CyberCanon

@CyberSecCanon@infosec.exchange
199 Followers
28 Following
139 Posts
We vet #Cybersecurity books. Our reviews are written by real life experts, heroes, and hackers who led through the biggest exploits.
www.cybercanon.org
Also known as the Cybersecurity Canon Project
Founded: 2013
websitehttps://cybercanon.org/
verificationhttps://cybercanon.org/

๐ŸŽฏ๐—ง๐—ผ๐—ฑ๐—ฎ๐˜† ๐—ถ๐—ป ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—›๐—ถ๐˜€๐˜๐—ผ๐—ฟ๐˜†: ๐—ง๐—ต๐—ฒ ๐—ง๐—ฎ๐—ฟ๐—ด๐—ฒ๐˜ ๐——๐—ฎ๐˜๐—ฎ ๐—•๐—ฟ๐—ฒ๐—ฎ๐—ฐ๐—ต, ๐——๐—ฒ๐—ฐ๐—ฒ๐—บ๐—ฏ๐—ฒ๐—ฟ ๐Ÿญ๐Ÿต, ๐Ÿฎ๐Ÿฌ๐Ÿญ๐Ÿฏ

It started quietly, days before the holiday rush. Shoppers were filling stores, credit cards were swiping nonstop, and behind the scenes, a small foothold inside Targetโ€™s network was about to become one of the most infamous breaches in retail history.

๐Ÿ’€ Attackers slipped in through a third-party HVAC vendor
๐Ÿชฒ Malware moved silently across point-of-sale systems
๐Ÿ’ณ 40 million payment cards skimmed
๐Ÿ” 70 million customers' data exposed

While many are (sadly) becoming numb to breach news nowadays, this disclosure, announced 12 years ago today, shook the industry. Boardrooms across the globe were confronted with the fact that cybersecurity wasnโ€™t just an IT problem, but a critical business-wide issue.

The incident is covered very nicely in this Huntress article: https://www.huntress.com/threat-library/data-breach/target-data-breach

Many books in the #CyberCanon address themes related to the breach. Here are two recos to get you started:

๐™‰๐™–๐™ซ๐™ž๐™œ๐™–๐™ฉ๐™ž๐™ฃ๐™œ ๐™ฉ๐™๐™š ๐˜ฟ๐™ž๐™œ๐™ž๐™ฉ๐™–๐™ก ๐˜ผ๐™œ๐™š discusses cyber risk at the board/executive level and uses high-profile cases to illustrate governance, risk oversight, and leadership implications. Our review๐Ÿ“: https://cybercanon.org/navigating-the-digital-age-the-definitive-cybersecurity-guide-for-directors-and-officers/

๐™๐™๐™š ๐˜พ๐™„๐™Ž๐™Š ๐™‹๐™ก๐™–๐™ฎ๐™—๐™ค๐™ค๐™  is your go-to for structured guidance on integrating 3rd party risk into enterprise security strategy. Our review๐Ÿ“: https://cybercanon.org/the-ciso-playbook/

#CybersecurityBooks #CybersecurityHistory #DataBreach

๐Ÿ“ฌ๐˜พ๐™ฎ๐™—๐™š๐™ง๐˜พ๐™–๐™ฃ๐™ค๐™ฃ ๐™‰๐™š๐™ฌ๐™จ๐™ก๐™š๐™ฉ๐™ฉ๐™š๐™ง ๐™„๐™ฃ๐™˜๐™ค๐™ข๐™ž๐™ฃ๐™œ...

This latest edition's theme is ๐˜๐˜ฏ๐˜ค๐˜ช๐˜ฅ๐˜ฆ๐˜ฏ๐˜ต ๐˜™๐˜ฆ๐˜ด๐˜ฑ๐˜ฐ๐˜ฏ๐˜ด๐˜ฆ & ๐˜Š๐˜บ๐˜ฃ๐˜ฆ๐˜ณ ๐˜™๐˜ช๐˜ด๐˜ฌ-๐˜”๐˜ฆ๐˜ข๐˜ด๐˜ถ๐˜ณ๐˜ช๐˜ฏ๐˜จ ๐˜™๐˜ช๐˜ด๐˜ฌ ๐˜ช๐˜ฏ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ˆ๐˜จ๐˜ฆ ๐˜ฐ๐˜ง ๐˜ˆ๐˜, where we explore a recent news article in relation to a classic #CyberCanonHallofFame book.

