CyberCanon
banner
cybercanon.org
CyberCanon
@cybercanon.org
720 followers 14 following 130 posts
We vet #Cybersecurity books. Our reviews are written by real life experts, heroes, and hackers who led through the biggest exploits. www.cybercanon.org Also known as the Cybersecurity Canon Project Founded: 2013
Posts Media Videos Starter Packs
"𝘛𝘩𝘦 𝘣𝘰𝘰𝘬’𝘴 𝘵𝘩𝘳𝘦𝘦-𝘱𝘢𝘳𝘵 𝘴𝘵𝘳𝘶𝘤𝘵𝘶𝘳𝘦 𝘧𝘭𝘰𝘸𝘴 𝘯𝘢𝘵𝘶𝘳𝘢𝘭𝘭𝘺 𝘧𝘳𝘰𝘮 𝘧𝘰𝘶𝘯𝘥𝘢𝘵𝘪𝘰𝘯𝘢𝘭 𝘬𝘯𝘰𝘸𝘭𝘦𝘥𝘨𝘦 𝘵𝘰 𝘵𝘦𝘤𝘩𝘯𝘪𝘤𝘢𝘭 𝘮𝘦𝘵𝘩𝘰𝘥𝘰𝘭𝘰𝘨𝘪𝘦𝘴 𝘢𝘯𝘥 𝘧𝘪𝘯𝘢𝘭𝘭𝘺 𝘵𝘰 𝘳𝘦𝘢𝘭-𝘸𝘰𝘳𝘭𝘥 𝘢𝘱𝘱𝘭𝘪𝘤𝘢𝘵𝘪𝘰𝘯𝘴 𝘪𝘯 𝘐𝘰𝘛, 𝘪𝘯𝘥𝘶𝘴𝘵𝘳𝘪𝘢𝘭 𝘤𝘰𝘯𝘵𝘳𝘰𝘭 𝘴𝘺𝘴𝘵𝘦𝘮𝘴, 𝘢𝘯𝘥 𝘤𝘳𝘪𝘵𝘪𝘤𝘢𝘭 𝘪𝘯𝘧𝘳𝘢𝘴𝘵𝘳𝘶𝘤𝘵𝘶𝘳𝘦."

Dr. Sarker's impressive accomplishments: sarker-research.net

(3/3)
"𝘛𝘩𝘦 𝘣𝘰𝘰𝘬’𝘴 𝘧𝘰𝘶𝘯𝘥𝘢𝘵𝘪𝘰𝘯𝘢𝘭 𝘪𝘯𝘴𝘪𝘨𝘩𝘵𝘴—𝘱𝘢𝘳𝘵𝘪𝘤𝘶𝘭𝘢𝘳𝘭𝘺 𝘳𝘦𝘨𝘢𝘳𝘥𝘪𝘯𝘨 𝘈𝘐 𝘦𝘵𝘩𝘪𝘤𝘴, 𝘟𝘈𝘐 𝘱𝘳𝘪𝘯𝘤𝘪𝘱𝘭𝘦𝘴, 𝘢𝘯𝘥 𝘤𝘰𝘳𝘦 𝘴𝘦𝘤𝘶𝘳𝘪𝘵𝘺 𝘧𝘳𝘢𝘮𝘦𝘸𝘰𝘳𝘬𝘴—𝘢𝘳𝘦 𝘣𝘰𝘵𝘩 𝘪𝘯𝘷𝘢𝘭𝘶𝘢𝘣𝘭𝘦 𝘢𝘯𝘥 𝘵𝘪𝘮𝘦𝘭𝘦𝘴𝘴. (...) 𝘏𝘦 𝘥𝘦𝘮𝘰𝘯𝘴𝘵𝘳𝘢𝘵𝘦𝘴 𝘢 𝘳𝘦𝘮𝘢𝘳𝘬𝘢𝘣𝘭𝘦 𝘴𝘬𝘪𝘭𝘭 𝘧𝘰𝘳 𝘮𝘢𝘬𝘪𝘯𝘨 𝘤𝘰𝘮𝘱𝘭𝘦𝘹 𝘤𝘰𝘯𝘤𝘦𝘱𝘵𝘴 𝘤𝘭𝘦𝘢𝘳 𝘢𝘯𝘥 𝘦𝘢𝘴𝘺 𝘵𝘰 𝘶𝘯𝘥𝘦𝘳𝘴𝘵𝘢𝘯𝘥."

(2/3)...
🤖🔐𝗕𝗼𝗼𝗸 𝗥𝗲𝘃𝗶𝗲𝘄 𝗗𝗿𝗼𝗽!

This week, Daniel "Rags" Ragsdale provides a timely review of Dr. Iqbal H. Sarker's 𝘼𝙄-𝘿𝙧𝙞𝙫𝙚𝙣 𝘾𝙮𝙗𝙚𝙧𝙨𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙖𝙣𝙙 𝙏𝙝𝙧𝙚𝙖𝙩 𝙄𝙣𝙩𝙚𝙡𝙡𝙞𝙜𝙚𝙣𝙘𝙚, from Springer.

Full review 👉 tinyurl.com/4k263a9c

#Cybersecurity #AI #CybersecurityBooks #IoT #OT #ThreatIntelligence

(1/3)...
🗞️Did you miss our October Newsletter?

🔦https://tinyurl.com/33n4y4w9

In this edition, we are shining a light on a Hall of Famer for #CybersecurityAwarenessMonth:

🦊𝘾𝙮𝙗𝙚𝙧𝙨𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙈𝙮𝙩𝙝𝙨 𝙖𝙣𝙙 𝙈𝙞𝙨𝙘𝙤𝙣𝙘𝙚𝙥𝙩𝙞𝙤𝙣𝙨 by Gene Spafford, @ladyofgeek.bsky.social, and josiahdykstra.bsky.social

#CybersecurityBooks
...(2/2)

0️⃣ Hall of Famer 𝙋𝙧𝙤𝙟𝙚𝙘𝙩 𝙕𝙚𝙧𝙤 𝙏𝙧𝙪𝙨𝙩 by George Finney for a fun novel: tinyurl.com/44dsc967

0️⃣ Hall of Fame candidate 𝘾𝙮𝙗𝙚𝙧𝙨𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙁𝙞𝙧𝙨𝙩 𝙋𝙧𝙞𝙣𝙘𝙞𝙥𝙡𝙚𝙨 by @rick-howard.bsky.social for overall cyber strategies, including ZT: tinyurl.com/msr8wrwy

#CybersecurityAwarenessMonth #CybersecurityBooks
Valid account usage is the #1 access vector in identity threat reports per @talosintelligence.com: tinyurl.com/2twf98ry

Implementing #ZeroTrust has never been more important. Here are 3 book recs…

0️⃣ Hall of Famer 𝙕𝙚𝙧𝙤 𝙏𝙧𝙪𝙨𝙩 𝙉𝙚𝙩𝙬𝙤𝙧𝙠𝙨 by Evan Gilman and Doug Barth: tinyurl.com/3h5mnbyd

(1/2)...
🔏𝗥𝗲𝘃𝗶𝗲𝘄 𝗗𝗮𝘆 𝗧𝘂𝗲𝘀𝗱𝗮𝘆!📖

#DifferentialPrivacy is an increasingly popular, though controversial, approach. This week, @benrothke.bsky.social provides a Hall of Fame recommendation of @simson.net 's 𝘋𝘪𝘧𝘧𝘦𝘳𝘦𝘯𝘵𝘪𝘢𝘭 𝘗𝘳𝘪𝘷𝘢𝘤𝘺, from @mitpress.bsky.social.

👉 tinyurl.com/2s3jk4cn

#CybersecurityBooks #DP
...(2/2)

"I believe it’s a worthy candidate for the Cybersecurity Canon—not because it teaches us how to respond to incidents, but because it challenges us to become the kind of people others want to follow when incidents hit."
-Caroline Wong, #CyberCanon Committee Member

#CybersecurityBooks
🛩️𝗕𝗼𝗼𝗸 𝗥𝗲𝘃𝗶𝗲𝘄 𝗗𝗮𝘆!

"It’s not a cybersecurity book, but it’s a book that will help you become the kind of cybersecurity leader we need more of."

