Author: Jason Healey
Publisher:
ISBN: 9780989327404
Category : Cyberspace
Languages : en
Pages : 352
Book Description
Even in its earliest history, cyberspace had disruptions, caused by malicious actors, which have gone beyond being mere technical or criminal problems. These cyber conflicts exist in the overlap of national security and cybersecurity, where nations and non-state groups use offensive and defensive cyber capabilities to attack, defend, and spy on each other, typically for political or other national security purposes. A two-year study, resulting in the new book -- A Fierce Domain: Cyber Conflict, 1986 to 2012 -- has made the following conclusions, which are very different from those that policymakers are usually told: Cyber conflict has changed only gradually over time, making historical lessons especially relevant (though usually ignored). The probability and consequence of disruptive cyber conflicts has been hyped while the impact of cyber espionage is consistently underappreciated. The more strategically significant the cyber conflict, the more similar it is to conflict in the other domains ? with one critical exception.
A Fierce Domain
Author: Jason Healey
Publisher:
ISBN: 9780989327404
Category : Cyberspace
Languages : en
Pages : 352
Book Description
Even in its earliest history, cyberspace had disruptions, caused by malicious actors, which have gone beyond being mere technical or criminal problems. These cyber conflicts exist in the overlap of national security and cybersecurity, where nations and non-state groups use offensive and defensive cyber capabilities to attack, defend, and spy on each other, typically for political or other national security purposes. A two-year study, resulting in the new book -- A Fierce Domain: Cyber Conflict, 1986 to 2012 -- has made the following conclusions, which are very different from those that policymakers are usually told: Cyber conflict has changed only gradually over time, making historical lessons especially relevant (though usually ignored). The probability and consequence of disruptive cyber conflicts has been hyped while the impact of cyber espionage is consistently underappreciated. The more strategically significant the cyber conflict, the more similar it is to conflict in the other domains ? with one critical exception.
Publisher:
ISBN: 9780989327404
Category : Cyberspace
Languages : en
Pages : 352
Book Description
Even in its earliest history, cyberspace had disruptions, caused by malicious actors, which have gone beyond being mere technical or criminal problems. These cyber conflicts exist in the overlap of national security and cybersecurity, where nations and non-state groups use offensive and defensive cyber capabilities to attack, defend, and spy on each other, typically for political or other national security purposes. A two-year study, resulting in the new book -- A Fierce Domain: Cyber Conflict, 1986 to 2012 -- has made the following conclusions, which are very different from those that policymakers are usually told: Cyber conflict has changed only gradually over time, making historical lessons especially relevant (though usually ignored). The probability and consequence of disruptive cyber conflicts has been hyped while the impact of cyber espionage is consistently underappreciated. The more strategically significant the cyber conflict, the more similar it is to conflict in the other domains ? with one critical exception.
A Fierce Domain
Author: Jason Healey
Publisher:
ISBN: 9780989327411
Category : Cyberspace
Languages : en
Pages : 352
Book Description
A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Domain reaches back to look at the major "wake-up calls," the major conflicts that have forced the realization that cyberspace is a harsh place where nations and others contest for superiority. The book identifies the key lessons for policymakers, and, most importantly, where these lessons greatly differ from popular myths common in military and political circles.
Publisher:
ISBN: 9780989327411
Category : Cyberspace
Languages : en
Pages : 352
Book Description
A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Domain reaches back to look at the major "wake-up calls," the major conflicts that have forced the realization that cyberspace is a harsh place where nations and others contest for superiority. The book identifies the key lessons for policymakers, and, most importantly, where these lessons greatly differ from popular myths common in military and political circles.
Cyber Security Policy Guidebook
Author: Jennifer L. Bayuk
Publisher: John Wiley & Sons
ISBN: 1118027809
Category : Computers
Languages : en
Pages : 293
Book Description
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current approaches to the security of cyberspace. It includes thorough descriptions—as well as the pros and cons—of a plethora of issues, and documents policy alternatives for the sake of clarity with respect to policy alone. The Guidebook also delves into organizational implementation issues, and equips readers with descriptions of the positive and negative impact of specific policy choices. Inside are detailed chapters that: Explain what is meant by cyber security and cyber security policy Discuss the process by which cyber security policy goals are set Educate the reader on decision-making processes related to cyber security Describe a new framework and taxonomy for explaining cyber security policy issues Show how the U.S. government is dealing with cyber security policy issues With a glossary that puts cyber security language in layman's terms—and diagrams that help explain complex topics—Cyber Security Policy Guidebook gives students, scholars, and technical decision-makers the necessary knowledge to make informed decisions on cyber security policy.
