Advertisement ยท 728 ร— 90
#
Hashtag
#CyberCanon
Advertisement ยท 728 ร— 90
CyberCanon's review of A CISO Guide to Resilience

CyberCanon's review of A CISO Guide to Resilience

๐Ÿ›ก๏ธ ๐—ง๐—ผ๐—ฑ๐—ฎ๐˜†'๐˜€ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„! ๐Ÿงฑ

This week, our #CyberCanon Committee provides you with Debra Baker's ๐˜ผ ๐˜พ๐™„๐™Ž๐™Š ๐™‚๐™ช๐™ž๐™™๐™š ๐™ฉ๐™ค ๐˜พ๐™ฎ๐™—๐™š๐™ง ๐™๐™š๐™จ๐™ž๐™ก๐™ž๐™š๐™ฃ๐™˜๐™š.

Read Jack Freund, Ph.D.'s assessment ๐Ÿ‘‰ lnkd.in/ezhBCVAs

#CybersecurityBooks #CISO #CyberResilience

2 2 0 0

๐Ÿ›๏ธ Reminder: Our review pages contain links to purchase via Amazon or your local bookstore via Bookshop(dot)org. Doing so supports the #CyberCanon, a 100% volunteer-run nonprofit. ๐Ÿ™

1 0 0 0

Two #CyberCanon books of many that cover related themes:

๐™‰๐™–๐™ซ๐™ž๐™œ๐™–๐™ฉ๐™ž๐™ฃ๐™œ ๐™ฉ๐™๐™š ๐˜ฟ๐™ž๐™œ๐™ž๐™ฉ๐™–๐™ก ๐˜ผ๐™œ๐™š - cyber risk at the board/executive level: tinyurl.com/4sdkmxk4

๐™๐™๐™š ๐˜พ๐™„๐™Ž๐™Š ๐™‹๐™ก๐™–๐™ฎ๐™—๐™ค๐™ค๐™  - structured guidance on 3rd party risk: tinyurl.com/2e2vp39y

#CybersecurityBooks #CybersecurityHistory #DataBreach

1 0 0 0
CyberCanon November Review Recap

CyberCanon November Review Recap

๐Ÿ—“๏ธ๐—ก๐—ผ๐˜ƒ๐—ฒ๐—บ๐—ฏ๐—ฒ๐—ฟ ๐—•๐—ผ๐—ผ๐—ธ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐—ฅ๐—ฒ๐—ฐ๐—ฎ๐—ฝ!๐Ÿ“š

It's already a couple of weeks into December, but we'd be remiss not to share our monthly review recap for November...

Each review page on our site now includes affiliate links to purchase the books, supporting the Canon. ๐Ÿ™

#CyberCanon #CybersecurityBooks
(1/3...)

2 2 1 0

No jump scares. Just power grids going dark, global companies paralyzed, and governments scrambling in the shadows.

At #CyberCanon, we honor books that reveal how close the digital and physical worlds really are and how fragile our sense of safety can be when the next exploit lurks unseen.

1 0 0 0

...(2/2)

"I believe itโ€™s a worthy candidate for the Cybersecurity Canonโ€”not because it teaches us how to respond to incidents, but because it challenges us to become the kind of people others want to follow when incidents hit."
-Caroline Wong, #CyberCanon Committee Member

#CybersecurityBooks

1 0 0 0
The CyberNest x CyberCanon Partnership Announcement

The CyberNest x CyberCanon Partnership Announcement

๐Ÿ“ข ๐—ง๐—ต๐—ฒ ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐—ก๐—ฒ๐˜€๐˜ ๐˜… ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐—–๐—ฎ๐—ป๐—ผ๐—ป ๐—ฃ๐—ฎ๐—ฟ๐˜๐—ป๐—ฒ๐—ฟ๐˜€๐—ต๐—ถ๐—ฝ ๐Ÿค

#Cybersecurity has no shortage of noise. What professionals need is ๐˜€๐—ถ๐—ด๐—ป๐—ฎ๐—น.

