description: protecting information by mitigating information risks
229 results
by Zoë Schiffer · 13 Feb 2024 · 343pp · 92,693 words
Davis and Michael Montano, the head of engineering, as he began to reshape the executive ranks. The following month, Rinki Sethi, the company’s chief information security officer, and Peiter “Mudge” Zatko, the head of security, were also cut. The company said Mudge was fired “for ineffective leadership and poor performance,” but
…
are you?” he asked. Then he pinged a few higher-ups to see what he should do. They told him that Stanley, who worked in Information Security at SpaceX, was part of Musk’s inner circle. “If he says we have to do this, we have to do this,” one explained. Doherty
…
order, Twitter needed to have a designated owner for each of its privacy controls, which included database safeguards for sensitive user data and policies around information security. Unfortunately, Twitter no longer had anyone responsible for about 37 percent of Twitter’s privacy program controls, according to Damien Kieran, then the chief privacy
…
officer, per a deposition with the FTC. Lea Kissner, then the chief information security officer, said that half the controls in the information security program did not have a designated owner. Kissner told the Department of Justice that the layoffs impaired Twitter’s ability to
…
helped build Twitter’s security apparatus, it was confounding. “Twitter folks, seriously, I left some design docs somewhere,” wrote Lea Kissner, Twitter’s former chief information security officer, on Bluesky. “Please use them.” CHAPTER 61 “Did Your Brain Fall Out of Your Head?” Before Musk bought Twitter, the company’s commitment to
…
“Information disaggregated by ‘each department, division, and/or team,’ regardless of whether the work done by these units had anything to do with privacy or information security.” Twitter responded by asking a US District Court in San Francisco to end the consent order. “The Court should not permit the FTC to continue
…
’s takeover, the project was set to roll out in the fall of 2022. Then Musk laid off half the company, and Twitter’s chief information security officer, Lea Kissner, resigned. Seven months later, it still wasn’t done. “Twitter is unable to automatically erase/scrub the entirety of a user’s
…
Kieran’s claim: “Product and engineering teams plan, develop, and launch new products or changes to existing products’ functionalities without review from legal, privacy, and information security teams, which could result in legal or regulatory fines and penalties and direct violation of the FTC Consent Order.” Even the shutdown of the Sacramento
…
. Engineers posted frantic updates in Slack. “FYI some large creators complaining because rate limit affecting paid subscription posts,” one said. Christopher Stanley, the head of information security, wrote with dismay that rate limits could apply to people refreshing the app to get news about a mass shooting or a major weather event
…
,” CNN, March 8, 2023, cnn.com/2023/03/08/tech/ftc-twitter-privacy-investigation/index.html. GO TO NOTE REFERENCE IN TEXT “with privacy or information security”: “The Weaponization of the Federal Trade Commission: An Agency’s Overreach to Harass Elon Musk’s Twitter,” Committee on the Judiciary and the Select Subcommittee
by David G. W. Birch and Victoria Richardson · 28 Apr 2024 · 249pp · 74,201 words
not be your best friend. Arvind Narayanan, a computer science professor at Princeton, wrote on social media about asking ChatGPT some basic questions related to information security that he had posed to students in an exam. The bot responded with answers that sounded plausible but were actually nonsense, and, as he pointed
by Andy Oram and John Viega · 15 Dec 2009 · 302pp · 82,233 words
The Single Machine Is Here Connecting People, Process, and Technology: The Potential for Business Process Management Social Networking: When People Start Communicating, Big Things Change Information Security Economics: Supercrunching and the New Rules of the Grid Platforms of the Long-Tail Variety: Why the Future Will Be Different for Us All Conclusion
…
of the organization’s implementation of controls that protect the security of IT assets. Here are some sample questions: • Does the organization have formally documented information security policies and procedures? • Are employees required to follow these policies and procedures? • Does the organization have an identity and access management process that governs
…
very little incentive structure to reward good behavior. The impact of reward structure on improving performance is well understood. It is perhaps time for the information security community to stop relying solely on compliance and start investigating how we can improve overall data protection competency by rewarding good behavior. This should include
…