Publisher: John Wiley & Sons
ISBN: 1118027809
Category : Computers
Languages : en
Pages : 293
Book Description
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current approaches to the security of cyberspace. It includes thorough descriptions—as well as the pros and cons—of a plethora of issues, and documents policy alternatives for the sake of clarity with respect to policy alone. The Guidebook also delves into organizational implementation issues, and equips readers with descriptions of the positive and negative impact of specific policy choices. Inside are detailed chapters that: Explain what is meant by cyber security and cyber security policy Discuss the process by which cyber security policy goals are set Educate the reader on decision-making processes related to cyber security Describe a new framework and taxonomy for explaining cyber security policy issues Show how the U.S. government is dealing with cyber security policy issues With a glossary that puts cyber security language in layman's terms—and diagrams that help explain complex topics—Cyber Security Policy Guidebook gives students, scholars, and technical decision-makers the necessary knowledge to make informed decisions on cyber security policy.
Cyber Insecurity
Author: Richard Harrison
Publisher: Rowman & Littlefield
ISBN: 1442272856
Category : Political Science
Languages : en
Pages : 413
Book Description
Growing dependence on cyberspace for commerce, communication, governance, and military operations has left society vulnerable to a multitude of security threats. Mitigating the inherent risks associated with the use of cyberspace poses a series of thorny public policy problems. In this volume, academics, practitioners from both private sector and government, along with former service members come together to highlight sixteen of the most pressing contemporary challenges in cybersecurity, and to offer recommendations for the future. As internet connectivity continues to spread, this book will offer readers greater awareness of the threats of tomorrow—and serve to inform public debate into the next information age. Contributions by Adrienne Allen, Aaron Brantly, Lauren Boas Hayes, Jane Chong, Joshua Corman, Honorable Richard J. Danzig, Kat Dransfield, Ryan Ellis, Mailyn Fidler, Allan Friedman, Taylor Grossman, Richard M. Harrison, Trey Herr, Drew Herrick, Jonah F. Hill, Robert M. Lee, Herbert S. Lin, Anastasia Mark, Robert Morgus, Paul Ohm, Eric Ormes, Jason Rivera, Sasha Romanosky, Paul Rosenzweig, Matthew Russell, Nathaniel Tisa, Abraham Wagner, Rand Waltzman, David Weinstein, Heather West, and Beau Woods.
Publisher: Rowman & Littlefield
ISBN: 1442272856
Category : Political Science
Languages : en
Pages : 413
Book Description
Growing dependence on cyberspace for commerce, communication, governance, and military operations has left society vulnerable to a multitude of security threats. Mitigating the inherent risks associated with the use of cyberspace poses a series of thorny public policy problems. In this volume, academics, practitioners from both private sector and government, along with former service members come together to highlight sixteen of the most pressing contemporary challenges in cybersecurity, and to offer recommendations for the future. As internet connectivity continues to spread, this book will offer readers greater awareness of the threats of tomorrow—and serve to inform public debate into the next information age. Contributions by Adrienne Allen, Aaron Brantly, Lauren Boas Hayes, Jane Chong, Joshua Corman, Honorable Richard J. Danzig, Kat Dransfield, Ryan Ellis, Mailyn Fidler, Allan Friedman, Taylor Grossman, Richard M. Harrison, Trey Herr, Drew Herrick, Jonah F. Hill, Robert M. Lee, Herbert S. Lin, Anastasia Mark, Robert Morgus, Paul Ohm, Eric Ormes, Jason Rivera, Sasha Romanosky, Paul Rosenzweig, Matthew Russell, Nathaniel Tisa, Abraham Wagner, Rand Waltzman, David Weinstein, Heather West, and Beau Woods.
