Book cover of Tribe of Hackers by Marcus J. Carey

Tribe of Hackers

by Marcus J. Carey

14 min readRating:3.9 (257 ratings)
Genres
Buy full book on Amazon

Introduction

In today's digital age, cybersecurity has become an increasingly important aspect of our lives. Whether you're a business owner, an IT professional, or simply someone who uses the internet, understanding the basics of cybersecurity is crucial. "Tribe of Hackers" by Marcus J. Carey offers a unique and insightful look into the world of cybersecurity through the eyes of experienced professionals in the field.

This book is a collection of interviews with various cybersecurity experts, each sharing their knowledge, experiences, and advice. From debunking common myths to providing practical tips for both professionals and everyday users, "Tribe of Hackers" offers a comprehensive overview of the cybersecurity landscape.

In this summary, we'll explore the key ideas and insights shared by these experts, providing you with a valuable understanding of the cybersecurity world and how you can better protect yourself and your organization in the digital realm.

Diverse Paths to Becoming a Cybersecurity Professional

One of the most interesting aspects of the cybersecurity field is the variety of paths one can take to become a professional. Lesley Carhart, a principal threat hunter at Dragos, Inc., with nearly two decades of experience in the IT industry, shares some valuable insights on this topic.

Breaking the Misconception of Narrow Focus

Carhart emphasizes that security professionals should not limit themselves to just their specific niche. Instead, they need to understand the businesses they serve, which often aren't security-focused themselves. This broader understanding allows security professionals to help senior leadership strike a balance between operations and security, making their role more effective and valuable to the organization.

The Non-Essential Nature of Formal Education

Contrary to popular belief, Carhart points out that a college degree or certification is not absolutely necessary to excel in cybersecurity. While these credentials can certainly help in getting a foot in the door or securing promotions, they are not the be-all and end-all of success in this field. This insight is particularly encouraging for those who may not have access to formal education but are passionate about cybersecurity.

The Importance of Self-Study and Community Involvement

Carhart strongly encourages self-study and active involvement in the cybersecurity community as key components for success. She warns against relying solely on degree programs to provide all the necessary skills for the field. This advice underscores the rapidly evolving nature of cybersecurity and the need for continuous learning beyond formal education.

Networking: A Crucial Skill for Career Advancement

When it comes to climbing the corporate ladder or starting a cybersecurity company, Carhart emphasizes the importance of networking. She encourages professionals to interact and get involved in the community. This advice aligns with the collaborative nature of the cybersecurity field, where sharing knowledge and experiences can lead to better overall security practices.

The Value of Soft Skills

Interestingly, Carhart notes that social skills can give cybersecurity professionals an edge in their careers. She's observed smart individuals missing out on opportunities due to poor interview or résumé skills. This highlights the often-overlooked importance of soft skills in a field that's typically associated with technical expertise.

Qualities of Successful Cybersecurity Professionals

According to Carhart, the cybersecurity world values creative problem-solving and an insatiable curiosity about how things work. These qualities align well with the constantly evolving nature of cyber threats and the need for innovative solutions to combat them.

Practical Tips for Home Network Security

For those concerned about personal digital safety, Carhart offers some practical advice. She suggests carefully considering the necessity of Internet of Things (IoT) devices and recommends separating them from the main computer network. For instance, keeping smart devices and computers used for sensitive tasks (like tax preparation) on separate networks can enhance overall security. She also emphasizes the importance of protecting these networks with a firewall.

The Crucial Role of Interpersonal Skills in Cybersecurity

Ming Chow, a senior lecturer at Tufts University with extensive experience in cybersecurity and computer science education, provides valuable insights into the importance of interpersonal skills in the cybersecurity field.

Debunking the Correlation Between Spending and Security

Chow challenges the common assumption that increased cybersecurity spending directly leads to fewer breaches. He identifies several reasons why this correlation doesn't hold:

  1. The misconception that more spending alone will solve security issues
  2. Management's lack of understanding about what they're protecting against
  3. The complexity and potential vulnerabilities of cybersecurity products themselves
  4. Many breaches resulting from basic issues like weak passwords that money can't prevent

This insight highlights the need for a more holistic approach to cybersecurity that goes beyond just increasing budgets.

Emphasizing Cybersecurity from Day One

To improve an organization's cybersecurity posture, Chow suggests emphasizing it right from the onboarding process. He recommends constant drills and exercises, such as phishing simulations, to instill a serious regard for cybersecurity across the organization. This approach helps spread awareness and creates a culture of security consciousness.

Accessibility of the Cybersecurity Field

Chow emphasizes that cybersecurity is a vast, interdisciplinary field that offers opportunities for both technical and non-technical skill sets. He notes that it's accessible to almost anyone and doesn't require fancy equipment or a college degree. However, he stresses that success in the field demands hard work to stay up-to-date, intellectual curiosity to understand how things work, and hands-on experience.

