We had another strong month of reviews! Did you catch them all?

If not, we are here for you...

๐Ÿฆพ ๐™๐™๐™š ๐˜ผ๐™„ ๐˜พ๐™ค๐™ฃ๐™ช๐™ฃ๐™™๐™ง๐™ช๐™ข
๐Ÿ”“ ๐™ƒ๐™–๐™˜๐™ , ๐™‡๐™š๐™–๐™ ๐™จ, ๐™–๐™ฃ๐™™ ๐™๐™š๐™ซ๐™š๐™ก๐™–๐™ฉ๐™ž๐™ค๐™ฃ๐™จ
๐Ÿค” ๐™๐™๐™ž๐™ฃ๐™ ๐™ž๐™ฃ๐™œ, ๐™๐™–๐™จ๐™ฉ ๐™–๐™ฃ๐™™ ๐™Ž๐™ก๐™ค๐™ฌ
๐Ÿช ๐™‹๐™๐™ž๐™จ๐™๐™ž๐™ฃ๐™œ ๐™›๐™ค๐™ง ๐˜ผ๐™ฃ๐™จ๐™ฌ๐™š๐™ง๐™จ

Bookmark https://cybercanon.org/books/ for the most recent reviews.

#CybersecurityBooks

๐Ÿ—ž๏ธ ๐•น๐–Š๐–œ๐–˜๐–‘๐–Š๐–™๐–™๐–Š๐–— ๐•ด๐–“๐–ˆ๐–”๐–’๐–Ž๐–“๐–Œ ๐Ÿ—ž๏ธ

Be sure to subscribe to the #CyberCanon #Newsletter to be informed of our latest reviews, Hall of Fame book highlights, and more. In this edition, we give a special shout-out to our friends at #TheCyberNest.๐Ÿชน

https://cybercanon.substack.com/p/cybercanon-april-2026-part-2

#CybersecurityBooks

๐Ÿช We've hooked another review ๐Ÿช

This week, Aleksandra Scalco reviews ๐™‹๐™๐™ž๐™จ๐™๐™ž๐™ฃ๐™œ ๐™›๐™ค๐™ง ๐˜ผ๐™ฃ๐™จ๐™ฌ๐™š๐™ง๐™จ: ๐™๐™ž๐™จ๐™  ๐™„๐™™๐™š๐™ฃ๐™ฉ๐™ž๐™›๐™ž๐™˜๐™–๐™ฉ๐™ž๐™ค๐™ฃ ๐™–๐™ฃ๐™™ ๐™ˆ๐™ž๐™ฉ๐™ž๐™œ๐™–๐™ฉ๐™ž๐™ค๐™ฃ ๐™Ž๐™ฉ๐™ง๐™–๐™ฉ๐™š๐™œ๐™ž๐™š๐™จ, an IET book authored by Terry Merz and Lawrence Shaw...

๐Ÿ“ https://cybercanon.org/phishing-for-answers-risk-identification-and-mitigation-strategies/

#CybersecurityBooks #SecurityAwareness #Risk

Our latest newsletter over on Substack covers recent reviews and also highlights one of the best cybercrime books in our hall of fameโ€ฆ

https://open.substack.com/pub/cybercanon/p/the-cybercanon-monthlyapril-2026

#CybersecurityBooks #Cybercrime

The CyberCanon Monthly:April 2026

The CyberCanon Project: The cybersecurity professionalโ€™s first source for curated, timeless, and must-consume wisdom.

CyberCanon Newsletter

๐—™๐—ฟ๐—ฒ๐˜€๐—ต ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐—Ÿ๐—ฎ๐—ป๐—ฑ๐—ฒ๐—ฑ ๐Ÿค”๐Ÿ‘Ÿ๐ŸŒ

This week, two committee members are independently recommending Daniel Kahneman's ๐™๐™๐™ž๐™ฃ๐™ ๐™ž๐™ฃ๐™œ, ๐™๐™–๐™จ๐™ฉ ๐™–๐™ฃ๐™™ ๐™Ž๐™ก๐™ค๐™ฌ for the CyberCanon Hall of Fame.