This week, Caroline Wong reviews Matt Mayberry's:

𝙏𝙝𝙚 𝙏𝙧𝙖𝙣𝙨𝙛𝙤𝙧𝙢𝙖𝙩𝙞𝙤𝙣𝙖𝙡 𝙇𝙚𝙖𝙙𝙚𝙧

Full review 👉 tinyurl.com/94z7ujsu

#CybersecurityLeaders

(1/2)...
...Follow along as we roll out initiatives designed to give practitioners the clarity and confidence they need in an ever-changing landscape.
(3/3)
...
🪺 #TheCyberNest empowers security #leaders with trusted peer insights and paid opportunities to share their #expertise through research and advisory engagements.

Together, we bring forward the most trusted, peer-validated #knowledge to guide today’s most important security decisions... (2/3)
📢 𝗧𝗵𝗲 𝗖𝘆𝗯𝗲𝗿𝗡𝗲𝘀𝘁 𝘅 𝗖𝘆𝗯𝗲𝗿𝗖𝗮𝗻𝗼𝗻 𝗣𝗮𝗿𝘁𝗻𝗲𝗿𝘀𝗵𝗶𝗽 🤝

#Cybersecurity has no shortage of noise. What professionals need is 𝘀𝗶𝗴𝗻𝗮𝗹.

That’s why we’re excited to announce a new #partnership:

📚 #CyberCanon curates timeless, peer-reviewed cybersecurity books every professional should know.
...(1/3)
(2/2)
...Josiah writes "It does not tell readers what to think—it teaches them how to think about cybersecurity (...) equally valuable for newcomers and experienced practitioners. (...) For its breadth, clarity, and critical perspective, it belongs in the CyberCanon Hall of Fame."
⚖️𝗕𝗼𝗼𝗸 𝗥𝗲𝘃𝗶𝗲𝘄 𝗗𝗿𝗼𝗽!⚖️

This week, @josiahdykstra.bsky.social provides a Hall of Fame recommendation review of 𝘾𝙮𝙗𝙚𝙧𝙨𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙞𝙣 𝘾𝙤𝙣𝙩𝙚𝙭𝙩: 𝙏𝙚𝙘𝙝𝙣𝙤𝙡𝙤𝙜𝙮, 𝙋𝙤𝙡𝙞𝙘𝙮, 𝙖𝙣𝙙 𝙇𝙖𝙬 by professors 🧑‍🏫 Chris Hoofnagle and Golden Richard III. @nolaforensix.bsky.social

Full review 👉 tinyurl.com/mv6255mk

(1/2)...
🗓️REMINDER🗓️

Thursday, 9/25, our very own Rick Howard will be presenting at
@bitwarden.bsky.social's #OpenSourceSecuritySummit along side Rinki Sethi and Andy Greenberg agreenberg.bsky.social.

It's free, it's virtual, and it's only 2 hours, so no excuses. ☺️

👉 bitwarden.com/open-source-...

(1/2)
(2/2)
...the #CyberCanon Hall of Fame 🏦.

Read why 𝘼𝙧𝙩𝙞𝙛𝙞𝙘𝙞𝙖𝙡 𝙄𝙣𝙩𝙚𝙡𝙡𝙞𝙜𝙚𝙣𝙘𝙚 𝙖𝙣𝙙 𝙈𝙖𝙘𝙝𝙞𝙣𝙚 𝙇𝙚𝙖𝙧𝙣𝙞𝙣𝙜 𝙁𝙤𝙪𝙣𝙙𝙖𝙩𝙞𝙤𝙣𝙨: 𝙇𝙚𝙖𝙧𝙣𝙞𝙣𝙜 𝙁𝙧𝙤𝙢 𝙀𝙭𝙥𝙚𝙧𝙞𝙚𝙣𝙘𝙚 by Andrew Lowe and Steve Lawless is a #CyberCanonHoF candidate 👉 tinyurl.com/326sztx9

Publisher: BCS, The Chartered Institute for IT - @wearebcs.bsky.social
Artificial Intelligence and Machine Learning Foundations: Learning from Experience - CyberCanon
I recommend this nonfiction book for the Cybersecurity Canon Hall of Fame.
tinyurl.com
Have you heard about this new thing called #AI?!

(Yes, fairly weak attempt at humor, but give us a break, we're busy over reading and writing over here!)

This week's book may not be well known (yet), but Andrew Chrostowski thinks that needs to change and is recommending it for...
(1/2)
(2/2)
...what Jessica Buerger and Susan Hansche help determine in their insightful reviews 👉 tinyurl.com/49x3aetp

🛒 If our efforts assist in your decision to purchase, please use our affiliate link to support the Canon 👉 amzn.to/45SrpL9

#CybersecurityBooks #AICybersecurity #AI #QuantumComputing
🌊 𝗡𝗲𝘄 𝗕𝗼𝗼𝗸 𝗥𝗲𝘃𝗶𝗲𝘄(𝘀)! 🌊

This week, not 1, but 2️⃣ #CyberCanon Committee Members review 𝙏𝙝𝙚 𝘾𝙤𝙢𝙞𝙣𝙜 𝙒𝙖𝙫𝙚 by @mustafasuleymanai.bsky.social with Michael Bhaskar.

This book is widely known, but to what extent does it offer meaningful value to cybersecurity professionals? 🤔

This is exactly...
(1/2)
"𝘏𝘢𝘤𝘬𝘦𝘥 𝘰𝘧𝘧𝘦𝘳𝘴 𝘢 𝘴𝘵𝘰𝘳𝘺𝘵𝘦𝘭𝘭𝘪𝘯𝘨 𝘵𝘰𝘱𝘪𝘤-𝘣𝘢𝘴𝘦𝘥 𝘵𝘰𝘶𝘳 𝘵𝘩𝘳𝘰𝘶𝘨𝘩 𝘵𝘩𝘦 𝘸𝘰𝘳𝘭𝘥 𝘰𝘧 𝘩𝘢𝘤𝘬𝘪𝘯𝘨. 𝘛𝘩𝘦 𝘣𝘰𝘰𝘬’𝘴 𝘨𝘳𝘦𝘢𝘵𝘦𝘴𝘵 𝘴𝘵𝘳𝘦𝘯𝘨𝘵𝘩 𝘭𝘪𝘦𝘴 𝘪𝘯 𝘪𝘵𝘴 𝘢𝘤𝘤𝘦𝘴𝘴𝘪𝘣𝘪𝘭𝘪𝘵𝘺. 𝘉𝘢𝘳𝘬𝘦𝘳 𝘥𝘰𝘦𝘴 𝘢 𝘴𝘰𝘭𝘪𝘥 𝘫𝘰𝘣 𝘰𝘧 𝘦𝘹𝘱𝘭𝘢𝘪𝘯𝘪𝘯𝘨 𝘤𝘰𝘮𝘱𝘭𝘦𝘹 𝘤𝘺𝘣𝘦𝘳𝘴𝘦𝘤𝘶𝘳𝘪𝘵𝘺 𝘪𝘯𝘤𝘪𝘥𝘦𝘯𝘵𝘴 𝘪𝘯 𝘱𝘭𝘢𝘪𝘯 𝘭𝘢𝘯𝘨𝘶𝘢𝘨𝘦, [..] 𝘢 𝘸𝘰𝘳𝘵𝘩𝘸𝘩𝘪𝘭𝘦 𝘳𝘦𝘢𝘥 𝘧𝘰𝘳 𝘨𝘦𝘯𝘦𝘳𝘢𝘭 𝘢𝘶𝘥𝘪𝘦𝘯𝘤𝘦𝘴 𝘰𝘳 𝘤𝘺𝘣𝘦𝘳𝘴𝘦𝘤𝘶𝘳𝘪𝘵𝘺 𝘯𝘦𝘸𝘤𝘰𝘮𝘦𝘳𝘴."
🚨📖 𝗡𝗲𝘄 𝗕𝗼𝗼𝗸 𝗥𝗲𝘃𝗶𝗲𝘄 𝗗𝗿𝗼𝗽! 📖🚨

This week Joanna Grama @runforserenity.bsky.social
submits her review of Jessica Barker’s 𝙃𝙖𝙘𝙠𝙚𝙙: 𝙏𝙝𝙚 𝙎𝙚𝙘𝙧𝙚𝙩𝙨 𝘽𝙚𝙝𝙞𝙣𝙙 𝘾𝙮𝙗𝙚𝙧 𝘼𝙩𝙩𝙖𝙘𝙠𝙨.