Thatโ€™s why weโ€™re excited to announce a new #partnership:

๐Ÿ“š #CyberCanon curates timeless, peer-reviewed cybersecurity books every professional should know.
...(1/3)

2 1 1 0
Preview
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers - CyberCanon I recommend โ€œSandworm" to the Cybersecurity Canon Hall of Fame. It completes a triad of recent must-read Cybersecurity Canon Hall of Fame books that not only

(2/2) Andy is a rare 2X #CyberCanon Hall of Fame winner for his books Sandworm and Tracers in the Dark.

๐™Ž๐™–๐™ฃ๐™™๐™ฌ๐™ค๐™ง๐™ข review: tinyurl.com/mu9aht95

๐™๐™ง๐™–๐™˜๐™š๐™ง๐™จ ๐™ž๐™ฃ ๐™ฉ๐™๐™š ๐˜ฟ๐™–๐™ง๐™  review: tinyurl.com/3xw76xxp

#CyberCanonHoF #Cybersecurity #CybersecurityBooks

3 0 0 0
Preview
Artificial Intelligence and Machine Learning Foundations: Learning from Experience - CyberCanon I recommend this nonfiction book for the Cybersecurity Canon Hall of Fame.

(2/2)
...the #CyberCanon Hall of Fame ๐Ÿฆ.

Read why ๐˜ผ๐™ง๐™ฉ๐™ž๐™›๐™ž๐™˜๐™ž๐™–๐™ก ๐™„๐™ฃ๐™ฉ๐™š๐™ก๐™ก๐™ž๐™œ๐™š๐™ฃ๐™˜๐™š ๐™–๐™ฃ๐™™ ๐™ˆ๐™–๐™˜๐™๐™ž๐™ฃ๐™š ๐™‡๐™š๐™–๐™ง๐™ฃ๐™ž๐™ฃ๐™œ ๐™๐™ค๐™ช๐™ฃ๐™™๐™–๐™ฉ๐™ž๐™ค๐™ฃ๐™จ: ๐™‡๐™š๐™–๐™ง๐™ฃ๐™ž๐™ฃ๐™œ ๐™๐™ง๐™ค๐™ข ๐™€๐™ญ๐™ฅ๐™š๐™ง๐™ž๐™š๐™ฃ๐™˜๐™š by Andrew Lowe and Steve Lawless is a #CyberCanonHoF candidate ๐Ÿ‘‰ tinyurl.com/326sztx9

Publisher: BCS, The Chartered Institute for IT - @wearebcs.bsky.social

2 0 0 0
CyberCanon's Review of The Coming Wave

CyberCanon's Review of The Coming Wave

๐ŸŒŠ ๐—ก๐—ฒ๐˜„ ๐—•๐—ผ๐—ผ๐—ธ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„(๐˜€)! ๐ŸŒŠ

This week, not 1, but 2๏ธโƒฃ #CyberCanon Committee Members review ๐™๐™๐™š ๐˜พ๐™ค๐™ข๐™ž๐™ฃ๐™œ ๐™’๐™–๐™ซ๐™š by @mustafasuleymanai.bsky.social with Michael Bhaskar.

This book is widely known, but to what extent does it offer meaningful value to cybersecurity professionals? ๐Ÿค”

This is exactly...
(1/2)

2 1 1 0
Graphic of CyberCanon review of Hacked

Graphic of CyberCanon review of Hacked

๐Ÿšจ๐Ÿ“– ๐—ก๐—ฒ๐˜„ ๐—•๐—ผ๐—ผ๐—ธ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฟ๐—ผ๐—ฝ! ๐Ÿ“–๐Ÿšจ

This week Joanna Grama @runforserenity.bsky.social
submits her review of Jessica Barkerโ€™s ๐™ƒ๐™–๐™˜๐™ ๐™š๐™™: ๐™๐™๐™š ๐™Ž๐™š๐™˜๐™ง๐™š๐™ฉ๐™จ ๐˜ฝ๐™š๐™๐™ž๐™ฃ๐™™ ๐˜พ๐™ฎ๐™—๐™š๐™ง ๐˜ผ๐™ฉ๐™ฉ๐™–๐™˜๐™ ๐™จ.

