๐Ÿ“Review Incoming...

This week, we dive into GRC. Andrew Chrostowski provides a Hall of Fame Rec for ๐™๐™๐™š ๐˜พ๐™ฎ๐™—๐™š๐™ง๐™จ๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐™‚๐™ช๐™ž๐™™๐™š ๐™ฉ๐™ค ๐™‚๐™ค๐™ซ๐™š๐™ง๐™ฃ๐™–๐™ฃ๐™˜๐™š, ๐™๐™ž๐™จ๐™ , ๐™–๐™ฃ๐™™ ๐˜พ๐™ค๐™ข๐™ฅ๐™ก๐™ž๐™–๐™ฃ๐™˜๐™š by Jason Edwards and Griffin Weaver.

Andrew's review ๐Ÿ‘‰ https://cybercanon.org/the-cybersecurity-guide-to-governance-risk-and-compliance/

#CybersecurityBooks #GRC #CyberCanonHoFCandidate

๐Ÿช– It's Review Day! ๐Ÿช–

Rick Howard provides his review of ๐˜ฝ๐™–๐™ฉ๐™ฉ๐™ก๐™š๐™›๐™ž๐™š๐™ก๐™™ ๐˜พ๐™ฎ๐™—๐™š๐™ง, by William Holstein and Michael McLaughlin...

๐Ÿ“ https://cybercanon.org/battlefield-cyber-how-china-and-russia-are-undermining-our-democracy-and-national-security/

#CybersecurityBooks #CyberWarfare

๐Ÿข ๐—Ÿ๐—ฎ๐˜๐—ฒ๐˜€๐˜ ๐—ฟ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐—ต๐—ฎ๐˜€ ๐—ฏ๐—ฒ๐—ฒ๐—ป ๐—ฑ๐—ฟ๐—ผ๐—ฝ๐—ฝ๐—ฒ๐—ฑ! ๐Ÿ‘‡

This week, Jose Miguel Parrella evaluates an embedded security book, ๐™€๐™ฃ๐™œ๐™ž๐™ฃ๐™š๐™š๐™ง๐™ž๐™ฃ๐™œ ๐™Ž๐™š๐™˜๐™ช๐™ง๐™š ๐˜ฟ๐™š๐™ซ๐™ž๐™˜๐™š๐™จ by Dominik Merli...

๐Ÿ“ Check out Jose's full review: https://cybercanon.org/engineering-secure-devices/

#CybersecurityBooks #EmbeddedSecurity | @jmp

It's already March, but did you catch all of our February Reviews?

๐Ÿข The Nvidia Way: https://cybercanon.org/the-nvidia-way/
๐Ÿช– Chip War: https://cybercanon.org/chip-war-the-quest-to-dominate-the-worlds-most-critical-technology/
๐Ÿงฑ CISO Guide to Cyber Resilience: https://cybercanon.org/a-ciso-guide-to-cyber-resilience/
๐Ÿซ CyBOK: https://cybercanon.org/cybok-the-cyber-security-body-of-knowledge/

Reminder, you can always head to cybercanon.org/books to view our recent reviews.

#CybersecurityBooks

๐Ÿ—ž๏ธ ๐—™๐—ฒ๐—ฏ๐—ฟ๐˜‚๐—ฎ๐—ฟ๐˜† ๐—ก๐—ฒ๐˜„๐˜€๐—น๐—ฒ๐˜๐˜๐—ฒ๐—ฟ ๐—ถ๐˜€ ๐—ต๐—ฒ๐—ฟ๐—ฒ! ๐Ÿ—ž๏ธ

This edition includes a variety of topics from building on a recent review, a Hall of Fame book highlight, #RSAC, and more...

