Tag

Security

Journalism, Non Fiction, Social Issues

May 22: This Is How They Tell Me the World Ends with Nicole Perlroth

The Cyber Weapons Arms Race – What You Need to Know & Do Today!

This is How They Tell Me the World Ends with Author Nicole Perlroth

If you think cyber attacks won’t or can’t impact you, Nicole Perlroth joins us today to say they can, they will, and they probably already have whether or not you know it.

Nicole Perlroth’s new book shares untold stories of the cyberweapons market, the most secretive, invisible, government-backed market today. We discuss how the US is involved. How and why Russia plagued Ukraine with cyber attacks before they attacked on land. And the single, most important thing you can do, to protect yourself and your data.

About Nicole Perlroth

Nicole Perlroth was the lead cybersecurity, digital espionage, and sabotage reporter at The New York Times for a decade, where her work was optioned for film and television. She’s a regular lecturer at the Stanford Graduate School of Business. Today, she increasingly prefers life off the grid. This Is How They Tell me The World Ends is Nicole’s first book, and a New York Times bestseller.

Continue reading
Fiction, Writers on Writing

JAN 08: NYT Bestselling Action Thriller Author Brad Taylor & Hunter Killer

 With 13 Pike Logan action thrillers hitting the New York Times Bestsellers list, author Brad Taylor says no one is more than surprised than him. He always wanted to write but never had time until his final military assignment at The Citadel.

Set in Brazil, Hunter Killer is the 14th in the hit series—hot off the presses January 7th.  Today Brad shares his POV on writing and why he broke the rules, developing strong protagonists, the scenes he loves to craft, and the challenges of writing.

Brad Taylor, Lieutenant Colonel (Ret.) is a 21-year veteran of the U.S. Army Infantry and Special Forces, including eight years with the 1st Special Forces Operational Detachment (Delta Force). He continues to consult with various agencies on asymmetric security threats.

Continue reading