๐Ÿ“ Be sure to check out their detailed reviews and why it's valuable for cyber pros -> https://cybercanon.org/thinking-fast-and-slow/

#CybersecurityBooks #Cyberpsychology #CyberCanonHoFCandidate

(1/3...)

๐Ÿ”“ Review Drop: Hacks, Leaks, and Revelations

This week, be sure to read Meghan Jacquot's CyberCanon Review of Micah Lee's ๐™ƒ๐™–๐™˜๐™ ๐™จ, ๐™‡๐™š๐™–๐™ ๐™จ, ๐™–๐™ฃ๐™™ ๐™๐™š๐™ซ๐™š๐™ก๐™–๐™ฉ๐™ž๐™ค๐™ฃ๐™จ ๐Ÿ‘‡

https://cybercanon.org/hacks-leaks-and-revelations-the-art-of-analyzing-hacked-and-leaked-data/

#CybersecurityBooks #Databreach | @micahflee

๐Ÿ—“๏ธ March Review Recap ๐Ÿ“

Yes, we're nearly halfway through April, but we wanted to make sure folks saw all our reviews published last month...

๐Ÿข Engineering Secure Devices: https://cybercanon.org/engineering-secure-devices/
๐Ÿช– Battlefield Cyber: https://cybercanon.org/battlefield-cyber-how-china-and-russia-are-undermining-our-democracy-and-national-security/
โš–๏ธ The Cybersecurity Guide to Governance, Risk, and Compliance: https://cybercanon.org/the-cybersecurity-guide-to-governance-risk-and-compliance/
โš› Behavioral AI: https://cybercanon.org/behavioral-ai-unleash-decision-making-with-data/
๐Ÿง  Stepping Through Cybersecurity Risk Management:
https://cybercanon.org/stepping-through-cybersecurity-risk-management-a-systems-thinking-approach/

#CybersecurityBooks

๐—”๐—œ ๐˜„๐—ถ๐˜๐—ต๐—ผ๐˜‚๐˜ ๐˜๐—ต๐—ฒ ๐—›๐˜†๐—ฝ๐—ฒ (๐—ผ๐—ฟ ๐—•๐—น๐—ถ๐—ป๐—ฑ ๐—ฆ๐—ฝ๐—ผ๐˜๐˜€) ๐Ÿฆพโš–๏ธ

For this week's review, Yisehak Lemma examines ๐™๐™๐™š ๐˜ผ๐™„ ๐˜พ๐™ค๐™ฃ๐™ช๐™ฃ๐™™๐™ง๐™ช๐™ข, written by the father-son duo of Caleb and Rex Briggs.

๐Ÿ”Ž Full review: https://cybercanon.org/the-ai-conundrum/

#CybersecurityBooks #AISecurity #AIGovernance

๐Ÿ›๏ธ ๐—›๐—ฎ๐—น๐—น ๐—ผ๐—ณ ๐—™๐—ฎ๐—บ๐—ฒ ๐—ฅ๐—ฒ๐—ฐ๐—ผ ๐—œ๐—ป๐—ฐ๐—ผ๐—บ๐—ถ๐—ป๐—ด!

Jack Freund, a man who knows a thing or two about cyber risk (author of the FAIR HoF book), provides a Hall of Fame nomination for ๐™Ž๐™ฉ๐™š๐™ฅ๐™ฅ๐™ž๐™ฃ๐™œ ๐™๐™๐™ง๐™ค๐™ช๐™œ๐™ ๐˜พ๐™ฎ๐™—๐™š๐™ง๐™จ๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐™๐™ž๐™จ๐™  ๐™ˆ๐™–๐™ฃ๐™–๐™œ๐™š๐™ข๐™š๐™ฃ๐™ฉ by Jennifer Bayuk.

๐Ÿ“ Read Jack's thorough assessment: https://cybercanon.org/stepping-through-cybersecurity-risk-management-a-systems-thinking-approach/

#CybersecurityBooks #CyberCanonReview #CyberCanonHallofFameCandidate #CyberRisk