Jerry Barkley never worked for the government. He has no insider connections. He was never part of any think tank. He wasn’t president of anything in high school or college. He’s a middle-aged, bald-headed IT contractor from Minnesota, not a superhero.
Until the unthinkable happens.
A chance encounter with a college student victim thrusts principal fraud analyst Jesse Jonsen out of her high tech office into a street-battle against sex traffickers and her own dark past.
What a few people are saying
Virus Bomb – This story winds and twists around the world and around the Internet in intriguing and fun ways. From zero-day exploit attacks in Belfast, Ireland, to Iranian minister’s meetings in Tehran, the intermingled players develop their plots and plans that eventually come together in similar ways to a Tom Clancy novel.Dan Lohrmann, Government Technology, https://www.govtech.com/blogs/lohrmann-on-cybersecurity/book-review-virus-bomb.html
Virus Bomb – The author of “Virus Bomb”, Greg Scott is a veteran of the tumultuous IT industry who started Scott Consulting and Infrasupport Corporation with a laser focus on infrastructure and security. He currently works for an enterprise software company and holds several IT industry certifications, including CISSP number 358671. This professional background gives his novel a particularly realistic feel as a backdrop to a genuine suspense thriller of a read from first page to last.Midwest Book Review https://www.midwestbookreview.com/wbw/jul_19.htm#MysterySuspense (Search for “Virus Bomb”)
Bullseye Breach – A Michael Crichton-like whirlwind story
The issue isn’t can a functional and economically attractive Cloud solution be built (typically they can!), it’s can it be done in a manner where all parties that use it have confidence in the security of the information and the resources to provide availability and integrity for all information. That’s the Big Deal, and that’s what Bulleye Breach so cleverly shares through a Michael Crichton-like whirlwind story that is very hard to put down once you start. Part mystery, part suspense, part education, part technology, and all entertainment, Bullseye Breach is an extremely impressive first offering from author Greg Scott. You don’t need to be particularly well-versed in IT to enjoy it, but you will be wiser after you read it.
Ken Steinhardt, Computer Scientist
Bullseye Breach – After reading the book, I actually have a better idea of how a multi-vector compromise happens, and how the little signs that should have been caught were missed. In the end, I think that is the message you are trying to deliver. You hit the nail pretty squarely.Al Gillen, Program VP, Servers and System Software, IDC
Bullseye Breach – A perfect foray into how things can go terribly wwrrroonnggg.Winn Schwartau
A most ambitious look at the global security ramifications of the simplest error in judgement. How a single person, with little or no security awareness, triggers an escalating cascade of cyber-devastation on every continent. This is a perfect foray into how things can go terribly wwrrroonnggg… And all it took to get started was – One Thoughtless <Click>.
The Security Awareness Company
Author, “Information Warfare” and “Pearl Harbor Dot Com” (Die Hard IV)
In Bullseye Breach, after buying a box of cereal at Minneapolis based retailer, Bullseye Stores, Jerry became another victim after Russian mobsters invaded over the internet to steal forty million customer credit card numbers. But he found a way to teach the Russians they picked on the wrong victim.
A few years later, after uncovering the largest cyberattack in history in Virus Bomb, Jerry found a way to shut down the follow-on biological attack. Thousands of people lived because Jerry took action, even after nobody believed his warnings.
Maybe Jerry really is a superhero. Because real superheroes are ordinary people who step up. Even when they don’t want to.
Virus Bomb release event, livestreamed, Tuesday, May 14, 2019, 7:00 PM US Central Daylight Time (GMT-5)