks Clifford A. Pickover
  85. The Messenger: Moderna, the Vaccine, and the Business Gamble That Changed the World
    The Messenger: Moderna, the Vaccine, and the Business Gamble That Changed the World Peter Loftus
  86. The Legal Analyst: A Toolkit for Thinking about the Law
    The Legal Analyst: A Toolkit for Thinking about the Law Ward Farnsworth
  87. Business Ethics for Better Behavior
    Business Ethics for Better Behavior Jason Brennan
  88. Immortality, Inc.: Renegade Science, Silicon Valley Billions, and the Quest to Live Forever
    Immortality, Inc.: Renegade Science, Silicon Valley Billions, and the Quest to Live Forever Chip Walter
  89. The Einstein Syndrome: Bright Children Who Talk Late
    The Einstein Syndrome: Bright Children Who Talk Late Thomas Sowell
  90. Worried?: Science investigates some of life's common concerns
    Worried?: Science investigates some of life's common concerns Eric Chudler

Vælg dit abonnement

  • Over 600.000 titler

  • Download og nyd titler offline

  • Eksklusive titler + Mofibo Originals

  • Børnevenligt miljø (Kids Mode)

  • Det er nemt at opsige når som helst

Den mest populære

Premium

For dig som lytter og læser ofte.

129 kr. /måned

7 dage gratis
  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Unlimited

For dig som lytter og læser ubegrænset.

159 kr. /måned

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Family

For dig som ønsker at dele historier med familien.

Fra 179 kr. /måned

7 dage gratis
  • Fri lytning til podcasts

  • Kun 39 kr. pr. ekstra konto

  • Ingen binding

Dig + 1 familiemedlem2 konti

179 kr. /måned

Start tilbuddet

Flex

For dig som vil prøve Mofibo.

89 kr. /måned

7 dage gratis
  • Gem op til 100 ubrugte timer

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet