Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036
Cover for The Cyber Conundrum: How Do We Fix Cybersecurity?

The Cyber Conundrum: How Do We Fix Cybersecurity?

8 Bedømmelse

2.4

Varighed
2T 37M
Sprog
Engelsk
Format
Kategori

Fakta

The 2016 presidential election was chaotic for many reasons. Perhaps the most troubling was news that a foreign power used new cyber warfare tactics to influence our views and skew the election. These new revelations come to light as many grow weary of a new reality where hackers always seem to be one step ahead of us. Author Peter K. Chronis claims we need a “moonshot” to bolster our cybersecurity—an astonishing achievement on the scale of wiping out polio, defeating the Nazis, or landing on the moon. The author uses inspiration and lessons from these other complex “moonshots” as a guide to help us develop a comprehensive cybersecurity strategy.

Written with a nontechnical audience in mind, The Cyber Conundrum examines the many flaws in global cybersecurity strategy and proposes solutions the tech industry, governments, and companies need to explore to address fundamental cybersecurity challenges. Without fundamental change, our democratic institutions, the critical services we rely on every day (electricity, communications, financial institutions and more), and the free flow of information are in jeopardy—making this an issue important to everyone.

© 2018 Pro Audio Voices (Lydbog): 9780998749068

Udgivelsesdato

Lydbog: 2. oktober 2018

Andre kan også lide...

