<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic New to the information security world - suggest you read this: in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/New-to-the-information-security-world-suggest-you-read-this/m-p/50397#M3437</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some of us have been involved in information security and cybersecurity for a long time, even before the computer as we know it was put together.&amp;nbsp; Reading this author's 7 year research into information security, underground, is eye opening, because it was going on around us and we could not speak about it.&amp;nbsp; It should shock you to the core, and when someone states from a Zero Trust perspective states that you should treat everything as being already being compromised, they mean it.&amp;nbsp;&amp;nbsp; Some of us, have known this for a long time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But you would not have believed us at the time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.nytimes.com/2021/02/06/technology/cyber-hackers-usa.html" target="_blank"&gt;https://www.nytimes.com/2021/02/06/technology/cyber-hackers-usa.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can listen to it here in audio, or if you prefer, sit down and earn some CPE's, it will definitely change your thoughts on a lot of things going on around us every day.&amp;nbsp;&amp;nbsp; But I assure you reading it will bring about realisations, on how you tackle your own organisations day to day issues.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.amazon.com/This-They-Tell-World-Ends/dp/1635576059" target="_blank"&gt;https://www.amazon.com/This-They-Tell-World-Ends/dp/1635576059&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"This is How They Tell Me the World Ends: The Cyberweapons Arms Race"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 09 Oct 2023 10:08:47 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2023-10-09T10:08:47Z</dc:date>
    <item>
      <title>New to the information security world - suggest you read this:</title>
      <link>https://community.isc2.org/t5/Tech-Talk/New-to-the-information-security-world-suggest-you-read-this/m-p/50397#M3437</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some of us have been involved in information security and cybersecurity for a long time, even before the computer as we know it was put together.&amp;nbsp; Reading this author's 7 year research into information security, underground, is eye opening, because it was going on around us and we could not speak about it.&amp;nbsp; It should shock you to the core, and when someone states from a Zero Trust perspective states that you should treat everything as being already being compromised, they mean it.&amp;nbsp;&amp;nbsp; Some of us, have known this for a long time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But you would not have believed us at the time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.nytimes.com/2021/02/06/technology/cyber-hackers-usa.html" target="_blank"&gt;https://www.nytimes.com/2021/02/06/technology/cyber-hackers-usa.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can listen to it here in audio, or if you prefer, sit down and earn some CPE's, it will definitely change your thoughts on a lot of things going on around us every day.&amp;nbsp;&amp;nbsp; But I assure you reading it will bring about realisations, on how you tackle your own organisations day to day issues.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.amazon.com/This-They-Tell-World-Ends/dp/1635576059" target="_blank"&gt;https://www.amazon.com/This-They-Tell-World-Ends/dp/1635576059&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"This is How They Tell Me the World Ends: The Cyberweapons Arms Race"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 10:08:47 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/New-to-the-information-security-world-suggest-you-read-this/m-p/50397#M3437</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-09T10:08:47Z</dc:date>
    </item>
  </channel>
</rss>