merchant and only for the authorized amount of the recurring charge. This mitigates a great deal of fraud. Broken Incentives A common economic issue in information security involves broken incentives. Incentives are a critical factor in any system dealing with multiple parties, particularly where that system depends on people with free choice
…
rules in place to address market failures such as monopolies, pollution, lack of alignment with the “greater good,” or in this case a lack of information security. Forms of regulation in this area include the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach-Bliley Financial Services Modernization Act (GLBA), the
…
debate ethical medical research and cry foul about how human cloning could change the planet, but they may well be focused on the wrong problem. Information security and its relationship with technology, of course, dates back through history. The Egyptians carved obfuscated hieroglyphs into monuments; the Spartans used sticks and wound
…
programs. 148 CHAPTER NINE analyze DNA for complex patterns of hereditary diseases, predicting entire populations’ hereditary probability to inherit genetic traits. In stark contrast, the information security management programs that are supposed to protect trillions of dollars of assets, keep trade secrets safe from corporate espionage, and hide military plans from the
…
People, Process, and Technology: The Potential for Business Process Management” on page 154 • “Social Networking: When People Start Communicating, Big Things Change” on page 158 • “Information Security Economics: Supercrunching and the New Rules of the Grid” on page 162 • “Platforms of the Long-Tail Variety: Why the Future Will Be Different for
…
, and business activity monitoring tools—will dramatically change both the ways we need to view the security of modern business software and how we approach information security management itself. Diffuse Security in a Diffuse World In a flat world, workforces are decentralized. Instead of being physically connected in offices or factories
…
commonly dehydrated and rehydrated as technologies evolve to automatically discover new services. The complexity and impact of this way of working will only increase. For information security, of course, this brings significant new challenges. Over thousands of years, humans have associated security with physical location. They have climbed hills, built castles
…
include rocket science in its future), but it’s doing just that: realigning technology to support the business. In addition to offering radical improvements to information security by opening new markets, BPM can deliver even more powerful changes through its effects on the evolution of the science behind security. The Business Process
…
with what I see as its most important potential effects on security: 1. Understand and Document the Process Security effect: Implement a structured and effective information security program 2. Understand Metrics and Objectives Security effect: Understand success criteria and track their effectiveness 3. Model and Automate Process Security effect: Improve efficiency and
…
and objectives; model and automate your process; understand and implement your process; and optimize and improve the process, you will implement a structured and effective information security program, understand the success criteria and track effectiveness, improve efficiency and reduce cost, produce fast and accurate compliance, audit data, and ultimately do more with
…
less and reduce the cost of security. This is significant! While the topic of BPM for information security could of course fill a whole book—when you consider business process modeling, orchestration, business rules design, and business activity modeling—it would be remiss
…
platforms like these really offer little for corporations today, let alone for security professionals, but this will change. And when it changes, the implications for information security could be significant. If social networking today is about people-to-people networking, social networking tomorrow may well be about business-to-business. For several
…
formed all over the world to serve more specific purposes. But in the grand scheme of things, business-to-business social networking is very limited. Information security is rarely a competitive advantage (in fact, studies of stock price trends after companies have suffered serious data breaches indicate a surprisingly low correlation, so
…
long tails and idea viruses Decentralized connectivity Trading platform Business intelligence Business peer groups Aligned to business goals Platform that connects people, process, and technology Information security as a business discipline Useful business-oriented services Focus on the whole space (information) and not just IT security Facilitate and allow modern business models
…
exploit niche products and services previously thought to be uneconomical include iTunes, WordPress, YouTube, Facebook, and many other Internet economy trends. I fundamentally believe that information security is a long-tail market, and I offer three criteria to support this statement: • Every business has multiple processes. • Processes that are similar in