  1. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
    The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  2. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond
    Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  3. Cybercrime Investigators Handbook
    Cybercrime Investigators Handbook Graeme Edwards
  4. Exploding Data: Reclaiming Our Cyber Security in the Digital Age
    Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  5. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
    Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  6. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
    Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  7. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
    A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  8. The Vanishing American Corporation: Navigating the Hazards of a New Economy
    The Vanishing American Corporation: Navigating the Hazards of a New Economy Gerald F. Davis
  9. What is the Dark Web?: The truth about the hidden part of the internet
    What is the Dark Web?: The truth about the hidden part of the internet Evan J. Rodgers
  10. The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World
    The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World Alexis Wichowski
  11. 3D Printing
    3D Printing John M. Jordan
  12. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test
    Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
  13. The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe
    The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe William Poundstone
  14. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
    CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  15. The Art of Attack: Attacker Mindset for Security Professionals
    The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
  16. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
    Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
  17. GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights
    GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights Ferris Eanfar
  18. Haptics
    Haptics Lynette Jones
  19. Hacking the Hacker: Learn From the Experts Who Take Down Hackers
    Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  20. New Laws of Robotics: Defending Human Expertise in the Age of AI
    New Laws of Robotics: Defending Human Expertise in the Age of AI Frank Pasquale
  21. Social Capital: Life online in the shadow of Ireland’s tech boom
    Social Capital: Life online in the shadow of Ireland’s tech boom Aoife Barry
  22. The Internet Things
    The Internet Things Samuel Greengard
  23. Cybersecurity For Dummies
    Cybersecurity For Dummies Joseph Steinberg
  24. Data For the People: How to Make Our Post-Privacy Economy Work for You
    Data For the People: How to Make Our Post-Privacy Economy Work for You Andreas S. Weigend
  25. Waves
    Waves Fredric Raichlen
  26. Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers
    Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers Robb Wilson
  27. The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power
    The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power Joseph Turow
  28. Cybersecutity First Principles
    Cybersecutity First Principles Rick Howard
  29. Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST
    Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST ATTILA KOVACS
  30. Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science
    Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science Peter J. Hotez
  31. Deep Learning
    Deep Learning John D. Kelleher
  32. The Great Persuasion: Reinventing Free Markets Since the Depression
    The Great Persuasion: Reinventing Free Markets Since the Depression Angus Burgin
  33. The New Roaring Twenties: Prosper in Volatile Times
    The New Roaring Twenties: Prosper in Volatile Times Paul Zane Pilzer
  34. Fake Photos
    Fake Photos Hany Farid
  35. The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age
    The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age Nicholas Sullivan
  36. Chain Blame: How Wall Street Caused the Mortgage and Credit Crisis
    Chain Blame: How Wall Street Caused the Mortgage and Credit Crisis Padilla Muolo
  37. The Money Makers: How Roosevelt and Keynes Ended the Depression, Defeated Fascism, and Secured a Prosperous Peace
    The Money Makers: How Roosevelt and Keynes Ended the Depression, Defeated Fascism, and Secured a Prosperous Peace Eric Rauchway
  38. All You Can Pay: How Companies Use Our Data to Empty Our Wallets
    All You Can Pay: How Companies Use Our Data to Empty Our Wallets Anna Bernasek
  39. Accountable: The Rise of Citizen Capitalism
    Accountable: The Rise of Citizen Capitalism Michael O'Leary
  40. Curiosity Studies: A New Ecology of Knowledge
    Curiosity Studies: A New Ecology of Knowledge Arjun Shankar
  41. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
    8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  42. The Space Economy: Capitalize on the Greatest Business Opportunity of Our Lifetime
    The Space Economy: Capitalize on the Greatest Business Opportunity of Our Lifetime Chad Anderson
  43. The Turn-On: How the Powerful Make Us Like Them-from Washington to Wall Street to Hollywood
    The Turn-On: How the Powerful Make Us Like Them-from Washington to Wall Street to Hollywood Steven Goldstein
  44. Darwin’s House of Cards: A Journalist’s Odyssey Through the Darwin Debates
    Darwin’s House of Cards: A Journalist’s Odyssey Through the Darwin Debates Tom Bethell
  45. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1
    Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
  46. Completing Capitalism: Heal Business to Heal the World
    Completing Capitalism: Heal Business to Heal the World Bruno Roche
  47. Certified Information Security Manager CISM Study Guide
    Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  48. The Money Illusion: Market Monetarism, the Great Recession, and the Future of Monetary Policy
    The Money Illusion: Market Monetarism, the Great Recession, and the Future of Monetary Policy Scott Sumner
  49. Digital Resilience: Is Your Company Ready for the Next Cyber Threat?
    Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Ray A. Rothrock
  50. All These Worlds Are Yours: The Scientific Search for Alien Life
    All These Worlds Are Yours: The Scientific Search for Alien Life Jon Willis
  51. What the Luck?: The Surprising Role of Chance in Our Everyday Lives
    What the Luck?: The Surprising Role of Chance in Our Everyday Lives Gary Smith
  52. Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI
    Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI Beena Ammanath
  53. Distrust: Big Data, Data-Torturing, and the Assault on Science
    Distrust: Big Data, Data-Torturing, and the Assault on Science Gary Smith
  54. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1
    Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
  55. Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity
    Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity Ben Malisow
  56. Billionaires in World Politics
    Billionaires in World Politics Peter Hagel
  57. What You're Really Meant To Do: A Road Map for Reaching Your Unique Potential
    What You're Really Meant To Do: A Road Map for Reaching Your Unique Potential Robert D. Kaplan
  58. Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI
    Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI Reid Blackman
  59. Survival: Tips, Tactics, and Tricks to Stay Alive Longer
    Survival: Tips, Tactics, and Tricks to Stay Alive Longer Jordan Gunner
  60. Lecturing Birds on Flying: Can Mathematical Theories Destroy the Financial Markets
    Lecturing Birds on Flying: Can Mathematical Theories Destroy the Financial Markets Pablo Triana
  61. Ludicrous: The Unvarnished Story of Tesla Motors
    Ludicrous: The Unvarnished Story of Tesla Motors Edward Niedermeyer
  62. The Einstein Syndrome: Bright Children Who Talk Late
    The Einstein Syndrome: Bright Children Who Talk Late Thomas Sowell
  63. Quantum Physics Made Easy: The Introduction Guide For Beginners Who Flunked Maths And Science In Plain Simple English
    Quantum Physics Made Easy: The Introduction Guide For Beginners Who Flunked Maths And Science In Plain Simple English Donald B. Grey
  64. Chinese Rules: Mao's Dog, Deng's Cat, and Five Timeless Lessons from the Front Lines in China
    Chinese Rules: Mao's Dog, Deng's Cat, and Five Timeless Lessons from the Front Lines in China Tim Clissold
  65. Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser
    Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser Dan Levy
  66. The Age of AI: Artificial Intelligence and the Future of Humanity
    The Age of AI: Artificial Intelligence and the Future of Humanity Jason Thacker
  67. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies
    CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
  68. Cosmic Careers: Exploring the Universe of Opportunities in the Space Industries
    Cosmic Careers: Exploring the Universe of Opportunities in the Space Industries Maryann Karinch
  69. Extraterrestrials
    Extraterrestrials Wade Roush
  70. Future Rising: A Journey from the Past to the Edge of Tomorrow
    Future Rising: A Journey from the Past to the Edge of Tomorrow Andrew Maynard
  71. The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World
    The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World Shaun Rein
  72. Web3: Charting the Internet's Next Economic and Cultural Frontier
    Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
  73. Win the Game of Googleopoly: Unlocking the Secret Strategy of Search Engines
    Win the Game of Googleopoly: Unlocking the Secret Strategy of Search Engines Sean V. Bradley
  74. Fear Your Strengths: What You Are Best at Could Be Your Biggest Problem
    Fear Your Strengths: What You Are Best at Could Be Your Biggest Problem Robert D. Kaplan
  75. Catching Lightning in a Bottle: How Merrill Lynch Revolutionized the Financial World
    Catching Lightning in a Bottle: How Merrill Lynch Revolutionized the Financial World Winthrop H. Smith
  76. The Legal Analyst: A Toolkit for Thinking about the Law
    The Legal Analyst: A Toolkit for Thinking about the Law Ward Farnsworth
  77. The Problem of Democracy: America, the Middle East, and the Rise and Fall of an Idea
    The Problem of Democracy: America, the Middle East, and the Rise and Fall of an Idea Shadi Hamid
  78. Competition Overdose: How Free Market Mythology Transformed Us from Citizen Kings to Market Servants
    Competition Overdose: How Free Market Mythology Transformed Us from Citizen Kings to Market Servants Maurice E. Stucke
  79. Human Work in the Age of Smart Machines
    Human Work in the Age of Smart Machines Jamie Merisotis
  80. In the Year of the Tiger: Why it's not too late to learn from China
    In the Year of the Tiger: Why it's not too late to learn from China Dr. Angelika Berger-Sodian
  81. You Only Have to Be Right Once: The Unprecedented Rise of the Instant Tech Billionaires
    You Only Have to Be Right Once: The Unprecedented Rise of the Instant Tech Billionaires Randall Lane
  82. Immortality, Inc.: Renegade Science, Silicon Valley Billions, and the Quest to Live Forever
    Immortality, Inc.: Renegade Science, Silicon Valley Billions, and the Quest to Live Forever Chip Walter
  83. The Messenger: Moderna, the Vaccine, and the Business Gamble That Changed the World
    The Messenger: Moderna, the Vaccine, and the Business Gamble That Changed the World Peter Loftus
  84. Hacking: How to Hack
    Hacking: How to Hack Alex Wagner
  85. How to Educate a Citizen: The Power of Shared Knowledge to Unify a Nation
    How to Educate a Citizen: The Power of Shared Knowledge to Unify a Nation E. D. Hirsch
  86. Is That a Fact?: Frauds, Quacks, and the Real Science of Everyday Life
    Is That a Fact?: Frauds, Quacks, and the Real Science of Everyday Life Dr. Joe Schwarcz
  87. Consent and Control in the Authoritarian Workplace: Russia and China Compared
    Consent and Control in the Authoritarian Workplace: Russia and China Compared Martin Krzywdzinski
  88. The Billion Dollar Molecule: One Company's Quest for the Perfect Drug
    The Billion Dollar Molecule: One Company's Quest for the Perfect Drug Barry Werth
  89. Critical Decisions
    Critical Decisions Peter A. Ubel

Vælg dit abonnement

  • Over 600.000 titler

  • Download og nyd titler offline

  • Eksklusive titler + Mofibo Originals

  • Børnevenligt miljø (Kids Mode)

  • Det er nemt at opsige når som helst

Den mest populære

Premium

For dig som lytter og læser ofte.

129 kr. /måned
  • 1 konto

  • 100 timer/måned

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Unlimited

For dig som lytter og læser ubegrænset.

159 kr. /måned
  • 1 konto

  • Ubegrænset adgang

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Family

For dig som ønsker at dele historier med familien.

Fra 179 kr. /måned
  • 2-6 konti

  • 100 timer/måned pr. konto

  • Fri lytning til podcasts

  • Kun 39 kr. pr. ekstra konto

  • Ingen binding

2 konti

179 kr. /måned
Start tilbuddet

Flex

For dig som vil prøve Mofibo.

89 kr. /måned
  • 1 konto

  • 20 timer/måned

  • Gem op til 100 ubrugte timer

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Prøv gratis