Sublime

An inspiration engine for ideas

Rik Ferguson The Cybersecurity Resilience Quotient Measuring Security Effectiveness

Jim Boehm The Risk-Based Approach to Cybersecurity

Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks

Scott J. Shapiro

amazon.com
Cover of Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks
Thumbnail of www-x-com-tobi-status-1909231499448401946Thumbnail of www-x-com-tobi-status-1909231499448401946Thumbnail of www-x-com-tobi-status-1909231499448401946Thumbnail of www-x-com-tobi-status-1909231499448401946

Stuart McClure How to Measure Anything in Cybersecurity Risk

Amanda Chicago Lewis Secrets of a ransomware negotiator

Stephen Weigand 2024 cybersecurity forecast: Regulation, consolidation and mothballing SIEMs