…
(more knowledgeable and more in tune) than an observer. Much as blogging tools have democratized publishing and GarageBand has democratized music production, tools will democratize information security. In fact, blogging has already had a significant effect, allowing thousands of security professionals to offer opinions and data. The most far-reaching change will
…
are key components of what is called the reputation economy. These filters help people find things and present them in a contextually useful way. Few information security tools today attempt to provide contextually useful information. What we will likely see are tools that merge their particular contributions with reputation mechanisms. A code
…
best products and services possible, and it is time we took the security element seriously and clearly faced up to the risks of not doing information security properly. I strongly believe that a well-designed and consistently implemented system development lifecycle applied to all projects will provide significant benefits in improved security
…
projects in a “proof of concept” mode. This is a common approach that companies take when starting a secure software program. But Acme’s chief information security officer (yours truly) read a book (Software Security: Building Security In, published by Addison-Wesley) on software security written by a recognized authority, Gary
…
of law involving responsibility and negligence, including legal analysis, risk assessment, and liability exposure, necessarily involve balance. As is often the case, the balance in information security tends to focus on competing factors that contribute to an overall security calculus. Unlike other areas of risk assessment (such as life insurance or medical
…
insurance, where actuarial data allows strong corollaries to be calculated), information security cannot draw on a significant amount of historical information. This is especially true when considering the legal aspects of security. Nevertheless, we can still take
…
Code) places requirements on any “business that conducts business in California” that “owns † See http://www.abanet.org/scitech/ec/isc. ‡ See American Bar Association, Information Security Committee, Section of Science and Technology Law, Digital Signature Guidelines, available at http://www.abanet.org/scitech/ec/isc/digital_signature.html (Aug. 1, 1996
…
unreported. How can this be? The embarrassment of disclosure that a company or agency was “hacked,” or the fear of lost business based upon shoddy information security practices being disclosed overrides the need to inform the affected persons. In other instances, credit card issuers, telephone companies and internet service providers, along with
…
implementing security. Depending on whom you ask, the passage of infosecurity laws and regulations can be viewed as one of the most important trends affecting information security or, conversely, the cause of the dangerous misperception that compliance equals security. This double-edged sword can wind up perpetuating unwarranted complacency. Although regulatory
…
compliance certainly is a driver that must be taken into account in the implementation of your information security plan, it should be a result, not a goal. Imagine back to the days before SOX, HIPAA, GLBA, and data breach disclosure laws. Numerous
…
nonregulatory sources of guidance and several information security standards provided the direction needed for most information security professionals. Various events, however, led to the passage of the aforementioned laws. From a glass-half-full perspective, the laws have
…
has arguably improved security over the previous status quo. For companies outside those silos, state laws requiring data breach notification and reasonable security measures brought information security to the forefront. Thus, regulation can be viewed as the catalyst needed to get many organizations focused on security. Hence, more regulation is purportedly
…
Pragmatic security approaches recognize the value proposition in maintaining a secure network, understand the consequences of not having adequate security, and embrace the implementation of information security from the top of the organization down. In effect, pragmatic security creates a culture of security. A similar pragmatic recognition of compliance and ethics exists
…
of business units. These assets include Orbitz, CheapTickets, eBookers, Away.com, HotelClub, RatesToGo, AsiaHotels, and Orbitz for Business. With over 16 years of experience in information security and technology, Ed has been involved in protecting information assets at several Fortune 500 companies. Prior to joining Orbitz, Ed served as VP of Corporate
…
book author. He cowrote Security Warrior (http: //oreilly.com/catalog/9780596005450/index.html) (O’Reilly) and contributed to Know Your Enemy, Second Edition (Addison-Wesley), Information Security Management Handbook (Auerbach), Hacker’s Challenge 3 (McGraw-Hill), PCI Compliance (Syngress), OSSEC HIDS (Syngress), and other books. Anton also publishes numerous papers on a
