Tribe of Hackers cover

Tribe of Hackers

by Marcus J Carey, Jennifer Jin

Tribe of Hackers is an essential guide for aspiring and experienced cybersecurity professionals. Through engaging interviews with 70 experts, it offers practical advice, debunks myths, and provides insights into thriving in the cybersecurity landscape, helping readers navigate challenges with confidence.

Building Real Security in a Human World

What does it really take to build meaningful cybersecurity—beyond buzzwords, fear, or flashy products? In this collection of practitioner interviews, Marcus J. Carey and Jennifer Jin bring together voices from across the industry who prove that security is a human discipline first and a technical specialization second. Collectively, these experts argue that most breaches, hiring problems, and wasted budgets happen because we misunderstand where real security comes from: from people who think critically, apply fundamentals consistently, and build trustworthy systems rather than chasing silver bullets.

Across dozens of interviews—with engineers like Robert M. Lee and developers like Jim Manico, leaders like Wendy Nather, educators like Ming Chow, and managers like Keirsten Brager—the same pattern emerges. Security that works is grounded in habits, measurement, and empathy. It rewards curiosity and community, not elitism. And it values repeatable hygiene and human process over heroics.

The Myths That Derail Progress

One recurring argument throughout the book is that cultural myths—about hackers, degrees, or magic tools—hold organizations back. Marcus J. Carey debunks the belief that attackers are superhuman geniuses constantly inventing new tricks. Instead, he shows that many successful attacks reuse the same old methods: lateral movement, unpatched software, shared credentials. Others like Ming Chow and Ian Anderson expose myths about credentials: you don’t need a computer science degree to work in cybersecurity, you need persistence and curiosity. These myths persist, the contributors argue, because of vendor marketing and HR shorthand—they reduce a complex field to easy filters, but also exclude passionate learners and waste money on unneeded tools.

Re-centering on Fundamentals

The book’s strongest through-line is that the basics work. Nearly every contributor—from Dug Song to Charles Nwatu to Jake Williams—preaches hygiene: patch systems, implement least privilege, enforce multi-factor authentication, and know what assets you own. These mundane measures prevent far more attacks than next-generation appliances ever will. As Dug Song warns, the industry obsesses over “sexy attacks” and neglects fundamentals, so organizations keep getting breached by predictable lapses: weak passwords, reused credentials, forgotten patches.

Security hygiene, in these interviews, is the moral of the story. Leaders like Jim Manico compare it to handwashing—boring but life-saving. Kent Nabors uses the historical example of early medicine resisting handwashing to show how human pride and bureaucracy delay obvious improvements. Their point: excellence in security isn’t mystery—it’s discipline applied consistently.

People, Process, and the Limits of Spending

Another core insight is that money doesn’t equal safety. Andrew Bagrin and Ron Gula describe the paradox: security spending rises yearly, but breaches persist because organizations buy disconnected tools instead of building capabilities. “Buying a race car without a pit crew,” as one puts it, epitomizes the problem. Real improvement comes from funding training, frameworks, and processes—retaining analysts, empowering sysadmins, and following frameworks like NIST or the CIS Controls. Spending should enable people and strategy, not react to panic.

Assume Breach: From Defense to Detection

A major psychological shift the experts endorse is the “assume breach” model. Robert M. Lee and Andy Malone insist that perfect prevention is fantasy; assume intrusion, then prepare to detect, contain, and recover. Under this mindset, you log diligently, use detection engineering to tune alerts, and run tabletop exercises. Charles Nwatu calls it “Detection and Response Engineering,” treating your defensive sensors as active systems, not passive recorders. Dug Song complements this by suggesting centralized identity, MFA, and segmentation to minimize the blast radius of inevitable compromises.

Culture, Communication, and Leadership

Perhaps the most surprising emphasis is cultural. Practitioners like Tracy Z. Maleeff, Deidre Diamond, and Wendy Nather argue that empathy and communication are as crucial as any technical skill. A healthy security culture trains users without fear, encourages questions, and rewards correct behavior. Leaders demonstrate humility (Robert M. Lee, Kent Nabors) and tell uncomfortable truths rather than chasing approval. They know human error isn’t stupidity—it’s predictable, fixable design failure. The best security leaders normalize learning from mistakes and praise curiosity over perfection.