๐Ÿ“ Full review ๐Ÿ‘‰ tinyurl.com/mryyszv5

๐Ÿ›’ Get the book for $11! ๐Ÿ‘‰ amzn.to/4n5W6DC

#CyberCanon #Cybersecurity #CybersecurityBooks #Hacking

3 1 1 1
Post image Post image

Jon also led a boisterous session with John Fokker in front of a packed crowd of hundreds on #REvil.

Read more about this story and others from #HackerSummerCamp in our August Newsletter ๐Ÿ‘‰ tinyurl.com/canon-aug25-nl

#CyberCanon #CybersecurityBooks #CTI #Ransomware

0 0 0 0
AI-Generated image of a steel mailbox with padlock, substack logo and a CyberCanon newsletter in its slot

AI-Generated image of a steel mailbox with padlock, substack logo and a CyberCanon newsletter in its slot

Our August Newsletter ๐Ÿ—ž๏ธ is now live featuring #CyberCanon Hall of Fame winners, candidates, and cyber author-focused recaps from #BlackHat and #defcon.

Definitely worth taking a peek ๐Ÿ‘‰ tinyurl.com/canon-aug25-nl

1 1 0 0

From Edwin: "[I] highly recommend it to practitioners who have an appreciation for historical context, those looking for inspiration from the past, and anyone working with embedded devices where some of these problems are occasionally still present."
#Cybersecurity #CybersecurityBooks #CyberCanon

0 0 0 0

โ€ฆ
๐Ÿ…’ Welcomed 4 new committee members
๐Ÿ…’ 50 new reviews are currently staged with more arriving weekly!

#CyberCanon #CyberCanonHoF #CybersecurityBooks #EDR #Cyberespionage

0 0 0 0
Photo of How I Rob Banks by FC aka Freakyclown at the Black Hat Book Store

Photo of How I Rob Banks by FC aka Freakyclown at the Black Hat Book Store

๐Ÿ”Ž ๐Ÿ“– ๐—ก๐—ฒ๐˜„ ๐—•๐—ผ๐—ผ๐—ธ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„! ๐Ÿ“– ๐Ÿ”

โ€œ๐™ƒ๐™ค๐™ฌ ๐™„ ๐™๐™ค๐™— ๐˜ฝ๐™–๐™ฃ๐™ ๐™จ is an engaging, fast-paced read that offers a firsthand look into the world of physical penetration testing. Equal parts storytelling, security insight and personal reflection, the book aims to inform and entertain.โ€

-Walt Powell, #CyberCanon Committee

2 1 1 0
Preview
๐Ÿฒ ๐Ÿ“š ๐—œ๐˜'๐˜€ ๐—•๐—ผ๐—ผ๐—ธ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฎ๐˜†! | Cybersecurity Canon ๐Ÿฒ ๐Ÿ“š ๐—œ๐˜'๐˜€ ๐—•๐—ผ๐—ผ๐—ธ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฎ๐˜†! ๐Ÿ“š๐Ÿฒ "Chris H. (Hughes) and Nikki Robinson provide a valuable contribution to our profession with ๐˜Œ๐˜ง๐˜ง๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ท๐˜ฆ ๐˜๐˜ถ๐˜ญ๐˜ฏ๐˜ฆ๐˜ณ๐˜ข๐˜ฃ๐˜ช๐˜ญ๐˜ช๐˜ต๐˜บ ๐˜”๐˜ข๐˜ฏ๐˜ข๐˜จ๐˜ฆ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต: ๐˜”๐˜ข๐˜ฏ๐˜ข๐˜จ๐˜ช๐˜ฏ๐˜จ ๐˜™๐˜ช๐˜ด๐˜ฌ ๐˜ช๐˜ฏ ๐˜ต๐˜ฉ๐˜ฆ ๐˜๐˜ถ๐˜ญ๐˜ฏ๐˜ฆ๐˜ณ๐˜ข๐˜ฃ๐˜ญ๐˜ฆ ๐˜‹๐˜ช๐˜จ๐˜ช๐˜ต๐˜ข๐˜ญ ๐˜Œ...