Cyber War Versus Cyber Realities
Author: Brandon Valeriano
Publisher: Oxford University Press, USA
ISBN: 0190204796
Category : Business & Economics
Languages : en
Pages : 289
Book Description
Cyber conflict is real, but is not changing the dynamics of international politics. In this study, the authors provide a realistic evaluation of the tactic in modern international interactions using a detailed examination of several famous cyber incidents and disputes in the last decade.
Publisher: Oxford University Press, USA
ISBN: 0190204796
Category : Business & Economics
Languages : en
Pages : 289
Book Description
Cyber conflict is real, but is not changing the dynamics of international politics. In this study, the authors provide a realistic evaluation of the tactic in modern international interactions using a detailed examination of several famous cyber incidents and disputes in the last decade.
THE STORY OF A FIERCE, BAD RABBIT
Author: Beatrix Potter
Publisher: Abela Publishing Ltd
ISBN: 8826471517
Category : Juvenile Fiction
Languages : en
Pages : 34
Book Description
The Tale of a Fierce Bad Rabbit tells of a bad rabbit which finds a good rabbit sitting on a bench eating a carrot his mother gave him. Wanting the carrot, he takes it from the good rabbit and scratches him to get it. The good rabbit escapes and hides in a nearby hole. Meanwhile, a hunter notices the bad rabbit sitting on the bench and mistakes him for a bird. He fires at the bad rabbit, but on arrival at the spot finds nothing but a carrot and a rabbit tail on the bench. A little while later, the good rabbit sees the bad rabbit running away without his whiskers and tail! The book was written for Louie Warne, the daughter of Potter's publisher, Harold Warne and was intended for babies and very young children, to teach a moral lesson about the consequences of bad behaviour. ============= TAGS: Fierce, Bad, Rabbit, Beatrix Potter, children’s stories, lake district, Derwentwater, England, bedtime stories, mischievous, animals, behaviour, good, hunter, shoot, narrow escape, hide, steal, eat, carrot, tail, whiskers, moral story, bench, bird, scratch, bully, message, bullying
Publisher: Abela Publishing Ltd
ISBN: 8826471517
Category : Juvenile Fiction
Languages : en
Pages : 34
Book Description
The Tale of a Fierce Bad Rabbit tells of a bad rabbit which finds a good rabbit sitting on a bench eating a carrot his mother gave him. Wanting the carrot, he takes it from the good rabbit and scratches him to get it. The good rabbit escapes and hides in a nearby hole. Meanwhile, a hunter notices the bad rabbit sitting on the bench and mistakes him for a bird. He fires at the bad rabbit, but on arrival at the spot finds nothing but a carrot and a rabbit tail on the bench. A little while later, the good rabbit sees the bad rabbit running away without his whiskers and tail! The book was written for Louie Warne, the daughter of Potter's publisher, Harold Warne and was intended for babies and very young children, to teach a moral lesson about the consequences of bad behaviour. ============= TAGS: Fierce, Bad, Rabbit, Beatrix Potter, children’s stories, lake district, Derwentwater, England, bedtime stories, mischievous, animals, behaviour, good, hunter, shoot, narrow escape, hide, steal, eat, carrot, tail, whiskers, moral story, bench, bird, scratch, bully, message, bullying
Bytes, Bombs, and Spies
Author: Herbert Lin
Publisher: Brookings Institution Press
ISBN: 0815735480
Category : Political Science
Languages : en
Pages : 440
Book Description
“We are dropping cyber bombs. We have never done that before.”—U.S. Defense Department official A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently: A computer virus is unleashed that destroys centrifuges in Iran, slowing that country’s attempt to build a nuclear weapon. ISIS, which has made the internet the backbone of its terror operations, finds its network-based command and control systems are overwhelmed in a cyber attack. A number of North Korean ballistic missiles fail on launch, reportedly because their systems were compromised by a cyber campaign. Offensive cyber operations like these have become important components of U.S. defense strategy and their role will grow larger. But just what offensive cyber weapons are and how they could be used remains clouded by secrecy. This new volume by Amy Zegart and Herb Lin is a groundbreaking discussion and exploration of cyber weapons with a focus on their strategic dimensions. It brings together many of the leading specialists in the field to provide new and incisive analysis of what former CIA director Michael Hayden has called “digital combat power” and how the United States should incorporate that power into its national security strategy.
