What do you think?
Rate this book
528 pages, Hardcover
First published February 9, 2021
There is a reason why I wrote this book for the lay audience, why I chose to focus primarily on people, not machinery, why I hope it will be “user friendly”. And that is because there are no cyber silver bullets: it is going to take people ot hack our way out of this mess. The technical community will argue I have overgeneralized and over simplified, and indeed, some of the issues and solutions are highly technical and best left to them. But I would also argue that many are not techincla at all, that we wach have a role to play, and that the longer we keep everyday people in the dark, the more we relinquish control of the problem to those with the least incentive to actually solve it
On the one hand, retaining a zero day vulnerability undercuts our collective cybersecurity. On the other, disclosing a zero-day so vendors can patch it undercuts intelligence agencies’ ability to conduct [their own] digital espionage, the military’s ability to carry out offensive cyberattacks and law enforcements to investigate crimes …………. “In the 1970s and 1980s Russia was using technology we did not. We were using technology that they didn’t. If we found a hole in their systems, we exploited it. Period. But now it’s not so cut and dried. We’ve all migrated to the same technology. You can no longer cut a hole in something without picking a hole in security for everyone.