๐Ÿ‘‰ https://cybercanon.substack.com/p/the-cybercanon-monthly-february-2026

#CybersecurityBooks #CyberCanonHallofFame

๐Ÿ›ก๏ธ ๐—ง๐—ผ๐—ฑ๐—ฎ๐˜†'๐˜€ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„! ๐Ÿงฑ

This week, our #CyberCanon Committee provides you with Debra Baker's ๐˜ผ ๐˜พ๐™„๐™Ž๐™Š ๐™‚๐™ช๐™ž๐™™๐™š ๐™ฉ๐™ค ๐˜พ๐™ฎ๐™—๐™š๐™ง ๐™๐™š๐™จ๐™ž๐™ก๐™ž๐™š๐™ฃ๐™˜๐™š.

Read Jack Freund, Ph.D.'s assessment ๐Ÿ‘‰ https://cybercanon.org/a-ciso-guide-to-cyber-resilience/

#CybersecurityBooks #CISO #CyberResilience

We enjoyed the โ€˜CPE at the Sunโ€™ ISC2 event on Friday.

Two speakers were also authors; CyberCanon Hall to Fame author, Perry Carpenter, and Corey J. Ball.

The first 100 attendees received Perryโ€™s most recent book, โ€˜FAIKโ€™.

Coreyโ€™s โ€˜Hacking APIsโ€™ was a โ€˜22 SANS Difference Maker award winner.

Seems like we have a couple more books to add to our review queue. ๐Ÿ“š

Very well run day by BIll Bowman, CISSP, CIPM, and the ISC2 Eastern Massachusetts Chapter and (ISC)2 Southern Connecticut Chapter!

#CybersecurityBooks | @perrycarpenter

โœ๏ธ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฟ๐—ผ๐—ฝ๐—ฝ๐—ฒ๐—ฑ ๐Ÿช–

We have back-to-back reviews from Larry Pesce. Today, Larry offers his insights on Chris Miller's widely well-regarded book, ๐˜พ๐™๐™ž๐™ฅ ๐™’๐™–๐™ง, from a cyber pro's perspective:

๐Ÿ“ You'll want to read this review https://cybercanon.org/chip-war-the-quest-to-dominate-the-worlds-most-critical-technology/

๐Ÿ›๏ธ Reminder: Our review pages contain links to purchase via Amazon or your local bookstore via Bookshop(dot)org. Doing so supports the #CyberCanon, a 100% volunteer-run nonprofit. ๐Ÿ™

#CybersecurityBooks | @haxorthematrix

๐Ÿ—“๏ธ ๐—๐—ฎ๐—ป๐˜‚๐—ฎ๐—ฟ๐˜† ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐—ฅ๐—ฒ๐—ฐ๐—ฎ๐—ฝ ๐Ÿ“–

We're well into February, but we like to provide monthly review recaps in case you've missed any of our recent reviews. Check out what we provided in January...

๐Ÿ’ต ๐™๐™ž๐™ฃ๐™จ๐™š๐™™
๐Ÿชผ ๐˜ฟ๐™š๐™š๐™ฅ ๐˜ฟ๐™ž๐™ซ๐™š
๐Ÿ“ฆ ๐™Ž๐™š๐™ข๐™–๐™ฃ๐™ฉ๐™ž๐™˜ ๐™ˆ๐™ค๐™™๐™š๐™ก๐™ž๐™ฃ๐™œ ๐™›๐™ค๐™ง ๐˜ฟ๐™–๐™ฉ๐™–
๐Ÿง ๐™ƒ๐™ช๐™ข๐™–๐™ฃ-๐˜พ๐™š๐™ฃ๐™ฉ๐™š๐™ง๐™š๐™™ ๐™Ž๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ

Recent Reviews:๐Ÿ‘‰ https://lnkd.in/e6B5tp5J

#CybersecurityBooks

๐Ÿ“ฐ Did you check out our latest Newsletter?

This one covers #OSINT, a classic #CISO HoFamer, and more...

๐Ÿ‘‰ https://cybercanon.substack.com/p/the-cybercanon-monthly-january-2026

#CybersecurityBooks #CyberCanonHallofFame