Publisher: Brookings Institution Press
ISBN: 0815735480
Category : Political Science
Languages : en
Pages : 440
Book Description
“We are dropping cyber bombs. We have never done that before.”—U.S. Defense Department official A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently: A computer virus is unleashed that destroys centrifuges in Iran, slowing that country’s attempt to build a nuclear weapon. ISIS, which has made the internet the backbone of its terror operations, finds its network-based command and control systems are overwhelmed in a cyber attack. A number of North Korean ballistic missiles fail on launch, reportedly because their systems were compromised by a cyber campaign. Offensive cyber operations like these have become important components of U.S. defense strategy and their role will grow larger. But just what offensive cyber weapons are and how they could be used remains clouded by secrecy. This new volume by Amy Zegart and Herb Lin is a groundbreaking discussion and exploration of cyber weapons with a focus on their strategic dimensions. It brings together many of the leading specialists in the field to provide new and incisive analysis of what former CIA director Michael Hayden has called “digital combat power” and how the United States should incorporate that power into its national security strategy.
The Darkening Web
Author: Alexander Klimburg
Publisher: Penguin
ISBN: 0698402766
Category : Computers
Languages : en
Pages : 450
Book Description
“A prescient and important book. . . . Fascinating.”—The New York Review of Books No single invention of the last half century has changed the way we live now as much as the Internet. Alexander Klimburg was a member of the generation for whom it was a utopian ideal turned reality: a place where ideas, information, and knowledge could be shared and new freedoms found and enjoyed. Two decades later, the future isn’t so bright any more: increasingly, the Internet is used as a weapon and a means of domination by states eager to exploit or curtail global connectivity in order to further their national interests. Klimburg is a leading voice in the conversation on the implications of this dangerous shift, and in The Darkening Web, he explains why we underestimate the consequences of states’ ambitions to project power in cyberspace at our peril: Not only have hacking and cyber operations fundamentally changed the nature of political conflict—ensnaring states in a struggle to maintain a precarious peace that could rapidly collapse into all-out war—but the rise of covert influencing and information warfare has enabled these same global powers to create and disseminate their own distorted versions of reality in which anything is possible. At stake are not only our personal data or the electrical grid, but the Internet as we know it today—and with it the very existence of open and democratic societies. Blending anecdote with argument, Klimburg brings us face-to-face with the range of threats the struggle for cyberspace presents, from an apocalyptic scenario of debilitated civilian infrastructure to a 1984-like erosion of privacy and freedom of expression. Focusing on different approaches to cyber-conflict in the US, Russia and China, he reveals the extent to which the battle for control of the Internet is as complex and perilous as the one surrounding nuclear weapons during the Cold War—and quite possibly as dangerous for humanity as a whole. Authoritative, thought-provoking, and compellingly argued, The Darkening Web makes clear that the debate about the different aspirations for cyberspace is nothing short of a war over our global values.
Publisher: Penguin
ISBN: 0698402766
Category : Computers
Languages : en
Pages : 450
Book Description
“A prescient and important book. . . . Fascinating.”—The New York Review of Books No single invention of the last half century has changed the way we live now as much as the Internet. Alexander Klimburg was a member of the generation for whom it was a utopian ideal turned reality: a place where ideas, information, and knowledge could be shared and new freedoms found and enjoyed. Two decades later, the future isn’t so bright any more: increasingly, the Internet is used as a weapon and a means of domination by states eager to exploit or curtail global connectivity in order to further their national interests. Klimburg is a leading voice in the conversation on the implications of this dangerous shift, and in The Darkening Web, he explains why we underestimate the consequences of states’ ambitions to project power in cyberspace at our peril: Not only have hacking and cyber operations fundamentally changed the nature of political conflict—ensnaring states in a struggle to maintain a precarious peace that could rapidly collapse into all-out war—but the rise of covert influencing and information warfare has enabled these same global powers to create and disseminate their own distorted versions of reality in which anything is possible. At stake are not only our personal data or the electrical grid, but the Internet as we know it today—and with it the very existence of open and democratic societies. Blending anecdote with argument, Klimburg brings us face-to-face with the range of threats the struggle for cyberspace presents, from an apocalyptic scenario of debilitated civilian infrastructure to a 1984-like erosion of privacy and freedom of expression. Focusing on different approaches to cyber-conflict in the US, Russia and China, he reveals the extent to which the battle for control of the Internet is as complex and perilous as the one surrounding nuclear weapons during the Cold War—and quite possibly as dangerous for humanity as a whole. Authoritative, thought-provoking, and compellingly argued, The Darkening Web makes clear that the debate about the different aspirations for cyberspace is nothing short of a war over our global values.
