Cybersecurity Book Review


Q1 2017

The Cybersecurity Book Review is published quarterly by Cybersecurity Ventures. We provide an updated list of cybersecurity books, our editors choice for the best book, plus insights and commentary on the cyber books we review.


Cybersecurity books arm readers in the war against hackers

stevemorgancvheadshotSteve Morgan, Editor-In-Chief

Menlo Park, Calif. – Jan. 11, 2017

Hacked Again, our editors’ choice for 2017 continues to get rave reviews. A review in Forbes called it The Original Hacker’s Dictionary For Small Business Owners, and a CSO review called it The cybersecurity Bible for small business owners.

In a nutshell – even cybersecurity experts get hacked… and Scott Schober, the author, explains how to fight back.

It takes everyone within a business, from the janitor all the way up to the CEO, to think about security and take actionable steps to stay safe” says Schober. Then he teaches the everyday consumer and business person how to employ simple things they may not be familiar with – for instance two-factor authentication which is available in Gmail and most other popular personal email apps.

Schober is a regular guest on Bloomberg, CBS, CNN and other high profile media. What many viewers might not realize is that his company has also been the victim of multiple cyberattacks – a classic case of the expert attracting the wrong kind of attention from the cybercriminals he’s working to thwart. This makes Hacked Again an entertaining read on what can be a boring topic.

There’s a book for everyone on our Q1 list, so order one today and keep yourself on the cutting edge of cyber.


Hacked Again: It can happen to anyone… even a cybersecurity expert.

“Hacked Again” Hardcover Book With Free T-Shirt

Cyberwarfare has become a very real part of our business, our government, our technology and our culture. We’ve seen terms like hacking, cyber-security and DDoS explode into our popular vernacular and for good reason. Real cyber-attacks have increased exponentially in the past 12 months and the growing fear of them has gone off the charts. Still, many of us do not incorporate simple, best practices when it comes to things like creating passwords and engaging with social media.

Hacked Again details the ins and outs of a cybersecurity expert and CEO of a top wireless security tech firm, Scott Schober, as he struggles to understand the motives and mayhem behind his being hacked. By day, he runs a successful security company and reports on the latest cyber breaches in the hopes of offering solace and security tips to millions of viewers. But Scott begins to realize his worst fears are only a hack away as he falls prey to an invisible enemy.

Order Now: “Hacked Again” Softcover Book

Throughout this book, Scott not only contextualizes the impact of these cyberattacks on our daily lives, but also provides expert insight and a plan of attack for fending off future security breaches. Through tips and advice gained from his own experience, Scott offers hope to others by examining his own security foibles so readers will not have to go through the same cybersecurity struggles themselves.

About the Author: Scott N. Schober is the President and CEO of Berkeley Varitronics Systems (BVS), a forty-year-old New Jersey-based privately held company and leading provider of advanced, world-class wireless test and security solutions. Schober also invented BVS’s cell phone detection tools, used to enforce a “no cell phone policy” in prisons and secure government facilities. Scott is a highly sought-after subject expert on the topic of cybersecurity.


The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age

Order The Hacked World Order

For more than three hundred years, the world wrestled with conflicts that arose between nation-states. Nation-states wielded military force, financial pressure, and diplomatic persuasion to create “world order.” Even after the end of the Cold War, the elements comprising world order remained essentially unchanged.

But 2012 marked a transformation in geopolitics and the tactics of both the established powers and smaller entities looking to challenge the international community. That year, the US government revealed its involvement in Operation “Olympic Games,” a mission aimed at disrupting the Iranian nuclear program through cyberattacks; Russia and China conducted massive cyber-espionage operations; and the world split over the governance of the Internet. Cyberspace became a battlefield.

Cyber conflict is hard to track, often delivered by proxies, and has outcomes that are hard to gauge. It demands that the rules of engagement be completely reworked and all the old niceties of diplomacy be recast. Many of the critical resources of statecraft are now in the hands of the private sector, giant technology companies in particular. In this new world order, cybersecurity expert Adam Segal reveals, power has been well and truly hacked.

About the Author: Adam Segal is Maurice R. Greenberg Senior Fellow for China Studies and Director of the Digital and Cyberspace Policy Program at the Council on Foreign Relations. He is the author of two books on Asia and technology, and his writing has appeared in publications such as Financial Times, Washington Post, Los Angeles Times, Foreign Affairs, Asian Wall Street Journal, and International Herald Tribune. He has appeared as a commentator on several networks including Bloomberg, CNN, NBC, NPR, and the BBC.


Hack-Proof Your Life Now! The New Cybersecurity Rules: Protect your email, computers, and bank accounts from hacks, malware, and identity theft

Order Hack-Proof Your Life Now!

RSA Conference recently reviewed Hack-Proof Your Life Now! and gave the book a thumbs up.

Hack-Proof Your Life Now! demystifies the topic and introduces you to the New Cybersecurity Rules: clear, sensible, and do-able actions that will quickly improve your security.