…
Nath & Rosenthal LLP, where he is a member of the Internet, Communications & Data Protection practice group and the Venture Technology Group. He counsels clients on information security, privacy, IT licensing, and patents, dealing with such issues as Public Key Infrastructure (PKI), digital and electronic signatures, federated identity, HIPAA, GrammLeach-Bliley, Sarbanes-
…
Oxley, state and federal information security laws, identity theft, and security breaches. Randy was a commissioner on the Commission on Cyber Security for the 44th Presidency and has been recognized as
…
Club, 50 backend control systems, 18–20 backward compatibility LANMAN password encoding, 6 learned helplessness and, 2 legacy systems, 7 PGP issues, 117 balance in information security, 202–207 banking industry (see financial institutions) banking trojans, 141, 249 banner ads exploit-laden, 89–92, 143 honeyclients and, 143 banner farms, 98,
…
Business Process Management (see BPM) Business Process Management Initiative (BPMI), 157 business rules engines, 157 C California AB 1950, 207 California SB 1386 balance in information security, 203–205 on data sharing, 36, 38 on reporting breaches, 55 passage of, 207 call options, 40 Callas, Jon, 107–130 Capture-HPC honeyclient,
…
affiliate network, 102 Commission on Cyber Security for the 44th Presidency, 201 Common Vulnerabilities and Exposures (CVE) database, 131 communication cyber underground infrastructure, 65, 66 information security and, 207–211 Comprehensive National Cybersecurity Initiative (CNCI), 202 Computer Fraud and Abuse Act (CFAA), 207 confidentiality of data, 85 confirmation traps defined, 10 intelligence
…
certificates, 110 directionality, 227 distributed denial of service (see DDoS) distribution channels, 166 DKIM email-authentication, 124 Dobbertin, Hans, 119 doing the right thing in information security, 211– 212 drop accounts, 70 Drucker, Peter, 163 DSG (Digital Signature Guidelines), 202–203 DSW Shoe Warehouse, 50 Dublin City University, 144 Dunphy, Brian,
…
227 SQL Slammer worm, 225 InCtrl change tracker, 92 information dealers defined, 64 IRC data exchange, 67 malware producers and, 64 sources of information, 68 information security as long tail market, 165–167 balance in, 202–207 basic concepts, 200 cloud computing, 150–154 communication considerations, 207–211 connecting people and processes
…
and, 158–162 strict scrutiny, 252–254 suggested practices, 257 supercrunching, 153, 162–164 taking a security history, 44–46 web services, 150–154 Information Security Economics, 162–164 Information Security Group, 168 injected iFrames, 69 International Data Encryption Algorithm (IDEA), 117, 118 International Tariff on Arms Regulations (ITAR), 3 Internet Explorer exploit-based
…
-commerce security and, 74 end-of-life upgrades, 2, 7 password security and, 4–6 legal considerations balance in information security, 202–207 communication and information security, 207– 211 doing the right thing, 211–212 information security concepts, 200 log handling, 223 organizational culture, 200–202 value of logs, 214 Levy, Steven, 119 LinkShare affiliate
by Barton Gellman · 20 May 2020 · 562pp · 153,825 words
badge for a blue one, and received agency identification number 2339176. He was a full-time employee now, soon to be deployable as a telecommunications information security officer. The official designation was TISO, but agency folk, old-timers especially, called the job “commo.” Snowden swallowed a five-figure pay cut to take
…
” in an effort to elicit information about the NSA documents, or to steal the digital files. The two of us talked through a well-known information security scenario known as the evil maid attack, which relies on brief physical access to a computer to steal its encryption credentials. The Snowden files, as
…
taught a Princeton class called “Secrecy, Accountability, and the National Security State.” Most of my guest speakers—including Mike Levin, a former NSA chief of information security who had once called me a “traitor” on film—agreed by the end of our three-hour seminars that there might be circumstances in which
…
Director of National Intelligence, March 30, 2012, https://perma.cc/M9W2-SY3Z. For a slightly more user-friendly guide, see “Marking Classified National Security Information,” Information Security Oversight Office, Revision 4, January 2018, https://perma.cc/6N2K-2SZB. surveillance program created by Dick Cheney: See Gellman, Angler, chapters 11 and 12. “Wish
…
://arstechnica.com/civis/viewtopic.php?f=10&t=868906&p=16121406#p16121406. The wish came true: Family confidant, interview with author, December 10, 2015. telecommunications information security officer: For the contemporary CIA job description, see https://web.archive.org/web/20100324173658/https://www.cia.gov/careers/opportunities/support-professional/copy_of_telecommunications
…