๐Ÿ—ž๏ธhttps://cybercanon.substack.com/p/december-theme-incident-response

We publish new editions every couple of weeks, so be sure to subscribe on Substack!

#Cybersecurity #CybersecurityBooks #CyberRisk #AI

0๏ธโƒฃ๐Ÿ” ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐—–๐—ฎ๐—ป๐—ผ๐—ป ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฟ๐—ผ๐—ฝ 0๏ธโƒฃ๐Ÿ”

This week, Adrian Sanabria provides his perspective on George Finney's existing Hall of Famer, ๐™‹๐™ง๐™ค๐™Ÿ๐™š๐™˜๐™ฉ ๐™•๐™š๐™ง๐™ค ๐™๐™ง๐™ช๐™จ๐™ฉ.

๐Ÿ† Review: https://cybercanon.org/project-zero-trust-a-story-about-a-strategy-for-aligning-security-and-the-business/#review-by-adrian-sanabria

๐Ÿ›๏ธ Purchase and support our mission: https://amzn.to/3XspBon

#CybersecurityBooks #CyberCanonHallofFame #ZeroTrust @sawaba

๐Ÿ—“๏ธ๐—ก๐—ผ๐˜ƒ๐—ฒ๐—บ๐—ฏ๐—ฒ๐—ฟ ๐—•๐—ผ๐—ผ๐—ธ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐—ฅ๐—ฒ๐—ฐ๐—ฎ๐—ฝ!๐Ÿ“š

It's already a couple of weeks into December, but we'd be remiss not to share our monthly review recap for November...

๐Ÿง  ๐™๐™ฃ๐™™๐™š๐™ง๐™จ๐™ฉ๐™–๐™ฃ๐™™ ๐™ฉ๐™๐™š ๐˜พ๐™ฎ๐™—๐™š๐™ง ๐˜ผ๐™ฉ๐™ฉ๐™–๐™˜๐™ ๐™š๐™ง ๐™ˆ๐™ž๐™ฃ๐™™๐™จ๐™š๐™ฉ: https://cybercanon.org/understand-the-cyber-attacker-mindset-build-a-strategic-security-programme-to-counteract-threats/

๐Ÿ” ๐˜พ๐™ง๐™ฎ๐™ฅ๐™ฉ๐™ค ๐˜ฟ๐™ž๐™˜๐™ฉ๐™ž๐™ค๐™ฃ๐™–๐™ง๐™ฎ: https://cybercanon.org/crypto-dictionary-500-tasty-tidbits-for-the-curious-cryptographer/

๐Ÿ‘‚ ๐™‡๐™ž๐™จ๐™ฉ๐™š๐™ฃ๐™ž๐™ฃ๐™œ ๐™„๐™ฃ: https://cybercanon.org/listening-in-cybersecurity-in-an-insecure-age/

๐Ÿ•ต๏ธโ€โ™‚๏ธ ๐™‡๐™–๐™ฏ๐™–๐™ง๐™ช๐™จ ๐™ƒ๐™š๐™ž๐™จ๐™ฉ: https://cybercanon.org/the-lazarus-heist-from-hollywood-to-high-finance-inside-north-koreas-global-cyber-war/

Each review page on our site now includes affiliate links to purchase the books (and other Amazon purchases), which provides a small portion of the proceeds to the Canon. ๐Ÿ™

Authors: Sarah Armstrong-Smith, Jean-Philippe (JP) Aumasson (@veorq), Susan Landau, and Geoff White

Reviewers: Kevin Magee, Sandip Dholakia (@iSandipD), Jeny Teheran, and Jeff Schiemann

#CyberCanon #CybersecurityBooks

It's our favorite time of year at the Canon...