Milk and Filth
Author: Carmen Giménez Smith
Publisher: University of Arizona Press
ISBN: 0816599246
Category : Poetry
Languages : en
Pages : 81
Book Description
National Book Critics Circle Award Finalist Adding to the Latina tradition, Carmen Giménez Smith, politically aware and feminist-oriented, focuses on general cultural references rather than a sentimental personal narrative. She speaks of sexual politics and family in a fierce, determined tone voracious in its opinions about freedom and responsibility. The author engages in mythology and art history, musically wooing the reader with texture and voice. As she references such disparate cultural figures as filmmaker Lars Von Trier, Annie from the film Annie Get Your Gun, Nabokov’s Lolita, Facebook entries and Greek gods, they appear as part of the poet’s cultural critique. Phrases such as “the caustic domain of urchins” and “the gelatin shiver of tea’s surface” take the poems from lyrical images to comic humor to angry, intense commentary. On writing about “downgrading into human,” she says, “Then what? Amorality, osteoporosis and not even a marble estuary for the ages.” Giménez Smith’s poetic arsenal includes rapier-sharp wordplay mixed with humor, at times self-deprecating, at others an ironic comment on the postmodern world, all interwoven with imaginative language of unexpected force and surreal beauty. Revealing a long view of gender issues and civil rights, the author presents a clever, comic perspective. Her poems take the reader to unusual places as she uses rhythm, images, and emotion to reveal the narrator’s personality. Deftly blending a variety of tones and styles, Giménez Smith’s poems offer a daring and evocative look at deep cultural issues.
Publisher: University of Arizona Press
ISBN: 0816599246
Category : Poetry
Languages : en
Pages : 81
Book Description
National Book Critics Circle Award Finalist Adding to the Latina tradition, Carmen Giménez Smith, politically aware and feminist-oriented, focuses on general cultural references rather than a sentimental personal narrative. She speaks of sexual politics and family in a fierce, determined tone voracious in its opinions about freedom and responsibility. The author engages in mythology and art history, musically wooing the reader with texture and voice. As she references such disparate cultural figures as filmmaker Lars Von Trier, Annie from the film Annie Get Your Gun, Nabokov’s Lolita, Facebook entries and Greek gods, they appear as part of the poet’s cultural critique. Phrases such as “the caustic domain of urchins” and “the gelatin shiver of tea’s surface” take the poems from lyrical images to comic humor to angry, intense commentary. On writing about “downgrading into human,” she says, “Then what? Amorality, osteoporosis and not even a marble estuary for the ages.” Giménez Smith’s poetic arsenal includes rapier-sharp wordplay mixed with humor, at times self-deprecating, at others an ironic comment on the postmodern world, all interwoven with imaginative language of unexpected force and surreal beauty. Revealing a long view of gender issues and civil rights, the author presents a clever, comic perspective. Her poems take the reader to unusual places as she uses rhythm, images, and emotion to reveal the narrator’s personality. Deftly blending a variety of tones and styles, Giménez Smith’s poems offer a daring and evocative look at deep cultural issues.