Real Edward Snowden.” Runa Sandvik: Snowden (as “Cincinnatus”) to Sandvik, Novmber 18, 2012, copy on file with author. At this writing, Sandvik is chief of information security at the New York Times. Her personal website is https://encrypted.cc. the Tor Project: I discussed Tor in chapters 1 and 2. See www
…
“no foreign distribution.” The designation X1 was a claim of exemption from automatic declassification review after ten years. The governing rule at the time was Information Security Oversight Office, “ISOO Directive No. 1,” October 13, 1995, archived at https://fas.org/sgp/isoo/isoodir1.html. Updated rules, which ended the X-series
…
exemptions, came in Information Security Oversight Office, “Marking Classified National Security Information,” December 2010, at www.archives.gov/files/isoo/training/marking-booklet.pdf. I am indebted to Steven Aftergood
by Jonathan Zittrain · 27 May 2009 · 629pp · 142,393 words
, to some, this is progress. It allows scholars and companies alike to say that the user has been put on notice of privacy practices. Personal information security is another area of inquiry, and there have been some valuable policy innovations in this sphere. For example, a 2003 California law requires firms that
…
–5, 222, 233–34; and industry self-regulation, 203; involuntary celebrities, 210–14; “just deal with it,” 111–12; and peer production, 206–16; personal information security, 203–4; Privacy 1.0, 201–5, 208, 215, 216, 222, 232; Privacy 2.0, 205–34; as proxies for other limitations, 112; public vs
by Scott J. Shapiro · 523pp · 154,042 words
would buy only from vendors who had received a high enough security rating from the NSA. In no other way, the military thought, could their information security needs be met. The story of the VAX VMM Security Kernel demonstrates the pitfalls of this strategy. In 1979, Major Roger Schell led a team
…
first Lord of the Rings movie was released three months after 9/11.) American demands for physical security had led to a loss in their information security. Trustworthy Computing In 2002, Bill Gates penned another memo, titled “Trustworthy Computing,” in which he expressed anxiety about the loss of consumer confidence in Microsoft
…
of applications and services. There is no such thing as “solving” the “problem” of cybersecurity. There are only trade-offs between different aspects of our information security, and between our information and physical securities. We have to balance the costs and benefits before we decide whether and how to patch upcode. For
…
always been able to do. Rather, they are novel because they can do what bombs have never been able to do, namely, to affect the information security of the target. Malware can steal data; it can change data; it can block data. Fancy Bear implanted X-Agent on DNC servers, not Novichok
…
tried to kill double agent Sergei Skripal. Fancy Bear was trying to steal information. Because cyberweapons enjoy a functional duality—they can affect physical and information security—it would be a mistake to apply the laws of war to all forms of cyber-conflict. If a state uses malware to produce destructive
…
eye. Homo sapiens have had 150,000 years to think through rules for protecting physical security. Now our species must turn to developing rules for information security, which will take generations more to hammer out. Once we reject solutionism, we will see how much political work is left to do. In 1929
…
upcode controls downcode, and not only because downcode uses the data generated by upcode. We need to deliberate and debate the rules that regulate our information security because we are morally autonomous agents. We contain our own code, but we also put it there. Unlike the 20 billion digital devices in the
…
Quarterly 33, no. 5 (2016): 890–911; Ross Anderson et al., “Measuring the Changing Cost of Cybercrime.” The 18th Annual Workshop on the Economics of Information Security, 2019, https://www.repository.cam.ac.uk/handle/1810/294492. $600 billion to $6 trillion: Compare James Lewis, “Economic Impact of Cybercrime—No Slowing Down
…
pass through. When the Morris worm hit, military administrators disconnected those bridges, thereby containing the damage. provide logical proofs: MacKenzie and Pottinger, “Mathematics, Technology,” 46. information security needs: See, e.g., Michael Warner, “Cybersecurity: A Pre-history,” Intelligence and National Security, 2012; Stephen B. Lipner, “The Birth and Death of the Orange
…
-making-of-the-first-computer-virus-the-pakistani-brain-32296. doing doctoral research: As Cohen describes his eureka moment: “I was in Len Adleman’s information security class at USC when the proverbial light bulb turned on. I immediately knew that a virus could penetrate and be used to exploit any connected
…
a “reflection” attack. See generally Todd Booth and Karl Andersson, “Network Security of Internet Services: Eliminate DDoS Reflection Amplification Attacks,” Journal of Internet Services and Information Security 5, no. 3 (2015), 58–79. murderous organization’s website: Tim Lee, “The New York Times Web Site Was Taken Down by DNS Hijacking. Here
