www.cybercanon.org
Also known as the Cybersecurity Canon Project
Founded: 2013
For the first time, this week's review is not of a book, but a podcast.🎧
To Catch a Thief by @nicoleperlroth.bsky.social was so impactful to many on the Canon Committee that we thought it deserved a review.
See @runforserenity.bsky.social's review 👉 cybercanon.org/to-catch-a-t...
For the first time, this week's review is not of a book, but a podcast.🎧
To Catch a Thief by @nicoleperlroth.bsky.social was so impactful to many on the Canon Committee that we thought it deserved a review.
See @runforserenity.bsky.social's review 👉 cybercanon.org/to-catch-a-t...
The Cybersecurity Canon Project is a decade-old all-volunteer nonprofit seeking to be the cybersecurity pro's first source for curated, timeless, and must-consume wisdom.
If you like what we are trying to do, there are many ways to support us 👉 cybercanon.org
The Cybersecurity Canon Project is a decade-old all-volunteer nonprofit seeking to be the cybersecurity pro's first source for curated, timeless, and must-consume wisdom.
If you like what we are trying to do, there are many ways to support us 👉 cybercanon.org
Every book review on cybercanon.org includes an Amazon affiliate link that contributes a % of your purchase to the CyberCanon.
This applies to anything you buy on Amazon within 24 hours, not just books!
Every book review on cybercanon.org includes an Amazon affiliate link that contributes a % of your purchase to the CyberCanon.
This applies to anything you buy on Amazon within 24 hours, not just books!
This week, Jeff Schiemann provides a Hall of Fame recommendation of 𝙏𝙝𝙚 𝙇𝙖𝙯𝙖𝙧𝙪𝙨 𝙃𝙚𝙞𝙨𝙩, written by the accomplished investigative journalist, Geoff White.
You don't want to miss this one: tinyurl.com/3kh6t5jf
#CybersecurityBooks #CyberWar
@penguinrandomhouse.bsky.social
This week, Jeff Schiemann provides a Hall of Fame recommendation of 𝙏𝙝𝙚 𝙇𝙖𝙯𝙖𝙧𝙪𝙨 𝙃𝙚𝙞𝙨𝙩, written by the accomplished investigative journalist, Geoff White.
You don't want to miss this one: tinyurl.com/3kh6t5jf
#CybersecurityBooks #CyberWar
@penguinrandomhouse.bsky.social
𝘾𝙮𝙗𝙚𝙧 𝙒𝙖𝙧𝙨: 𝙃𝙖𝙘𝙠𝙨 𝙏𝙝𝙖𝙩 𝙎𝙝𝙤𝙘𝙠𝙚𝙙 𝙩𝙝𝙚 𝙒𝙤𝙧𝙡𝙙, by Charles Arthur, covers this and other cyber attacks.
Our review 👉 tinyurl.com/mr9tktet
#CybersecurityHistory #SonyHack #CybersecurityBooks
𝘾𝙮𝙗𝙚𝙧 𝙒𝙖𝙧𝙨: 𝙃𝙖𝙘𝙠𝙨 𝙏𝙝𝙖𝙩 𝙎𝙝𝙤𝙘𝙠𝙚𝙙 𝙩𝙝𝙚 𝙒𝙤𝙧𝙡𝙙, by Charles Arthur, covers this and other cyber attacks.
Our review 👉 tinyurl.com/mr9tktet
#CybersecurityHistory #SonyHack #CybersecurityBooks
Check out Rick Howard's review, an entertaining read in itself 👉 tinyurl.com/4ewxp576
@rick-howard.bsky.social
@theatlantic.com
(1/2..)
Check out Rick Howard's review, an entertaining read in itself 👉 tinyurl.com/4ewxp576
@rick-howard.bsky.social
@theatlantic.com
(1/2..)