Practical Advice for Beginners

For those looking to enter the field, Chow suggests a practical exercise: setting up a vulnerable web server at home. This hands-on experience provides real-world insights into cybersecurity challenges and solutions.

The Power of Personality and Emotional Intelligence

When it comes to career advancement in cybersecurity, Chow believes that personality and emotional intelligence play a crucial role. While academic or technical skills may help in landing a job, it's interpersonal skills that drive long-term success and help secure promotions. This insight underscores the importance of developing a well-rounded skill set that includes both technical and soft skills.

Simplicity: The Key to Effective Cybersecurity

Bruce Potter, the Chief Information Security Officer (CISO) at Expel and founder of the Shmoo Group, brings over two decades of experience to the discussion. His insights focus on the importance of simplicity in cybersecurity.

Mastering the Basics

Potter emphasizes that mastering the basics is crucial for an organization to improve its cybersecurity posture. Rather than getting caught up in the latest technological advancements, he suggests that organizations could significantly strengthen their security by focusing on simple measures such as:

  1. Patching software vulnerabilities
  2. Limiting the use of USBs
  3. Implementing two-factor authentication

This advice aligns with the idea that a strong foundation in cybersecurity basics can often be more effective than complex, cutting-edge solutions.

Qualities of Successful Cybersecurity Professionals

When it comes to the shared qualities of successful cybersecurity professionals, Potter highlights the ability to make tough decisions. He values professionals who can say "let's do this" and follow through with what's right, even when it's not the easiest path. This quality speaks to the importance of integrity and courage in the field of cybersecurity.

Cybersecurity Advice for the General Public

Potter offers some interesting perspectives on cybersecurity for everyday users:

  1. He acknowledges that most individuals are not prime targets for cyberattacks, which can help alleviate some of the fear and anxiety around cybersecurity.
  2. He urges caution around trusting companies providing Internet of Things devices and their associated cloud services. If a service is free, he suggests it may not be entirely trustworthy.
  3. Surprisingly, he champions the use of Apple products for their robust security features.

Continuous Learning and Self-Reflection

Potter dismisses the concept of a "life hack," viewing it as just another term for learning. He encourages continuous learning without worrying about whether it qualifies as a "hack." This perspective aligns with the rapidly evolving nature of cybersecurity and the need for professionals to constantly update their knowledge and skills.

When it comes to mistakes, Potter doesn't focus on major blunders. Instead, he cautions about the danger of not recognizing and addressing numerous small mistakes, which can collectively cause significant damage. This advice underscores the importance of continuous self-reflection and honesty in professional growth.

The Power of Defense in Cybersecurity

Robert M. Lee, a notable figure in industrial cybersecurity and the CEO of Dragos, Inc., offers a perspective that challenges common beliefs about the balance of power in cybersecurity.

Defenders Have the Advantage

Contrary to the popular belief that adversaries always have the upper hand in cybersecurity, Lee argues that with the right defense strategies, defenders can gain the advantage. This optimistic view emphasizes the importance of proactive and well-planned defense strategies in cybersecurity.

The Value of Knowledgeable Analysts

Lee highlights the importance of having knowledgeable analysts in an organization. These experts not only help choose the right technologies but also prevent unnecessary expenditure on vendor products that may not be needed. This insight underscores the value of human expertise in making informed decisions about cybersecurity investments.

Perception vs. Reality in Cybersecurity Breaches

Lee challenges the widespread belief that increasing cybersecurity breaches correspond to increased spending on security. He explains that while breaches seem to be on the rise, it may merely be a perception issue due to increased awareness and detection of old issues. This perspective helps to contextualize the seemingly paradoxical relationship between increased spending and persistent breaches.

The Non-Essential Nature of Formal Education

Echoing Carhart's sentiments, Lee reassures that a formal college degree or certification isn't always necessary in cybersecurity. He shares that much of his knowledge is self-taught and encourages newcomers to leverage the plethora of free resources available for self-education. This advice opens up the field to passionate individuals who may not have access to formal education.

The Importance of Hands-On Experience

Lee's cybersecurity specialty lies in industrial control systems and threat intelligence, areas where hands-on experience is highly valuable. He advises those interested in these areas to seek employment in places like utilities or industrial companies, where real-world experience can be gained. This advice highlights the value of practical experience in specialized areas of cybersecurity.

Career Progression Through Community Engagement

For career advancement, Lee reiterates the importance of stepping outside traditional paths and engaging with the broader community. He suggests public speaking, writing papers, and offering training as ways to stand out and hone skills. This advice aligns with the collaborative nature of the cybersecurity field and the value of knowledge sharing.

Practical Cybersecurity Advice for Home Users

Lee offers reassuring advice for home users, encouraging them not to overthink or fear cybersecurity. He emphasizes the use of legitimate software licenses and two-factor authentication, reinforcing the importance of getting the basics right.