The Cyber Threat
Author: Bob Gourley
Publisher: Createspace Independent Pub
ISBN: 9781501065149
Category : True Crime
Languages : en
Pages : 94
Book Description
What do business leaders need to know about the cyber threat to their operations? Author Bob Gourley, the Director of Intelligence in the first Department of Defense cyber defense organization and lead for cyber intelligence at Cognitio Corp shares lessons from direct contact with adversaries in cyberspace in a new book titled “The Cyber Threat” (newly updated for 2015) Understanding the Cyber Threat is critical to preparing your defenses prior to attack and also instrumental in mounting a defense during attack. Reading this book will teach you things your adversaries wish you did not know and in doing so will enhance your ability to defend against cyber attack. The book explores the threat and the role of the emerging discipline of Cyber Intelligence as a way of making threat information actionable in support of your business objectives. "When I'm researching my own books, I always turn to Bob Gourley. I make diasasters up. He's seen them for real. And most important, he knows how to stop them. Read this. It'll scare you, but also protect you." · Brad Meltzer, #1 bestselling author of The Inner Circle "The insights Bob provides in The Cyber Threat are an essential first step in developing your cyber defense solution." · Keith Alexander, General, USA (Ret), Former Director, NSA, and Commander, US Cyber Command "There are no excuses anymore. Trying to run a business without awareness of the cyber threat is asking to be fired. The Cyber Threat succinctly articulates insights you need to know right now." · Scott McNealy, Co-founder and Former CEO, Sun Microsystems and Chairman Wayin. "Vaguely uneasy about your cyber security but stumped about what to do? Easy. READ THIS BOOK! "The Cyber Threat" will open your mind to a new domain and how you can make yourself safer in it." · Michael Hayden, General, USAF (Ret), Former Director, NSA and Director, CIA "Bob Gourley was one of the first intelligence specialists to understand the complex threats and frightening scope, and importance of the cyber threat. His book can give you the edge in what has emerged as one of the most compelling, mind-bending and fast moving issues of our time." · Bill Studeman, Admiral, USN (Ret), Former Director, NSA and Deputy Director, CIA "The Cyber Threat captures insights into dynamic adversaries that businesses and governments everywhere should be working to defeat. Knowing the threat and one's own defenses are the first steps in winning this battle." · Mike McConnell, Admiral, USN (Ret), Former Director of National Intelligence and Director, NSA Written by a career intelligence professional and enterprise CTO, this book was made for enterprise professionals including technology and business executives who know they must mitigate a growing threat.
Publisher: Createspace Independent Pub
ISBN: 9781501065149
Category : True Crime
Languages : en
Pages : 94
Book Description
What do business leaders need to know about the cyber threat to their operations? Author Bob Gourley, the Director of Intelligence in the first Department of Defense cyber defense organization and lead for cyber intelligence at Cognitio Corp shares lessons from direct contact with adversaries in cyberspace in a new book titled “The Cyber Threat” (newly updated for 2015) Understanding the Cyber Threat is critical to preparing your defenses prior to attack and also instrumental in mounting a defense during attack. Reading this book will teach you things your adversaries wish you did not know and in doing so will enhance your ability to defend against cyber attack. The book explores the threat and the role of the emerging discipline of Cyber Intelligence as a way of making threat information actionable in support of your business objectives. "When I'm researching my own books, I always turn to Bob Gourley. I make diasasters up. He's seen them for real. And most important, he knows how to stop them. Read this. It'll scare you, but also protect you." · Brad Meltzer, #1 bestselling author of The Inner Circle "The insights Bob provides in The Cyber Threat are an essential first step in developing your cyber defense solution." · Keith Alexander, General, USA (Ret), Former Director, NSA, and Commander, US Cyber Command "There are no excuses anymore. Trying to run a business without awareness of the cyber threat is asking to be fired. The Cyber Threat succinctly articulates insights you need to know right now." · Scott McNealy, Co-founder and Former CEO, Sun Microsystems and Chairman Wayin. "Vaguely uneasy about your cyber security but stumped about what to do? Easy. READ THIS BOOK! "The Cyber Threat" will open your mind to a new domain and how you can make yourself safer in it." · Michael Hayden, General, USAF (Ret), Former Director, NSA and Director, CIA "Bob Gourley was one of the first intelligence specialists to understand the complex threats and frightening scope, and importance of the cyber threat. His book can give you the edge in what has emerged as one of the most compelling, mind-bending and fast moving issues of our time." · Bill Studeman, Admiral, USN (Ret), Former Director, NSA and Deputy Director, CIA "The Cyber Threat captures insights into dynamic adversaries that businesses and governments everywhere should be working to defeat. Knowing the threat and one's own defenses are the first steps in winning this battle." · Mike McConnell, Admiral, USN (Ret), Former Director of National Intelligence and Director, NSA Written by a career intelligence professional and enterprise CTO, this book was made for enterprise professionals including technology and business executives who know they must mitigate a growing threat.