🏭 George discussed 𝘾𝙤𝙪𝙣𝙩𝙚𝙧𝙞𝙣𝙜 𝘾𝙮𝙗𝙚𝙧 𝙎𝙖𝙗𝙤𝙩𝙖𝙜𝙚 by Andrew Bochman and Sarah Freeman 👉 tinyurl.com/4pdbrufk
🏗️ Adrian shared Ross Haleliuk's 𝘾𝙮𝙗𝙚𝙧 𝙛𝙤𝙧 𝘽𝙪𝙞𝙡𝙙𝙚𝙧𝙨 👉 tinyurl.com/2envxjx9
🏭 George discussed 𝘾𝙤𝙪𝙣𝙩𝙚𝙧𝙞𝙣𝙜 𝘾𝙮𝙗𝙚𝙧 𝙎𝙖𝙗𝙤𝙩𝙖𝙜𝙚 by Andrew Bochman and Sarah Freeman 👉 tinyurl.com/4pdbrufk
🏗️ Adrian shared Ross Haleliuk's 𝘾𝙮𝙗𝙚𝙧 𝙛𝙤𝙧 𝘽𝙪𝙞𝙡𝙙𝙚𝙧𝙨 👉 tinyurl.com/2envxjx9
Jeny Teheran discusses why Dr. Susan Landau’s 𝙇𝙞𝙨𝙩𝙚𝙣𝙞𝙣𝙜 𝙄𝙣 is a must-read exploration of privacy, encryption, and the ongoing struggle over government access to secure systems, recommending it for the CyberCanon Hall of Fame.
📝Review: cybercanon.org/listening-in...
(1/2..)
Jeny Teheran discusses why Dr. Susan Landau’s 𝙇𝙞𝙨𝙩𝙚𝙣𝙞𝙣𝙜 𝙄𝙣 is a must-read exploration of privacy, encryption, and the ongoing struggle over government access to secure systems, recommending it for the CyberCanon Hall of Fame.
📝Review: cybercanon.org/listening-in...
(1/2..)
Our most recent #Newsletter covers an Infosecurity Magazine article that aligns with the book’s theme.
📰: cybercanon.substack.com/p/november-n...
Our most recent #Newsletter covers an Infosecurity Magazine article that aligns with the book’s theme.
📰: cybercanon.substack.com/p/november-n...
Our most recent #Newsletter covers an Infosecurity Magazine article that aligns with the book’s theme.
📰: cybercanon.substack.com/p/november-n...
Our most recent #Newsletter covers an Infosecurity Magazine article that aligns with the book’s theme.
📰: cybercanon.substack.com/p/november-n...
“𝘋𝘳. 𝘑𝘦𝘢𝘯-𝘗𝘩𝘪𝘭𝘪𝘱𝘱𝘦 𝘈𝘶𝘮𝘢𝘴𝘴𝘰𝘯 𝘪𝘴 𝘵𝘩𝘦 𝘚𝘵𝘦𝘷𝘦𝘯 𝘚𝘱𝘪𝘦𝘭𝘣𝘦𝘳𝘨 𝘰𝘧 𝘤𝘳𝘺𝘱𝘵𝘰𝘨𝘳𝘢𝘱𝘩𝘺. 𝘑𝘗 𝘬𝘯𝘰𝘸𝘴 𝘩𝘰𝘸 𝘵𝘰 𝘵𝘦𝘭𝘭 𝘢 𝘴𝘵𝘰𝘳𝘺.”
- Sandip Dholakia, in his review of @aumasson.jp's 𝗖𝗿𝘆𝗽𝘁𝗼 𝗗𝗶𝗰𝘁𝗶𝗼𝗻𝗮𝗿𝘆, recommending it for the Canon Hall of Fame.
📝 Read the review: cybercanon.org/crypto-dicti...
“𝘋𝘳. 𝘑𝘦𝘢𝘯-𝘗𝘩𝘪𝘭𝘪𝘱𝘱𝘦 𝘈𝘶𝘮𝘢𝘴𝘴𝘰𝘯 𝘪𝘴 𝘵𝘩𝘦 𝘚𝘵𝘦𝘷𝘦𝘯 𝘚𝘱𝘪𝘦𝘭𝘣𝘦𝘳𝘨 𝘰𝘧 𝘤𝘳𝘺𝘱𝘵𝘰𝘨𝘳𝘢𝘱𝘩𝘺. 𝘑𝘗 𝘬𝘯𝘰𝘸𝘴 𝘩𝘰𝘸 𝘵𝘰 𝘵𝘦𝘭𝘭 𝘢 𝘴𝘵𝘰𝘳𝘺.”
- Sandip Dholakia, in his review of @aumasson.jp's 𝗖𝗿𝘆𝗽𝘁𝗼 𝗗𝗶𝗰𝘁𝗶𝗼𝗻𝗮𝗿𝘆, recommending it for the Canon Hall of Fame.
📝 Read the review: cybercanon.org/crypto-dicti...
In case you missed any...