A Balanced Perspective on Cybersecurity Threats

Lee's guiding principle emphasizes that although threats are more significant than many realize, they're often not as bad as imagined. This balanced mindset serves to center individuals and organizations, helping them navigate the vast landscape of cybersecurity without succumbing to unnecessary fear or complacency.

The Human Element in Cybersecurity

Jayson E. Street, a seasoned voice in cybersecurity and an advocate for hands-on involvement in the field, brings a fresh perspective to how we approach cybersecurity, particularly in relation to the human element.

Humans as Assets, Not Liabilities

Street challenges the common perception that humans are the "weakest link" in cybersecurity due to errors such as clicking on unsafe links or using weak passwords. Instead, he asserts that if we properly instill a security-minded culture in our users, they can become a powerful line of defense. This perspective shifts the focus from blaming users to empowering them to protect the technology they're using.

The Ongoing Battle in Cybersecurity

Street delves into the seemingly paradoxical situation of rising cybersecurity spending amidst continual breaches. He likens it to the eternal struggle between safes and safe-crackers – no matter how advanced the security, risk is never entirely eliminated. Instead, it's about mitigating risk to an acceptable level and constantly evolving our security practices to stay ahead of potential threats. This insight reminds us that cybersecurity is not a destination but a journey of continuous improvement and adaptation.

Keys to Career Success in Cybersecurity

For those looking to succeed in the cybersecurity field, Street stresses the importance of consistent good work driven by passion. He advises excelling in your current role while signaling your desire to grow and improve. Street also identifies curiosity as a shared quality among successful cybersecurity professionals. This inherent desire to solve problems and find solutions, especially when they're complex and challenging, is what makes someone stand out in the field.

Practical Advice for Everyday Users

For everyday people navigating the age of social media and the Internet of Things, Street offers practical advice:

  1. Remember that online privacy is not guaranteed
  2. Keep your systems patched regularly

He believes these simple steps will do more to protect you than any antivirus software, emphasizing again the importance of basic security practices.

The Power of Human Decency

Street's "life hack" is a beautiful reminder of human decency – be genuinely kind and respectful to others, not for personal gain, but simply because it might make their day better. This approach can foster unexpected positive outcomes in life. This advice underscores the importance of the human element in cybersecurity and in life in general.

Final Thoughts: Key Takeaways from the Tribe of Hackers

As we conclude our journey through the insights shared by these cybersecurity experts, several key themes emerge:

  1. Diverse Pathways to Success: There's no one-size-fits-all approach to becoming a cybersecurity professional. While formal education can be helpful, it's not always necessary. Self-study, hands-on experience, and community involvement are equally valuable.

  2. The Importance of Basics: Across the board, experts emphasize the need to master the fundamentals of cybersecurity. Simple measures like regular patching, strong passwords, and two-factor authentication can go a long way in improving security.

  3. Continuous Learning: The field of cybersecurity is constantly evolving, making continuous learning a necessity. Professionals should embrace this aspect of the field and seek out opportunities to expand their knowledge and skills.

  4. The Human Element: While technology plays a crucial role in cybersecurity, the human element should not be overlooked. From the importance of soft skills in career advancement to the potential of well-trained users as a line of defense, the human aspect is integral to effective cybersecurity.

  5. Balanced Perspective: While cybersecurity threats are real and significant, it's important to maintain a balanced perspective. Understanding the true nature of threats can help individuals and organizations respond appropriately without succumbing to unnecessary fear or complacency.

  6. Practical Experience: Hands-on experience is highly valued in the cybersecurity field. Whether it's setting up a vulnerable web server at home or seeking employment in industries where you can gain real-world experience, practical knowledge is crucial.

  7. Community Engagement: Engaging with the broader cybersecurity community through networking, public speaking, writing, or offering training can significantly boost career prospects and contribute to the field's collective knowledge.

  8. Holistic Approach: Effective cybersecurity goes beyond just increasing budgets or implementing the latest technologies. It requires a holistic approach that considers the business context, user behavior, and the ever-evolving threat landscape.

In conclusion, "Tribe of Hackers" offers a wealth of insights from seasoned professionals in the cybersecurity field. Their collective wisdom paints a picture of a dynamic, challenging, and rewarding field that plays a crucial role in our increasingly digital world. Whether you're a cybersecurity professional, an aspiring entrant to the field, or simply someone interested in better protecting your digital life, the lessons shared in this book provide valuable guidance for navigating the complex world of cybersecurity.

Remember, in the world of cybersecurity, knowledge is power. By understanding the perspectives and experiences of these experts, we can all play a part in creating a safer digital environment. As we continue to rely more heavily on technology in our daily lives, the insights shared in "Tribe of Hackers" become increasingly relevant and valuable. Let's take these lessons to heart and do our part in strengthening our collective cybersecurity posture.

Books like Tribe of Hackers