article thumbnail

‘Countdown to Zero Day’ By Kim Zetter – Book Review

Plan B Consulting

The book is all about the virus that sabotaged Iran’s nuclear efforts and shows how the existence of this malware can have the same destructive capability as a kinetic attack! There are a number of lessons and learning points I took away from Kim Zetter ‘s book. The final chapter looks at the morality of the attack.

Malware 52
article thumbnail

‘Countdown to Zero Day’ By Kim Zetter – Book Review

Plan B Consulting

The book is all about the virus that sabotaged Iran’s nuclear efforts and shows how the existence of this malware can have the same destructive capability as a kinetic attack! There are a number of lessons and learning points I took away from the book. The final chapter looks at the morality of the attack.

Malware 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Mastering Effective Cybersecurity Research: Going From Data to Actionable Insights

FS-ISAC

If we are more technical, we want to read about the latest malware, while business-focused individuals lean in on industry trends. Each of these objectives has unique questions and requires varied sources and metrics to provide comprehensive answers.

article thumbnail

Understanding What Dark Web Scans Are & How They Can Protect You

Erwood Group

The dark web is an unindexed part of the internet. In fact, the dark web, which is a subset of the deep web makes up the larger portion of the overall internet. Estimates place the size of the deep web somewhere between 96% and 99% of the internet, according to CSOonline.com. What is the Dark Web? What is the Dark Web?

Banking 59
article thumbnail

Beware of the self-wiggling mouse – Water industry & Cyber

Plan B Consulting

Hacking not considered an issue These were the infancy days of the internet, and external hacking of the system was not really considered an issue. As the telemetry system can be reached via the internet, the threat is not from a stolen laptop, but a hacker from anywhere in the world gaining access to the system.

article thumbnail

Beware of the self-wiggling mouse – Water industry & Cyber

Plan B Consulting

These were the infancy days of the internet, and external hacking of the system was not really considered an issue. As the telemetry system can be reached via the internet, the threat is not from a stolen laptop, but a hacker from anywhere in the world gaining access to the system. Hacking not considered an issue.

article thumbnail

Data Privacy Week 2024: The Definitive Roundup of Expert Quotes

Solutions Review

My experiences and insights, as shared in my book “Top 25 IT KPI Metrics You Should Be Tracking As a Business Owner,” align with these views, highlighting the importance of treating data privacy as a continuous journey. Many users are not aware of how this data will be used.