In practice, that means onboarding with security, giving sysadmins authority to harden systems, and building no-blame postmortems. Culture, not compliance, builds security resilience.

Careers and Community as Lifelines

For individuals, cybersecurity thrives on community and mentorship. Many contributors—Marcus Carey, Claudio Guarnieri, Tracy Maleeff—credit conferences, open-source projects, and speaking for their breakthroughs. Degrees and certifications can help, but practical output—code, blogs, tools, collaboration—proves skill better than credentials. Keirsten Brager sees this particularly empowering for underrepresented groups: formal qualifications can open doors, but public work and mentorship keep them open.

Ultimately, the expert consensus is simple: if you build trust, practice fundamentals, keep learning, and help others do the same, you embody what modern cybersecurity desperately needs—human-centered defenders who translate complexity into capability, not mystique. This combination of humility, community, and consistency is the real “next generation” of security.


Fundamentals Beat Flashy Tools

Again and again, the interviews drive home that the simplest actions have the greatest impact. Hygiene—like patching, privileged account management, clear inventories, and MFA—is both your first and best defense. Dug Song warns that the field glamorizes zero-days but ignores missing patches; Jim Manico’s 16-character password standard or Charles Nwatu’s asset inventory questions eliminate more risk than an expensive breach appliance ever could.

Know What You Own

You cannot secure what you don’t know exists. Cheryl Biswas and Jennifer Havermann argue that inventories are the backbone of maturity. Without fast, accurate discovery of devices, data, and dependencies, even sophisticated tools blindside you. These records feed your patching and detection pipelines—just as transparent accounting feeds better decision-making.

Least Privilege and MFA

Marcus J. Carey, Jake Williams, and Terence Jackson emphasize removing local admin rights, deploying MFA, and auditing who has access to what. Each step denies attackers lateral mobility—the thing they exploit most often once inside. None of this requires large budgets; it demands coordination and leadership commitment. The same energy poured into acquiring a new firewall, if used to implement Group Policy or LAPS, can stop huge classes of attacks.

Hygiene as Culture, Not Compliance

Andy Malone and Jeff Man note that companies often treat fundamentals as chores, not values. Systems rot when you prioritize features and ignore maintenance. Executives sometimes delegate hygiene to low-level staff instead of owning it as operational risk. But like health or aviation safety, security hygiene only works when it becomes instinct—not an audit checklist.


Assume Breach, Detect Fast, Recover Well

The shift from total prevention to resilience defines modern cybersecurity. Robert M. Lee, Andy Malone, Dug Song, and Davi Ottenheimer advocate adopting an assume breach mindset—you plan for compromise as inevitable and make sure it hurts as little as possible. That mindset turns fear into focus.

Design for Failure

Andy Malone’s formula starts with data classification and rights management: encrypt, restrict, and render stolen files useless. You can’t stop every intrusion, but you can limit the payoff. Dug Song extends this to identity—centralize authentication, enforce MFA, and segment networks so that a single stolen credential doesn’t cascade.

Detection Engineering

Charles Nwatu champions building detection systems tuned for high signal, low noise. Instead of chasing alerts, good analysts design them. They aggregate DNS and endpoint logs (as Zate Berg suggests) to catch exfiltration or lateral movement early. Robert M. Lee reframes this: defenders possess more context and potential tools than attackers—it’s coordination, not capability, that decides outcomes.

Practice Response

Incident response should be muscle memory. Davi Ottenheimer recommends tabletop exercises with clear metrics: how long from anomaly detection to containment? Teams that practice recover faster and panic less. Testing (as Georgia Weidman argues elsewhere) is what turns theory into truth—it’s the only way to validate that your prevention layers operate under fire.


People and Culture First

Security succeeds when people cooperate, not when they’re blamed. Tracy Z. Maleeff, Wendy Nather, and Ben Tomhave advocate replacing fear-driven training with empathetic education. Fear hides incidents; empathy surfaces them. When users feel trusted, they report faster and act smarter.

Empathetic Training

Train early and conversationally—during onboarding, not once a year. Kelly Lum and Jayson Street suggest making awareness a living process: use real examples, walkthroughs, and positive reinforcement. Reward users who report phishing or configure 2FA correctly. Feedback loops, not PowerPoints, change behavior.