🧑💼 𝙏𝙝𝙚 𝙏𝙧𝙖𝙣𝙨𝙛𝙤𝙧𝙢𝙖𝙩𝙞𝙤𝙣𝙖𝙡 𝙇𝙚𝙖𝙙𝙚𝙧: tinyurl.com/94z7ujsu
🔏 𝘿𝙞𝙛𝙛𝙚𝙧𝙚𝙣𝙩𝙞𝙖𝙡 𝙋𝙧𝙞𝙫𝙖𝙘𝙮: tinyurl.com/2s3jk4cn
🤖 𝘼𝙄-𝘿𝙧𝙞𝙫𝙚𝙣 𝘾𝙮𝙗𝙚𝙧𝙨𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙖𝙣𝙙 𝙏𝙝𝙧𝙚𝙖𝙩 𝙄𝙣𝙩𝙚𝙡𝙡𝙞𝙜𝙚𝙣𝙘𝙚: tinyurl.com/4k263a9c
🧠 𝙐𝙣𝙠𝙣𝙤𝙬𝙖𝙗𝙡𝙚 𝙈𝙞𝙣𝙙𝙨: tinyurl.com/yc4r5r4r
#CybersecurityBooks
In case you missed any...
🧑💼 𝙏𝙝𝙚 𝙏𝙧𝙖𝙣𝙨𝙛𝙤𝙧𝙢𝙖𝙩𝙞𝙤𝙣𝙖𝙡 𝙇𝙚𝙖𝙙𝙚𝙧: tinyurl.com/94z7ujsu
🔏 𝘿𝙞𝙛𝙛𝙚𝙧𝙚𝙣𝙩𝙞𝙖𝙡 𝙋𝙧𝙞𝙫𝙖𝙘𝙮: tinyurl.com/2s3jk4cn
🤖 𝘼𝙄-𝘿𝙧𝙞𝙫𝙚𝙣 𝘾𝙮𝙗𝙚𝙧𝙨𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙖𝙣𝙙 𝙏𝙝𝙧𝙚𝙖𝙩 𝙄𝙣𝙩𝙚𝙡𝙡𝙞𝙜𝙚𝙣𝙘𝙚: tinyurl.com/4k263a9c
🧠 𝙐𝙣𝙠𝙣𝙤𝙬𝙖𝙗𝙡𝙚 𝙈𝙞𝙣𝙙𝙨: tinyurl.com/yc4r5r4r
#CybersecurityBooks
It covers various topics, including #hactivism, and how @parmy.bsky.social 's Hall of Fame book, 𝙒𝙚 𝘼𝙧𝙚 𝘼𝙣𝙤𝙣𝙮𝙢𝙤𝙪𝙨, ties into today's cyber threats.
📰 tinyurl.com/2zbsvsfx
It covers various topics, including #hactivism, and how @parmy.bsky.social 's Hall of Fame book, 𝙒𝙚 𝘼𝙧𝙚 𝘼𝙣𝙤𝙣𝙮𝙢𝙤𝙪𝙨, ties into today's cyber threats.
📰 tinyurl.com/2zbsvsfx
This week, Kevin Magee provides a Hall of Fame recommendation for Sarah Armstrong-Smith’s 𝙐𝙣𝙙𝙚𝙧𝙨𝙩𝙖𝙣𝙙 𝙩𝙝𝙚 𝘾𝙮𝙗𝙚𝙧 𝘼𝙩𝙩𝙖𝙘𝙠𝙚𝙧 𝙈𝙞𝙣𝙙𝙨𝙚𝙩
Read why he believes it will help you "transform your response to threats" ➡️ tinyurl.com/56nzxp5z
#CISO #SecurityAwareness #ThreatIntelligence
This week, Kevin Magee provides a Hall of Fame recommendation for Sarah Armstrong-Smith’s 𝙐𝙣𝙙𝙚𝙧𝙨𝙩𝙖𝙣𝙙 𝙩𝙝𝙚 𝘾𝙮𝙗𝙚𝙧 𝘼𝙩𝙩𝙖𝙘𝙠𝙚𝙧 𝙈𝙞𝙣𝙙𝙨𝙚𝙩
Read why he believes it will help you "transform your response to threats" ➡️ tinyurl.com/56nzxp5z
#CISO #SecurityAwareness #ThreatIntelligence
On November 2, 1988, the Morris Worm became the first major computer virus to spread across the Internet.
𝙁𝙖𝙣𝙘𝙮 𝘽𝙚𝙖𝙧 𝙂𝙤𝙚𝙨 𝙋𝙝𝙞𝙨𝙝𝙞𝙣𝙜 by @scottjshapiro.bsky.social , covers the #MorrisWorm as one of its five infamous hacks. Our review ➡️ tinyurl.com/r2b3zc2u
(1/3..)
On November 2, 1988, the Morris Worm became the first major computer virus to spread across the Internet.
