When should a startup really invest in information security? What is the blueprint they should follow to successfully build a thriving security team? One that actually protects and boosts the business instead of slowing it down with dubious, senseless practices?In this book we will follow the journey of the first security engineer, Alex, hired by a scale up to design and implement its first security practices. You and I will dive into Alex’s mind and embody their intellectual experience, from the first encounter with the company during the interview process all the way to their first months on the job.We will follow their day-to-day interactions with other teams. Their communication struggle. The difficult but oh so important exercise of prioritizing vulnerabilities, the hard limits of technology and most importantly the phenomenal clash between common security wisdom and the hard reality of the field.Buckle up. The gloves are off, and I am not holding back any punches. I am here to destroy many myths that keep popping up in the security field which, counterintuitively, do more harm than good. Pragmatism and First principles are the de facto standards of this book. Hopefully, it will resonate with as many readers as possible.
Sparc Flow is a computer security expert. He specializes in ethical hacking and has presented his research at international security conferences like Black Hat, DEF CON, Hack In The Box,...
While his day job consists mainly of hacking companies and showing them how to fix their security vulnerabilities, his passion is writing and sharing the insight he gained in the security field
His first book "How to Hack Like a Pornstar" captures the essence of multiple situations he faced in real life and offers the reader a peak into the world of hacking and pentesting
Great book for those interested in information security. The author takes us on a journey that highlights a particular philosophy in security, whilst also taking the time to cover some of the most relevant technologies and their associated issues deployed in today’s enterprise settings. Highly recommended