...vulnerability management."

-- #CyberCanon Review Committee Member Matt Stamper

Full Review ๐Ÿ‘‰ tinyurl.com/36dw34an

#Cybersecurity #VulnerabilityManagement #CybersecurityBooks

0 0 0 0
Preview
A Brief History of Artificial Intelligence: What It Is, Where We Are, and Where We Are Going - CyberCanon This book is a history of the evolution of the artificial intelligence research field from the 1930s until about 2020. Itโ€™s not a must-read for all infosec

...he has written over 500 papers and 9 books on the topic.

๐Ÿ‘‰Check out Rick Howard's review of ๐˜ˆ ๐˜‰๐˜ณ๐˜ช๐˜ฆ๐˜ง ๐˜๐˜ช๐˜ด๐˜ต๐˜ฐ๐˜ณ๐˜บ ๐˜ฐ๐˜ง ๐˜ˆ๐˜ณ๐˜ต๐˜ช๐˜ง๐˜ช๐˜ค๐˜ช๐˜ข๐˜ญ ๐˜๐˜ฏ๐˜ต๐˜ฆ๐˜ญ๐˜ญ๐˜ช๐˜จ๐˜ฆ๐˜ฏ๐˜ค๐˜ฆ: ๐˜ž๐˜ฉ๐˜ข๐˜ต ๐˜๐˜ต ๐˜๐˜ด, ๐˜ž๐˜ฉ๐˜ฆ๐˜ณ๐˜ฆ ๐˜ž๐˜ฆ ๐˜ˆ๐˜ณ๐˜ฆ, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ž๐˜ฉ๐˜ฆ๐˜ณ๐˜ฆ ๐˜ž๐˜ฆ ๐˜ˆ๐˜ณ๐˜ฆ ๐˜Ž๐˜ฐ๐˜ช๐˜ฏ๐˜จ.

tinyurl.com/2dkzax3z

@rick-howard.bsky.social | #CyberCanon #Cybersecurity #CybersecurityBooks #AI #History

2 1 0 0

Last night, Kim joined #CyberCanon President Rick Howard at the ๐˜ž๐˜ฆ๐˜ฅ๐˜ฏ๐˜ฆ๐˜ด๐˜ฅ๐˜ข๐˜บ ๐˜ž๐˜ฆ๐˜ฆ ๐˜‹๐˜ณ๐˜ข๐˜ฎ gathering for a candid discussion with an eager group of ~40 cyber leaders.

This event was coordinated before the recent Operation Midnight Hammer attack, making the timing for this Stuxnet conversation impeccable.

0 0 1 0

#CyberCanon #CybersecurityBooks #DevOps #Compliance #BookReview

1 0 0 0
CyberCanon Newsletter #1 coming out of a steel pad-locked mailbox with a Substack logo.

CyberCanon Newsletter #1 coming out of a steel pad-locked mailbox with a Substack logo.

๐Ÿ“ The #CyberCanon Newsletter Has Landed! ๐Ÿ—ž๏ธ

Weโ€™re excited to announce the launch of our #Substack newsletter. It's your front-row seat to the best writing in #cybersecurity.

๐Ÿ”— ๐Ÿ‘‰๐Ÿผ substack.com/@cybercanon

1 1 1 0

โ€ฆbooks from the Canon library like "Spies, Lies, and Algorithms" and "Tracers in the Dark".

We learned that the University at Albany professor is a big fan of ours and provides #CyberCanon as a resource for his students. ๐Ÿ™Œ

There were also sessions by well respected #OSINT industryโ€ฆ
(2/5)

1 2 1 0

...Questions for our followers:

-Which hack do you think had the most lasting impact on society or security culture?

-If you read this book, what are your thoughts?
Let us know in the comments. ๐Ÿ‘‡ ๐Ÿ™

#CyberCanon #CybersecurityBooks #Hacking
(4/4)

1 0 1 0