𝙁𝙖𝙣𝙘𝙮 𝘽𝙚𝙖𝙧 𝙂𝙤𝙚𝙨 𝙋𝙝𝙞𝙨𝙝𝙞𝙣𝙜 by @scottjshapiro.bsky.social , covers the #MorrisWorm as one of its five infamous hacks. Our review ➡️ tinyurl.com/r2b3zc2u
(1/3..)
In 𝙎𝙖𝙣𝙙𝙬𝙤𝙧𝙢, @agreenberg.bsky.social unravels a real-life cyber-thriller. A Russian hacking unit unleashes chaos around the world, turning code into a weapon and critical infrastructure into targets.
💀 tinyurl.com/mu9aht95
In 𝙎𝙖𝙣𝙙𝙬𝙤𝙧𝙢, @agreenberg.bsky.social unravels a real-life cyber-thriller. A Russian hacking unit unleashes chaos around the world, turning code into a weapon and critical infrastructure into targets.
💀 tinyurl.com/mu9aht95
𝙄𝙛 𝙄𝙩’𝙨 𝙎𝙢𝙖𝙧𝙩, 𝙄𝙩’𝙨 𝙑𝙪𝙡𝙣𝙚𝙧𝙖𝙗𝙡𝙚 by Mikko Hypponen weaves technical insight with human stories, showing how every connected thing holds risk.
tinyurl.com/y9ne2uzk
𝙄𝙛 𝙄𝙩’𝙨 𝙎𝙢𝙖𝙧𝙩, 𝙄𝙩’𝙨 𝙑𝙪𝙡𝙣𝙚𝙧𝙖𝙗𝙡𝙚 by Mikko Hypponen weaves technical insight with human stories, showing how every connected thing holds risk.
tinyurl.com/y9ne2uzk
Jeffrey Pierdomenico dives into Mark Bailey’s Unknowable Minds, exploring AI, ethics, and security.
“Putting humanity above all else” has never felt more urgent.
🔗 cybercanon.org/unknowable-minds
From: @imprintacademic.bsky.social
#AIsecurity #CybersecurityBooks
Jeffrey Pierdomenico dives into Mark Bailey’s Unknowable Minds, exploring AI, ethics, and security.
“Putting humanity above all else” has never felt more urgent.
🔗 cybercanon.org/unknowable-minds
From: @imprintacademic.bsky.social
#AIsecurity #CybersecurityBooks
We celebrate books that go beyond technical defense to 𝙩𝙧𝙖𝙣𝙨𝙛𝙤𝙧𝙢 our understanding of security, like @perrycarpenter.bsky.social 's 𝙏𝙧𝙖𝙣𝙨𝙛𝙤𝙧𝙢𝙖𝙩𝙞𝙤𝙣𝙖𝙡 𝙎𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝘼𝙬𝙖𝙧𝙚𝙣𝙚𝙨𝙨
(1/2)...
We celebrate books that go beyond technical defense to 𝙩𝙧𝙖𝙣𝙨𝙛𝙤𝙧𝙢 our understanding of security, like @perrycarpenter.bsky.social 's 𝙏𝙧𝙖𝙣𝙨𝙛𝙤𝙧𝙢𝙖𝙩𝙞𝙤𝙣𝙖𝙡 𝙎𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝘼𝙬𝙖𝙧𝙚𝙣𝙚𝙨𝙨
(1/2)...
This week, Daniel "Rags" Ragsdale provides a timely review of Dr. Iqbal H. Sarker's 𝘼𝙄-𝘿𝙧𝙞𝙫𝙚𝙣 𝘾𝙮𝙗𝙚𝙧𝙨𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙖𝙣𝙙 𝙏𝙝𝙧𝙚𝙖𝙩 𝙄𝙣𝙩𝙚𝙡𝙡𝙞𝙜𝙚𝙣𝙘𝙚, from Springer.
Full review 👉 tinyurl.com/4k263a9c
#Cybersecurity #AI #CybersecurityBooks #IoT #OT #ThreatIntelligence
(1/3)...
This week, Daniel "Rags" Ragsdale provides a timely review of Dr. Iqbal H. Sarker's 𝘼𝙄-𝘿𝙧𝙞𝙫𝙚𝙣 𝘾𝙮𝙗𝙚𝙧𝙨𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙖𝙣𝙙 𝙏𝙝𝙧𝙚𝙖𝙩 𝙄𝙣𝙩𝙚𝙡𝙡𝙞𝙜𝙚𝙣𝙘𝙚, from Springer.
Full review 👉 tinyurl.com/4k263a9c
#Cybersecurity #AI #CybersecurityBooks #IoT #OT #ThreatIntelligence
(1/3)...
