Profile cover photo
Profile photo
Rick Howard
90 followers -
Amateur Geek - Professional Kibitzer - Security Wonk - Palo Allto Networks CSO
Amateur Geek - Professional Kibitzer - Security Wonk - Palo Allto Networks CSO

90 followers
About
Communities and Collections
View all
Posts

Post has attachment
Book Review: "How Great Science Fiction Works,” by Gary K. Wolfe, Course Review by Rick Howard
I very much enjoyed Dr. Wolfe’s Great Courses lecture. I have always considered myself to be a science fiction fan, but after listening to these lectures, I learned that there are numerous holes in my science fiction education that I will have to get busy f...
Add a comment...

Post has attachment
Cryptocurrency, Blockchain and Bitcoin: It All Seems So Mysterious
Executive Summary When Satoshi Nakamoto published his seminal paper called Bitcoin: A Peer-to-Peer Electronic Cash System in October 2008, he started what is arguably the first viable cryptocurrency. Bitcoins have steadily increased in value from its incept...
Add a comment...

Post has attachment
2016 Books
I read 28 Books in 2016. 2016 favorite: "Dead Wake: The Last Crossing of the Lusitania," by Erik Larson 2016 Most Educational: "The Right To Vote The Contested History Of Democracy In The United States," by Alexander Keyssar 2016 Best Horror: "A Head Full o...
2016 Books
2016 Books
terebrate.blogspot.com
Add a comment...

Post has attachment
Book Review: " Go Set a Watchman (2011) by Harper Lee," Book Reviewed by Rick Howard, 1 August 2015
Executive Summary In Harper Lee’s Go Set a Watchman , Jean Louise Finch as a young woman discovers that racial tensions in the south are not as black and white as she thought they were when she was a young girl, Scout, in To Kill A Mockingbird.  Her father,...
Add a comment...

Post has attachment
Cybersecurity Canon Candidate Book Review: "Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats (2011)," by Will Gragido and John Pirc
Executive Summary Cybercrime and Espionage, published in 2011, is a book that was ahead of its time. The authors were pushing the envelope in terms of how the security community should think about advanced threats. However, almost five years later, there is...
Add a comment...

Post has attachment
Books You Should Have Read By Now
When I started Terebrate back in January 2010, I always intended it to be a place to put my book reviews on whatever I was reading. Since then, a lot has happened in my professional life. I changed jobs, twice. I presented my collection of cybersecurity boo...
Books You Should Have Read By Now
Books You Should Have Read By Now
terebrate.blogspot.com
Add a comment...

Post has attachment
Memorial Day Essay: Reborn at Arlington
1500 US Army soldiers stood on the misty parade field at Fort Meyer waiting for the sun to rise. The leadership had scheduled another morale building yet mandated "fun run" wherein once a quarter, the entire unit comes together to do PT (Physical Training) ...
Add a comment...

Post has attachment
Should Lawmakers Vote to End the National Security Agency’s Bulk Collection of Phone Records?
Yes — absolutely. Section 215 of the Patriot Act is set to expire on June 1. That provision gives the NSA permission to collect metadata from communications mediums like phone calls. Metadata, in this case, refers to the phone number making the call, the ca...
Add a comment...

Post has attachment
Book Review: Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon (2014) by Kim Zetter
Executive Summary Operation Olympic Games is the US military code name that refers to the first ever act of real cyber warfare. Many journalists have told bits and pieces of the story since the attacks became public in 2010, but none have come close to tell...
Add a comment...

Post has attachment
Book Review: “Cyber Warfare: Techniques, Tactics and Tools for the Security Practitioners" (2011)” by Jason Andress and Steve Winterfeld
Executive Summary Cyber Warfare: Techniques, Tactics and Tools for the Security Practitioners is a consolidation of the current thinking around the topic of cyber warfare; not the way you hear about in the media where everything is a war of some kind (War o...
Add a comment...
Wait while more posts are being loaded