The Summer Reading List

Jun 17, 2019
Kenna Security

Share with Your Network

You love reading, we love reading. That’s why this summer Kenna Security is sharing with you a list of titles our research team have read, are reading, or look forward to reading this summer. The topics range from security (of course) to puzzle books to a study of the evolution of cephalopods. We hope you’ll find something that peaks your interest.

Ed Bellis, our fearless CTO and Co-Founder

“Jay is one of our partners in research from the Cyentia Institute, and a very sharp data scientist, so I try to consume pretty much everything he writes.”

“A classic, and I’m especially fond of Chapter 5..”

Jerry Gamblin, our own personal hacker here at Kenna and, oh yeah, our Principal Security Engineer

“This is a great book for your beach vacation or for when you are stranded at O’Hare due to thunderstorms. I carry this book with me almost everywhere I go and it is great when you need to take a quick mental break.”

“This book gives a look into what will happen when we start letting AI make more decisions on the battlefield and the consequences that could have. It also dives into some of the technology that makes that possible.”

Jonathan Cran, self-professed “vulnerability janitor” but externally known as Kenna’s Head of Research

“This is less a book on malware and more a book on modeling data. Malware just happens to be the subject matter. Pick it up if you’re looking for a data science project, it’s a short read.”

“As a good developer friend of mine put it, this is one of those books you read so you don’t have to read all the others. It’s not a small book, but it’s a surprisingly readable tome on the ideas application developers have to think and make decisions about as they design big data systems.”

“This one is a challenging read, possibly better as a reference, but it grabbed me right away in the first chapter by digging into situations in which you have many models, and how you can use this to your advantage to converge on a ‘correct’ answer. Certainly a relevant book in the age of machine learning.”

“If you don’t know the history of cDc and the l0pht, you’re missing one of the most interesting stories in hacker history. This one is an easy read that brings you into the world of some of the best hackers in the world. Don’t miss it.”

Michael Roytman, our wizard of data science, also known more officially as Kenna’s Chief Data Scientist

The Theory That Would Not Die: How Bayes’ Rule Cracked the Enigma Code, Hunted Down Russian Submarines, and Emerged Triumphant from Two Centuries of Controversy by Sharon Bertsch McGrayne

Other Minds: The Octopus, the Sea, and the Deep Origins of Consciousness Reprint Edition by Peter Godfrey-Smith  

Factfulness: Ten Reasons We’re Wrong About the World–and Why Things Are Better Than You Think by Hans Rosling, Anna Rosling Rönnlund, Ola Rosling

Read the Latest Content

Research Reports

Prioritization to Prediction Volume 5: In Search of Assets at Risk

The fifth volume of the P2P series explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities.
DOWNLOAD NOW
eBooks

5 Things Every CIO Should Know About Vulnerability Management

If you view vulnerability management (VM) as just a small part of your operation, it might be time to take another look.  Managing vulnerabilities is...
DOWNLOAD NOW

Videos

Videos

Get Started Using the Exploit Prediction Scoring System (EPSS).

Cyentia Institute’s Chief Data Scientist and Founder Jay Jacobs gives tips on how to get started using the Exploit Prediction Scoring System (EPSS). You...
READ MORE
FacebookLinkedInTwitterYouTube

© 2022 Kenna Security. All Rights Reserved. Privacy Policy.