Skip to content Skip to sidebar Skip to footer
Is Your Company Prepared? Vital Cybersecurity and Critical Infrastructure Books and Products Your Team Needs to prepare for cyber warfare attacks

Is Your Company Prepared? Vital Cybersecurity and Critical Infrastructure Books and Products Your Team Needs

Throughout the business world, security breaches have become a constant reminder of the critical need to assess and take action on cybersecurity risks and critical infrastructure vulnerabilities. As we have seen from the damages incurred from the war in Ukraine, it has occurred to many businesses and municipalities around the world that they could be…

Read More

cybersecurity-law-standards-regulations-rothstein-publishing

Free Chapter: Introduction to Cybersecurity Law

This free chapter is an introduction to cybersecurity law from Tari Schreider's new book Cybersecurity Law, Standards and Regulations (2nd Edition) In today’s litigious business world, cyber-related matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations,…

Read More

tony-jaques-rothstein-publishing

Cyber-Crises Are Never “Just an IT Problem”

Cyber-Crises Are Never "Just an IT Problem" by Tony Jaques PhD, Director of Issue Outcomes Pty Ltd, for people who work in issue and crisis management, author of Crisis Counsel: Navigating Legal and Communication Conflict. Online data failures and ransomware attacks are emerging as a leading deadly threat to reputation. However, some organisations still seem to…

Read More

building-effective-cybersecurity-program-rothstein-publishing

Free Excerpt: Building a Cyber Threat, Vulnerability Detection, and Intelligence Capability

This free excerpt from the new book Building an Effective Cybersecurity Program, 2nd Edition, by Tari Schreider C|CISO, CRISC, ITIL® Foundation, MCRP, SSCP will help you to begin Building YOUR Cyber Threat, Vulnerability Detection, and Intelligence Capability. This chapter will help you to: Understand the relationship between threats and vulnerabilities. Understand how to identify and…

Read More