The authors show you how to measure your Cybersecurity Score and then teach you to improve your safety by acting in three areas: adding more Secrecy to your online life (such as a banking-only email address that hackers won t likely discover), becoming Omniscient over your financial affairs (so you can block identity theft and instantly spot fraud), and adopting principles of Mindfulness to stay safe every day (such as using their 10-Second EMAIL rule to spot dangerous blackmail spam).

Each chapter features a Hack Report story that demonstrates a key security problem many of us face, a New Cybersecurity Rule that reduces or closes that exposure, and a specific Action Step to apply as you build up your defenses and improve your cybersecurity score. An Action Guide in the back provides extra details and helpful resources.

The authors claim that in just a few hours, you can learn to hack-proof your life and fight back against hackers, thieves, and spammers. The RSA Conference reviewer says “The truth is that the best you can do it to try to be hack resistant. And for those that want to do that, Hack-Proof Your Life Now is an excellent book to get them there.”

About the Authors: Sean M. Bailey is the co-creator of the Savvy Cybersecurity training program, an interactive workshop to teach people to boost their online security. He is the co-author, along with Devin Kropp, of Hack-Proof Your Life Now! The New Cybersecurity Rules: Protect your email, computers, and bank accounts from hacks, malware, and identity theft.


Catching the Catfishers: Disarm the Online Pretenders, Predators, and Perpetrators Who Are Out to Ruin Your Life

Buy it now! – Catching the Catfishers

Your online identity is quickly becoming more crucial to your personal and professional success than in-person communications.

But most of us don’t understand this digital Wild West and the dangers that lurk around every corner. Most of us are unaware of the digital bread crumbs that we leave behind with every post, and how easy it is for a person with malicious intent to harm us.

Catching the Catfishers is for every user of social media, teaching you how to: Safely and successfully navigate the online world;
Protect yourself and your children from online predators, cyber stalkers, and chat-room bullies; Detect if someone is not who he or she claims to be; Learn what digital bread crumbs you leave behind and how to clean them up; Control your own online identity;
Use social media to find the right relationship, employee, or anything else you are looking for.

About the Author: Tyler Cohen Wood was previously cyber branch chief for an intelligence agency within the Department of Defense (DoD). She is known in the intelligence, law enforcement, and computer forensics communities for her work with digital forensics and cyber intelligence and has presented as a cyber expert at conferences across the country. She coauthored the textbook Alternate Data Storage Forensics and was featured in Best Damn Cybercrime and Digital Forensics Book Period. She previously worked for the DoD Cyber Crime Center (DC3) as a senior digital forensic analyst, using her expertise in intrusion, malware analysis, and major crimes to bring about many successful prosecutions. Before joining DC3, she was employed at IBM and NASA as a senior forensic analyst.


CISO Desk Reference Guide: A Practical Guide for CISOs

Buy the CISO Desk Reference Guide

A CSO review says CISO Desk Reference Guide belongs on the desk of every Chief Information Security Officer and wannabe.

An easy to use guide written by experienced practitioners for recently-hired or promoted Chief Information Security Officers (CISOs), individuals aspiring to become a CISO, as well as business and technical professionals interested in the topic of cybersecurity, including Chief Technology Officers (CTOs), Chief Information Officers (CIOs), Boards of Directors, Chief Privacy Officers, and other executives responsible for information protection.

As a desk reference guide written specifically for CISOs, this book is intended to be a trusted resource for you, your teams, and your colleagues in the C-suite. The different perspectives can be used as standalone refreshers and the five immediate next steps for each chapter give the reader a robust set of 45 actions based on roughly 100 years of relevant experience that will help you strengthen your cybersecurity programs.

About the Authors: Gary Hayslip is Deputy Director, Chief Information Security Officer (CISO) for the City of San Diego, California. As CISO he is responsible for developing and executing citywide cyber security strategy and leading teams focused on Enterprise Risk Management, Security Engineering, Application Security, Cyber Security Operations, & Cyber Security Resiliency. His mission includes creating a “risk aware” culture that places high value on securing city information resources and protecting personal information entrusted to the City of San Diego. Bill Bonney helps organizations manage risk, with a specific focus on cybersecurity, securing the Internet of Things, and identity management. Matt Stamper is both a Certified Information Systems Auditor (CISA) and a Certified Information Privacy Professional (CIPP-US), with extensive public-company experience.

Steve Morgan is founder and and Editor-In-Chief at Cybersecurity Ventures.

Stay tuned for the Cybersecurity Book Review, Q2 2017 edition, coming in April.


© 2016 Cybersecurity Ventures. All rights reserved. Federal copyright law prohibits unauthorized reproduction of this Report by any means and imposes fines up to $150,000 for violations. Reproduction in whole or in part in any form or medium without expressed written permission of Cybersecurity Ventures is prohibited.