🔦https://tinyurl.com/33n4y4w9
In this edition, we are shining a light on a Hall of Famer for #CybersecurityAwarenessMonth:
🦊𝘾𝙮𝙗𝙚𝙧𝙨𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙈𝙮𝙩𝙝𝙨 𝙖𝙣𝙙 𝙈𝙞𝙨𝙘𝙤𝙣𝙘𝙚𝙥𝙩𝙞𝙤𝙣𝙨 by Gene Spafford, @ladyofgeek.bsky.social, and josiahdykstra.bsky.social
#CybersecurityBooks
🔦https://tinyurl.com/33n4y4w9
In this edition, we are shining a light on a Hall of Famer for #CybersecurityAwarenessMonth:
🦊𝘾𝙮𝙗𝙚𝙧𝙨𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙈𝙮𝙩𝙝𝙨 𝙖𝙣𝙙 𝙈𝙞𝙨𝙘𝙤𝙣𝙘𝙚𝙥𝙩𝙞𝙤𝙣𝙨 by Gene Spafford, @ladyofgeek.bsky.social, and josiahdykstra.bsky.social
#CybersecurityBooks
Implementing #ZeroTrust has never been more important. Here are 3 book recs…
0️⃣ Hall of Famer 𝙕𝙚𝙧𝙤 𝙏𝙧𝙪𝙨𝙩 𝙉𝙚𝙩𝙬𝙤𝙧𝙠𝙨 by Evan Gilman and Doug Barth: tinyurl.com/3h5mnbyd
(1/2)...
Implementing #ZeroTrust has never been more important. Here are 3 book recs…
0️⃣ Hall of Famer 𝙕𝙚𝙧𝙤 𝙏𝙧𝙪𝙨𝙩 𝙉𝙚𝙩𝙬𝙤𝙧𝙠𝙨 by Evan Gilman and Doug Barth: tinyurl.com/3h5mnbyd
(1/2)...
#DifferentialPrivacy is an increasingly popular, though controversial, approach. This week, @benrothke.bsky.social provides a Hall of Fame recommendation of @simson.net 's 𝘋𝘪𝘧𝘧𝘦𝘳𝘦𝘯𝘵𝘪𝘢𝘭 𝘗𝘳𝘪𝘷𝘢𝘤𝘺, from @mitpress.bsky.social.
👉 tinyurl.com/2s3jk4cn
#CybersecurityBooks #DP
#DifferentialPrivacy is an increasingly popular, though controversial, approach. This week, @benrothke.bsky.social provides a Hall of Fame recommendation of @simson.net 's 𝘋𝘪𝘧𝘧𝘦𝘳𝘦𝘯𝘵𝘪𝘢𝘭 𝘗𝘳𝘪𝘷𝘢𝘤𝘺, from @mitpress.bsky.social.
👉 tinyurl.com/2s3jk4cn
#CybersecurityBooks #DP
"It’s not a cybersecurity book, but it’s a book that will help you become the kind of cybersecurity leader we need more of."
This week, Caroline Wong reviews Matt Mayberry's:
𝙏𝙝𝙚 𝙏𝙧𝙖𝙣𝙨𝙛𝙤𝙧𝙢𝙖𝙩𝙞𝙤𝙣𝙖𝙡 𝙇𝙚𝙖𝙙𝙚𝙧
Full review 👉 tinyurl.com/94z7ujsu
#CybersecurityLeaders
(1/2)...
"It’s not a cybersecurity book, but it’s a book that will help you become the kind of cybersecurity leader we need more of."
This week, Caroline Wong reviews Matt Mayberry's:
𝙏𝙝𝙚 𝙏𝙧𝙖𝙣𝙨𝙛𝙤𝙧𝙢𝙖𝙩𝙞𝙤𝙣𝙖𝙡 𝙇𝙚𝙖𝙙𝙚𝙧
Full review 👉 tinyurl.com/94z7ujsu
#CybersecurityLeaders
(1/2)...
#Cybersecurity has no shortage of noise. What professionals need is 𝘀𝗶𝗴𝗻𝗮𝗹.
That’s why we’re excited to announce a new #partnership:
📚 #CyberCanon curates timeless, peer-reviewed cybersecurity books every professional should know.
...(1/3)
#Cybersecurity has no shortage of noise. What professionals need is 𝘀𝗶𝗴𝗻𝗮𝗹.
That’s why we’re excited to announce a new #partnership:
📚 #CyberCanon curates timeless, peer-reviewed cybersecurity books every professional should know.
...(1/3)