// Comparison

Cyberjutsu vs How Cybersecurity Really Works: Which Should You Read?

Two cybersecurity books on Defensive, compared honestly: who each is for, what each does best, and which to read first.

Beginner
3/52021
Cyberjutsu

Cybersecurity for the Modern Ninja

Ben McCarty

Ben McCarty maps declassified medieval ninja scrolls onto modern adversary tradecraft. More analogy-driven than technical, useful for security-program framing.

Beginner
4/52021
How Cybersecurity Really Works

A Hands-On Guide for Total Beginners

Sam Grubb

Sam Grubb's gentle, exercise-driven introduction for non-specialists who need a working mental model of attacker behaviour and basic defence.

Read this if

Security program managers and CISOs looking for non-technical framing for executive conversations. McCarty's analogies between feudal-Japan ninja tradecraft and modern adversary behaviour are unusual but practical for anchoring strategic discussions.
Non-engineers who need the field demystified. Grubb is the gentlest serious introduction in print: malware, phishing, network attacks, defenses, all explained in plain language without dumbing down.

Skip this if

Practitioners wanting technical depth or hands-on guidance. The book is metaphor-driven and conceptual; engineers and analysts will find the depth thin.
Engineers, IT people, or anyone who already understands how the internet works. The book assumes nothing; for technical readers it'll feel slow.

Key takeaways

  • The ninja-vs-modern-adversary analogies hold up surprisingly well, particularly around deception, patience, and information operations.
  • The framing is most useful when explaining adversary thinking to non-technical executives; the chapters on deception and counter-intelligence are the strongest.
  • Treat the book as strategy-and-vocabulary scaffolding, not as technical training; its value is in framing decisions, not making them.
  • The chapter on threat modeling for individuals (not companies) is the one most teachers steal from: how to think about your own digital risk.
  • The hands-on labs at the end of each chapter make the book usable for actual classroom teaching, not just self-study.
  • Strikes the rare balance between respects-the-reader and explains-what-an-IP-address-is. Most beginner books fail one or the other.

How they compare

We rate How Cybersecurity Really Works higher (4/5 against 3/5 for Cyberjutsu). For most readers, that means How Cybersecurity Really Works is the primary pick and Cyberjutsu is a useful follow-up.

Both books target beginner-level readers, so the choice is about topic, not difficulty.

Cyberjutsu and How Cybersecurity Really Works both cover Defensive, so reading them in sequence reinforces the same material from different angles.

Keep reading

Related topics