…
Pandey, and Damon McCoy, “Booted: An Analysis of a Payment Intervention on a DDoS-for-Hire Service” (presented at the Workshop on the Economics of Information Security, California, June 2017), 5, http://damonmccoy.com/papers/vdos.pdf. no technical knowledge required: In 2010, researchers discovered that twelve out of the top twenty
…
. See, e.g., Gabriella Coleman, Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous (London: Verso, 2014). Economic analysis: See, e.g., Ross Anderson, “Why Information Security Is Hard—An Economic Perspective,” Proceedings 17th Annual Computer Security Applications Conference, 2001, https://www.acsac.org/2001/papers/110.pdf. Sociology: Jonathan Lusthaus, The
…
?,” Justice Quarterly 33, no. 5 (2016): 890–911; Ross Anderson et al., “Measuring the Changing Cost of Cybercrime,” 18th Annual Workshop on the Economics of Information Security, 2019. Under international law: States often sign mutual legal assistance treaties that obligate them to assist each other in criminal prosecutions. See also the Council
by Don Tapscott and Alex Tapscott · 9 May 2016 · 515pp · 126,820 words
Athens. They wouldn’t have been able to transfer their drachmas into bitcoins to hedge against the plummeting fiat currency. Computer scientist Nick Szabo and information security expert Andreas Antonopoulos both argued that robust infrastructure matters and can’t be bootstrapped during catastrophes. Antonopoulos said that Greece’s blockchain infrastructure was lacking
by Bruce Schneier · 1 Jan 2000 · 470pp · 144,455 words
also have the duty to tell individuals about the reason for the information collection, to provide access and correct inaccurate information, and to keep that information secure from access by unauthorized parties. Individuals have a right to see their own personal data that has been collected and have inaccuracies corrected. Individuals also
by Emmanuel Goldstein · 28 Jul 2008 · 889pp · 433,897 words
, California. Last Thursday, March 2, I presented my written and verbal testimony to the United States Senate Governmental Affairs Committee that described how to increase information security within government agencies. Wow. On The Inside “Doing time” is a strange thing. When you’re on the inside, you can’t look out—you
by Larry Harris · 2 Jan 2003 · 1,164pp · 309,327 words
or other relationship of trust and confidence, while in possession of material, nonpublic information about the security. Insider trading violations may also include “tipping” such information, securities trading by the person “tipped” and securities trading by those who misappropriate such information. Examples of insider trading cases that have been brought by the
by Takuro Sato · 17 Nov 2015
by Vijay Singal · 15 Jun 2004 · 369pp · 128,349 words
by Lorne Lantz and Daniel Cawrey · 8 Dec 2020 · 434pp · 77,974 words
by Nicole Perlroth · 9 Feb 2021 · 651pp · 186,130 words
by Shoshana Zuboff · 15 Jan 2019 · 918pp · 257,605 words
by Ashutosh Deshmukh · 13 Dec 2005
by Eric O'Neill · 1 Mar 2019 · 299pp · 88,375 words
by Ronald J. Deibert · 13 May 2013 · 317pp · 98,745 words
by Andrew W. Lo · 3 Apr 2017 · 733pp · 179,391 words
by David Brin · 1 Jan 1998 · 205pp · 18,208 words
by Eric C. Anderson · 15 Jan 2009 · 264pp · 115,489 words
by Bruce Schneier · 3 Sep 2018 · 448pp · 117,325 words
by Noam Chomsky · 1 Apr 1999
by Richard A. Clarke and Robert Knake · 15 Dec 2010 · 282pp · 92,998 words
by Jonathan Littman · 1 Jan 1996
by Paul Vigna and Michael J. Casey · 27 Feb 2018 · 348pp · 97,277 words
by Gabriella Coleman · 4 Nov 2014 · 457pp · 126,996 words
by Thomas Rid
by Eric Schmidt and Jared Cohen · 22 Apr 2013 · 525pp · 116,295 words
by Roger Faligot · 30 Jun 2019 · 615pp · 187,426 words
by Heather Adkins, Betsy Beyer, Paul Blankinship, Ana Oprea, Piotr Lewandowski and Adam Stubblefield · 29 Mar 2020 · 1,380pp · 190,710 words
by Bruce Schneier · 2 Mar 2015 · 598pp · 134,339 words
by Kim Zetter · 11 Nov 2014 · 492pp · 153,565 words
by Marc Goodman · 24 Feb 2015 · 677pp · 206,548 words
by Michal Zalewski · 26 Nov 2011 · 570pp · 115,722 words
by Steven Levy · 15 Jan 2002 · 468pp · 137,055 words
by Frank Pasquale · 17 Nov 2014 · 320pp · 87,853 words
by Peter Gutmann
by Yochai Benkler · 14 May 2006 · 678pp · 216,204 words
by Richard A. Clarke and Robert K. Knake · 15 Jul 2019 · 409pp · 112,055 words
by Ben Buchanan · 25 Feb 2020 · 443pp · 116,832 words
by Christopher Andrew · 27 Jun 2018
by Harihara Subramanian · 31 Jan 2019 · 422pp · 86,414 words
by Renee Dudley and Daniel Golden · 24 Oct 2022 · 392pp · 114,189 words
by Michal Zalewski · 4 Apr 2005 · 412pp · 104,864 words
by David E. Sanger · 18 Jun 2018 · 394pp · 117,982 words
by Clint Watts · 28 May 2018 · 324pp · 96,491 words
by Fred Kaplan · 1 Mar 2016 · 383pp · 105,021 words
by Imran Bashir · 28 Mar 2018
by Ed Yourdon · 19 Jul 2011 · 525pp · 142,027 words
by Amy B. Zegart · 6 Nov 2021
by Kevin Mitnick, Mikko Hypponen and Robert Vamosi · 14 Feb 2017 · 305pp · 93,091 words