📝 Full review 👉 tinyurl.com/mryyszv5

🛒 Get the book for $11! 👉 amzn.to/4n5W6DC

#CyberCanon #Cybersecurity #CybersecurityBooks #Hacking
...𝘦𝘷𝘢𝘥𝘦 𝘌𝘋𝘙, 𝘢𝘯𝘥 𝘸𝘩𝘢𝘵 𝘥𝘦𝘧𝘦𝘯𝘥𝘦𝘳𝘴 𝘤𝘢𝘯 𝘥𝘰 𝘢𝘣𝘰𝘶𝘵 𝘪𝘵. 𝘌𝘋𝘙 𝘪𝘵𝘴𝘦𝘭𝘧 𝘪𝘴 𝘦𝘹𝘵𝘳𝘦𝘮𝘦𝘭𝘺 𝘵𝘦𝘤𝘩𝘯𝘪𝘤𝘢𝘭; 𝘵𝘩𝘶𝘴, 𝘵𝘩𝘪𝘴 𝘣𝘰𝘰𝘬 𝘪𝘴 𝘢𝘭𝘴𝘰 𝘦𝘹𝘵𝘳𝘦𝘮𝘦𝘭𝘺 𝘵𝘦𝘤𝘩𝘯𝘪𝘤𝘢𝘭[...] 𝘖𝘯𝘦 𝘰𝘧 𝘵𝘩𝘦 𝘴𝘵𝘳𝘰𝘯𝘨𝘦𝘴𝘵 𝘱𝘰𝘪𝘯𝘵𝘴 𝘰𝘧 “𝘌𝘷𝘢𝘥𝘪𝘯𝘨 𝘌𝘋𝘙” 𝘪𝘴 𝘩𝘰𝘸 𝘔𝘢𝘵𝘵 𝘏𝘢𝘯𝘥 𝘥𝘪𝘴𝘵𝘪𝘭𝘭𝘴 𝘵𝘩𝘦𝘴𝘦 𝘤𝘰𝘮𝘱𝘭𝘦𝘹 𝘵𝘦𝘤𝘩𝘯𝘪𝘤𝘢𝘭 𝘵𝘰𝘱𝘪𝘤𝘴 𝘪𝘯𝘵𝘰 𝘥𝘪𝘨𝘦𝘴𝘵𝘪𝘣𝘭𝘦 𝘱𝘳𝘰𝘴𝘦."

Review 👉https://tinyurl.com/2xrx9vtj
💥📘 𝗕𝗼𝗼𝗸 𝗥𝗲𝘃𝗶𝗲𝘄 𝗗𝗮𝘆!

This week, Stephanie Pirman provides a Hall of Fame recommendation for @matterpreter.bsky.social Matt Hand's 𝙀𝙫𝙖𝙙𝙞𝙣𝙜 𝙀𝘿𝙍 from @nostarchpress.bsky.social.

Evading EDR provides "𝘢 𝘤𝘰𝘮𝘱𝘳𝘦𝘩𝘦𝘯𝘴𝘪𝘷𝘦 𝘰𝘷𝘦𝘳𝘷𝘪𝘦𝘸 𝘰𝘧 𝘌𝘋𝘙𝘴 𝘧𝘳𝘰𝘮 𝘵𝘩𝘳𝘦𝘦 𝘤𝘰𝘳𝘦 𝘱𝘦𝘳𝘴𝘱𝘦𝘤𝘵𝘪𝘷𝘦𝘴: 𝘩𝘰𝘸 𝘌𝘋𝘙 𝘸𝘰𝘳𝘬𝘴, 𝘩𝘰𝘸 𝘢𝘯 𝘢𝘵𝘵𝘢𝘤𝘬𝘦𝘳 𝘤𝘢𝘯...