Cross-Functional Trust

Wendy Nather encourages designing systems that don't assume users understand complex security requirements. Make the secure path the easy path. Integrate with product and legal teams so risk decisions are visible and informed. When security stops acting as a gatekeeper and starts acting as a partner, every department becomes part of the defense.

Repairing Toxic Narratives

Cultural breakdown shows up as shame, silence, or misplaced hero worship. Ben Tomhave notes the so-called 'talent shortage' is often poor leadership—companies don’t invest in junior talent or humane environments. To reverse it, treat mistakes as learning data, not proof of incompetence. That’s what real maturity looks like.


The Economics of Breach and Misplaced Spending

Why do breaches keep rising despite record budgets? Andrew Bagrin, Kyle Bubp, and Ron Gula explain that most spending is reactive—triggered by fear or a headline, not strategy. Buying feels like progress; integrating is hard. The result is a sprawling, brittle ecosystem that consumes attention instead of producing defense.

Complexity Costs

Each vendor point solution adds configuration debt. Dan Cornell describes how unintegrated tools create unintentional blind spots. Keirsten Brager ties this to technical debt: legacy apps patched for compliance drain attention from proactive security. You can’t patch faster than you inherit fragility.

Refocusing Budgets

To fix this, the experts recommend funding capability, not consumption. Marcus Carey and David Kennedy push for analyst training, detection engineering, and staff retention—long-term multipliers. Ian Anderson suggests frameworks like NIST CSF that prioritize measurable improvements over vendor promises. Keirsten Brager adds: use budgets to retire obsolete systems; reducing exposure is often the smartest investment you can make.


Career Growth Through Curiosity and Connection

Cybersecurity careers, the contributors insist, grow bottom-up—from curiosity, practice, and belonging. Ming Chow and Ian Anderson stress there’s no single 'entry path.' Some start in network ops, others in teaching, others in blue-collar work. What matters is evidence of persistence and projects that prove you can think and learn.

Credentials and Alternatives

Degrees open bureaucratic doors, especially in government or compliance-heavy work, but they aren’t passports to skill. Marcus Carey and Evan Booth advocate creating living portfolios—GitHub commits, blogs, or tools that demonstrate results. Keirsten Brager adds that certifications can counter bias during screening, especially for underrepresented groups. Used strategically, not symbolically, they’re tools of empowerment.

Mentorship and Community

Mentorship—and giving back—appears constantly. Claudio Guarnieri, Deidre Diamond, and Marcus Carey advise approaching mentors with concrete requests: feedback on a report, a quick review, an introduction. Volunteering at a BSides, sharing a blog, or hosting a workshop generates visibility and goodwill. The community runs on reciprocity: when you help others, doors open. That network often matters more than any job board.

Traits That Win

Practitioners describe successful peers as endlessly curious, adaptable, and empathetic. Lesley Carhart and Ian Coldwater highlight resilience as perhaps the top skill—failure is routine, persistence rare. Combining curiosity with empathy lets you translate technical insight into human trust, the most durable career currency of all.


Leadership, Humility, and Lifelong Learning

Leadership in security is not command-and-control; it’s teaching and listening. Wendy Nather, Robert M. Lee, and Dug Song redefine leadership as humility plus clarity. A good leader admits what they don’t know, welcomes mistakes as lessons, and makes security about meaning—not fear.

Humility as a Core Skill

Kent Nabors says the most dangerous leaders believe they’ve arrived. Technology evolves too fast for arrogance. Great leaders remain students. They allocate learning time for teams and encourage experimentation. Dug Song calls this 'technolust'—a love of tinkering that sustains innovation.

Transparent Communication

Good security leaders tell the truth, even when uncomfortable. Christina Morillo and Ben Tomhave emphasize translating risk honestly into business language. Truth builds credibility; spin erodes it. The goal isn’t invincibility; it’s resilience under scrutiny.

Resilience and Meaning

Every veteran in the book recounts mistakes—a botched deployment, a missed threat, a broken database. But they treat errors as data, not disgrace. Dug Song distills a broader ethos: a meaningful life means protecting people and building communities that last. In security, that’s leadership at its highest form.

Dig Deeper

Get personalized prompts to apply these lessons to your life and deepen your understanding.

Go Deeper

Get the Full Experience

Download Insight Books for AI-powered reflections, quizzes, and more.