by John P. Carlin and Garrett M. Graff · 15 Oct 2018 · 568pp · 164,014 words
by Kevin Mitnick · 14 Aug 2011
by Anu Bradford · 25 Sep 2023 · 898pp · 236,779 words
by Dana Priest and William M. Arkin · 5 Sep 2011 · 328pp · 100,381 words
by Huib Modderkolk · 1 Sep 2021 · 295pp · 84,843 words
by Rosa Brooks · 8 Aug 2016 · 548pp · 147,919 words
by Anu Bradford · 14 Sep 2020 · 696pp · 184,001 words
by Anders Lisdorf
by Rob Kitchin,Tracey P. Lauriault,Gavin McArdle · 2 Aug 2017
by Jeff Berwick and Charlie Robinson · 14 Apr 2020 · 491pp · 141,690 words
by Alexander Davidson · 1 Apr 2008 · 368pp · 32,950 words
by Alan Berg · 15 Mar 2012 · 372pp · 67,140 words
by Chris Burniske and Jack Tatar · 19 Oct 2017 · 416pp · 106,532 words
by Joshua Cooper Ramo · 16 May 2016 · 326pp · 103,170 words
by Carne Ross · 25 Apr 2007 · 212pp · 68,690 words
by Alan Greenspan · 14 Jun 2007
by Brian Merchant · 19 Jun 2017 · 416pp · 129,308 words
by Vivek Wadhwa and Alex Salkever · 2 Apr 2017 · 181pp · 52,147 words
by Malka Older · 7 Jun 2016 · 346pp · 102,666 words
by Douglas B. Laney · 4 Sep 2017 · 374pp · 94,508 words
by Paul Scharre · 23 Apr 2018 · 590pp · 152,595 words
by Nandan Nilekani · 4 Feb 2016 · 332pp · 100,601 words
by Frank J. Ohlhorst · 28 Nov 2012 · 133pp · 42,254 words
by Federico Biancuzzi and Shane Warden · 21 Mar 2009 · 496pp · 174,084 words
by Tom Clancy · 2 Jan 1998 · 553pp · 151,139 words
by Lonely Planet
by Alec Ross · 2 Feb 2016 · 364pp · 99,897 words
by Steven Levy · 25 Feb 2020 · 706pp · 202,591 words
by Guy Standing · 27 Feb 2011 · 209pp · 89,619 words
by Melanie Swan · 22 Jan 2014 · 271pp · 52,814 words
by Jeremy Rifkin · 31 Mar 2014 · 565pp · 151,129 words
by Rennay Dorasamy · 2 Dec 2021 · 328pp · 77,877 words
by P. W. Singer · 1 Jan 2010 · 797pp · 227,399 words
by Peter Warren Singer and Emerson T. Brooking · 15 Mar 2018
by Andreas M. Antonopoulos and Gavin Wood Ph. D. · 23 Dec 2018 · 960pp · 125,049 words
by Matthew Campbell and Kit Chellel · 2 May 2022 · 363pp · 98,496 words
by Jiawei Han, Micheline Kamber and Jian Pei · 21 Jun 2011
by Bruce Schneier · 7 Feb 2023 · 306pp · 82,909 words
by Ron Jeffries · 14 Aug 2015 · 444pp · 118,393 words
by Walt Bogdanich and Michael Forsythe · 3 Oct 2022 · 689pp · 134,457 words
by Jacob Helberg · 11 Oct 2021 · 521pp · 118,183 words
by Raj M. Shah and Christopher Kirchhoff · 8 Jul 2024 · 272pp · 103,638 words
by Ian Bremmer · 30 Apr 2012 · 234pp · 63,149 words
by Jessica Bruder and Dale Maharidge · 29 Mar 2020 · 159pp · 42,401 words
by Roger McNamee · 1 Jan 2019 · 382pp · 105,819 words
by Stuart McClure, Joel Scambray and George Kurtz · 15 Feb 2001 · 260pp · 40,943 words
by Bruce Schneier · 14 Feb 2012 · 503pp · 131,064 words
by Christopher Andrew · 2 Aug 2010 · 1,744pp · 458,385 words
by Eric Siegel · 19 Feb 2013 · 502pp · 107,657 words
by Kate L. Turabian · 14 Apr 2007 · 863pp · 159,091 words
by Scott Patterson · 11 Jun 2012 · 356pp · 105,533 words
by Ray Kurzweil · 14 Jul 2005 · 761pp · 231,902 words
by P. W. Singer and Allan Friedman · 3 Jan 2014 · 587pp · 117,894 words
by Miguel Grinberg · 12 May 2014 · 420pp · 61,808 words
by Bruce Sterling · 15 Mar 1992 · 345pp · 105,722 words
by Julia Ebner · 20 Feb 2020 · 309pp · 79,414 words
by Christian Crumlish and Erin Malone · 30 Sep 2009 · 518pp · 49,555 words
by Dafydd Stuttard and Marcus Pinto · 30 Sep 2007 · 1,302pp · 289,469 words
by Bhu Srinivasan · 25 Sep 2017 · 801pp · 209,348 words
by George Magnus · 10 Sep 2018 · 371pp · 98,534 words
by Justin Schuh · 20 Nov 2006 · 2,054pp · 359,149 words
by Richard Brooks · 23 Apr 2018 · 398pp · 105,917 words
by Frank Vogl · 14 Jul 2021 · 265pp · 80,510 words
by Jeff Nickoloff and Stephen Kuenzli · 10 Dec 2019 · 629pp · 109,663 words
by Cixin Liu · 11 Nov 2014 · 420pp · 119,928 words
by Walter Isaacson · 11 Sep 2023 · 562pp · 201,502 words
by Justin Seitz · 15 Feb 2009 · 312pp · 52,762 words
by Jimmy Soni · 22 Feb 2022 · 505pp · 161,581 words
by Rob Reich, Mehran Sahami and Jeremy M. Weinstein · 6 Sep 2021
by Nadia Eghbal · 3 Aug 2020 · 1,136pp · 73,489 words
by Camila Russo · 13 Jul 2020 · 349pp · 102,827 words
by Paul Collier · 9 Feb 2010 · 264pp · 74,313 words
by Stephen Baker · 11 Aug 2008 · 265pp · 74,000 words
by Clive Thompson · 26 Mar 2019 · 499pp · 144,278 words
by Antonio Garcia Martinez · 27 Jun 2016 · 559pp · 155,372 words
by Adam Grant · 2 Feb 2016 · 410pp · 101,260 words
by Ian Goldin and Chris Kutarna · 23 May 2016 · 437pp · 113,173 words
by Luke Harding · 7 Feb 2014 · 266pp · 80,018 words
by Braden R. Allenby and Daniel R. Sarewitz · 15 Feb 2011
by Mariya Yao, Adelyn Zhou and Marlene Jia · 1 Jun 2018 · 161pp · 39,526 words
by Safiya Umoja Noble · 8 Jan 2018 · 290pp · 73,000 words
by Andy Greenberg · 5 Nov 2019 · 363pp · 105,039 words
by Alan Rusbridger · 14 Oct 2018 · 579pp · 160,351 words
by Daniel Simons and Christopher Chabris · 10 Jul 2023 · 338pp · 104,815 words
by Katherine S. Newman and Hella Winston · 18 Apr 2016 · 338pp · 92,465 words
by Kai-Fu Lee and Qiufan Chen · 13 Sep 2021
by Philip N. Howard · 27 Apr 2015 · 322pp · 84,752 words
by Bruce Schneier · 10 Nov 1993
by David Gerard · 23 Jul 2017 · 309pp · 54,839 words
by VM (Vicky) Brasseur · 266pp · 79,297 words
by Jeremy Scahill · 22 Apr 2013 · 1,117pp · 305,620 words
by Viktor Mayer-Schönberger · 1 Jan 2009 · 263pp · 75,610 words
by Chitij Chauhan · 30 Jan 2015
by Niall Ferguson · 1 Jan 2002 · 469pp · 146,487 words
by Julian Guthrie · 15 Nov 2019
by Kevin Roose · 18 Feb 2014 · 269pp · 83,307 words
by Jan Kunigk, Ian Buss, Paul Wilkinson and Lars George · 8 Jan 2019 · 1,409pp · 205,237 words
by Joi Ito and Jeff Howe · 6 Dec 2016 · 254pp · 76,064 words
by Rebecca Fannin · 2 Sep 2019 · 269pp · 70,543 words
by Ronald J. Deibert · 14 Aug 2020
by Michal Zalewski · 11 Jan 2022 · 337pp · 96,666 words
by Atsuo Inoue · 18 Nov 2021 · 295pp · 89,441 words
by Andreas M. Antonopoulos · 28 Aug 2016 · 200pp · 47,378 words
by Alec Ross · 13 Sep 2021 · 363pp · 109,077 words
by Joseph Menn · 3 Jun 2019 · 302pp · 85,877 words
by Annalee Newitz · 3 Jun 2024 · 251pp · 68,713 words
by Edward Snowden · 16 Sep 2019 · 324pp · 106,699 words
by Francis Fukuyama · 20 Mar 2007 · 214pp · 57,614 words
by Cyrus Farivar · 7 May 2018 · 397pp · 110,222 words
by Timothy Ferriss · 14 Jun 2017 · 579pp · 183,063 words
by Gourav Shah · 29 Jul 2015 · 178pp · 33,275 words
by Michael Lewis · 30 Mar 2014 · 250pp · 87,722 words
by Lars George · 29 Aug 2011
by Mike Scotti · 14 May 2012 · 287pp · 92,118 words
by Bruce Sterling · 27 Apr 2004 · 342pp · 95,013 words
by Alissa Quart · 25 Jun 2018 · 320pp · 90,526 words
by Alex Rosenblat · 22 Oct 2018 · 343pp · 91,080 words
by Nick Bostrom and Milan M. Cirkovic · 2 Jul 2008
by Casey Rosenthal and Nora Jones · 27 Apr 2020 · 419pp · 102,488 words
by Sheera Frenkel and Cecilia Kang · 12 Jul 2021 · 372pp · 100,947 words
by John Brockman · 14 Feb 2012 · 416pp · 106,582 words
by Kate Conger and Ryan Mac · 17 Sep 2024
by David G. W. Birch · 14 Apr 2020 · 247pp · 60,543 words
by Mike Isaac · 2 Sep 2019 · 444pp · 127,259 words
by Neal Stephenson · 25 Aug 2009 · 1,087pp · 325,295 words
by Shane Harris · 14 Sep 2014 · 340pp · 96,149 words
by Andy Greenberg · 12 Sep 2012 · 461pp · 125,845 words
by Daniel J. Levitin · 18 Aug 2014 · 685pp · 203,949 words
by Hamish McKenzie · 30 Sep 2017 · 307pp · 90,634 words
by Ryan Mitchell · 14 Jun 2015 · 255pp · 78,207 words
by Neil A. Gershenfeld · 15 Feb 1999 · 238pp · 46 words
by Lisa Gitelman · 25 Jan 2013
by Denis MacShane · 14 Jul 2017 · 308pp · 99,298 words
by Gene Kim, Kevin Behr and George Spafford · 14 Jul 2013 · 395pp · 110,994 words
by Nick Polson and James Scott · 14 May 2018 · 301pp · 85,126 words
by Jennifer Pahlka · 12 Jun 2023 · 288pp · 96,204 words
by Kurt Wagner · 20 Feb 2024 · 332pp · 127,754 words
by Benjamin Wallace · 18 Mar 2025 · 431pp · 116,274 words
by Simon Singh · 1 Jan 1999
by Mike Maples and Peter Ziebelman · 8 Jul 2024 · 207pp · 65,156 words
by Clifford Stoll · 2 Jan 1989 · 440pp · 117,978 words
by Matthew Skelton and Manuel Pais · 16 Sep 2019
by Brian Krebs · 18 Nov 2014 · 252pp · 75,349 words
by Michael S Collins · 23 Feb 2014 · 446pp · 102,421 words
by Rafeeq Ur Rehman · 7 May 2003 · 257pp · 64,973 words
by Chris Skinner · 27 Aug 2013 · 329pp · 95,309 words
by Reid Hoffman and Ben Casnocha · 14 Feb 2012 · 176pp · 55,819 words
by Tom Standage · 31 Aug 2005
by Peter Baker · 21 Oct 2013
by Peter H. Diamandis and Steven Kotler · 3 Feb 2015 · 368pp · 96,825 words
by Amr Hazem Wahba Metwaly · 21 Mar 2021 · 80pp · 21,077 words
by Norman Finkelstein · 9 Jan 2018 · 578pp · 170,758 words
by Annie Jacobsen · 25 Mar 2024 · 444pp · 105,807 words
by Cory Doctorow · 6 Oct 2025 · 313pp · 94,415 words
by Patrick McGee · 13 May 2025 · 377pp · 138,306 words
by E. Gabriella Coleman · 25 Nov 2012 · 398pp · 107,788 words
by Cameron Buchanan, Terry Ip, Andrew Mabbitt, Benjamin May and Dave Mound · 28 Jun 2015 · 224pp · 45,431 words
by General Stanley McChrystal, Tantum Collins, David Silverman and Chris Fussell · 11 May 2015 · 409pp · 105,551 words
by David Reed · 31 Aug 2021 · 168pp · 49,067 words
by Richard Brooks · 2 Jan 2014 · 301pp · 88,082 words
by Talia Lavin · 14 Jul 2020 · 231pp · 71,299 words
by Pamela Prickett and Stefan Timmermans · 11 Mar 2024 · 405pp · 113,895 words
by Ben Mezrich · 20 May 2019 · 304pp · 91,566 words
by Unknown · 2 Jan 2010 · 448pp · 71,301 words
by Andrew M. Lobaczewski · 1 Jan 2006 · 396pp · 116,332 words
by Moore, Kate · 17 Apr 2017
by Jonathan Waldman · 7 Jan 2020 · 277pp · 91,698 words
by Vauhini Vara · 8 Apr 2025 · 301pp · 105,209 words
by Simon Singh · 1 Jan 2004 · 492pp · 149,259 words
by Jeff John Roberts · 15 Dec 2020 · 226pp · 65,516 words
by Steven D. Levitt and Stephen J. Dubner · 11 May 2014 · 240pp · 65,363 words
by Matt Ridley · 395pp · 116,675 words
by Chris Clark · 16 Jun 2013 · 52pp · 13,257 words
by Anastasia Holdren · 4 Nov 2011
by Culture Smart! · 15 Jun 201 · 124pp · 37,476 words
by Jim Al-Khalili · 10 Mar 2020 · 198pp · 57,703 words
by Mitchel Kelonye · 19 Oct 2014 · 266pp · 38,397 words