#CyberCanonHallofFame #CybersecurityBooks

๐Ÿ’ก๐—ง๐˜‚๐—ฒ๐˜€๐—ฑ๐—ฎ๐˜†, ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฎ๐˜†๐Ÿ’ก

โ€œAntifragile isnโ€™t a cybersecurity book, but it might be one of the most important books for cybersecurity leaders to read. Not because youโ€™ll agree with everything, but because it will push you to think differently about risk, resilience, and the kind of systems worth building."

--Walt Powell in his review of Nassim Nicholas Taleb's ๐˜ผ๐™ฃ๐™ฉ๐™ž๐™›๐™ง๐™–๐™œ๐™ž๐™ก๐™š: ๐™๐™๐™ž๐™ฃ๐™œ๐™จ ๐™๐™๐™–๐™ฉ ๐™‚๐™–๐™ž๐™ฃ ๐™›๐™ง๐™ค๐™ข ๐˜ฟ๐™ž๐™จ๐™ค๐™ง๐™™๐™š๐™ง, nominating it for the Hall of Fame!

๐Ÿ“Review: https://cybercanon.org/antifragile-things-that-gain-from-disorder/

๐Ÿ›๏ธ Affiliate link to support the Canon: https://amzn.to/49guRTl

"๐™Ž๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐™ž๐™จ ๐™– ๐™ฅ๐™ง๐™ค๐™˜๐™š๐™จ๐™จ, ๐™ฃ๐™ค๐™ฉ ๐™– ๐™ฅ๐™ง๐™ค๐™™๐™ช๐™˜๐™ฉ."

This simple, but powerful quote is from cybersecurity legend ๐—•๐—ฟ๐˜‚๐—ฐ๐—ฒ ๐—ฆ๐—ฐ๐—ต๐—ป๐—ฒ๐—ถ๐—ฒ๐—ฟ.

Bruce is the author of not 1, not 2, but 3 books in our Hall of Fame.

Check out our reviews, and please consider using our affiliate links below if you'd like to purchase and help support the Canon. ๐Ÿ™

๐—ฆ๐—ฒ๐—ฐ๐—ฟ๐—ฒ๐˜๐˜€ ๐—ฎ๐—ป๐—ฑ ๐—Ÿ๐—ถ๐—ฒ๐˜€:
๐Ÿ“ https://cybercanon.org/secrets-and-lies-digital-security-in-a-networked-world/
๐Ÿ›๏ธ https://amzn.to/3JUlxu3

๐——๐—ฎ๐˜๐—ฎ ๐—ฎ๐—ป๐—ฑ ๐—š๐—ผ๐—น๐—ถ๐—ฎ๐˜๐—ต:
๐Ÿ“ https://cybercanon.org/data-and-goliath-the-hidden-battles-to-collect-your-data-and-control-your-world/
๐Ÿ›๏ธ https://amzn.to/4oDoDSb

๐—–๐—น๐—ถ๐—ฐ๐—ธ ๐—›๐—ฒ๐—ฟ๐—ฒ ๐˜๐—ผ ๐—ž๐—ถ๐—น๐—น ๐—˜๐˜ƒ๐—ฒ๐—ฟ๐˜†๐—ฏ๐—ผ๐—ฑ๐˜†:
๐Ÿ“ https://cybercanon.org/click-here-to-kill-everybody-security-and-survival-in-a-hyper-connected-world/
๐Ÿ›๏ธ https://amzn.to/47YtxSU

#CybersecurityBooks #SecurityCulture #SecurityAwareness #CyberCanonHallofFame

๐Ÿ“๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฎ๐˜†!

For the first time, this week's review is not of a book, but a podcast.๐ŸŽง

"๐™๐™ค ๐˜พ๐™–๐™ฉ๐™˜๐™ ๐™– ๐™๐™๐™ž๐™š๐™› is an important and timely contribution to the American publicโ€™s understanding of cybersecurity, geopolitics and the very real threat posed by China. It delivers both urgency and insight, and highlights how activity in the cyber realm is influencing global power dynamics. For listeners seeking to understand why cybersecurity matters on a global scale, this podcast is an excellent listen."

- writes Joanna Grama, JD, in her review of Nicole Perlroth's podcast ๐™๐™ค ๐˜พ๐™–๐™ฉ๐™˜๐™ ๐™– ๐™๐™๐™ž๐™š๐™›

This well-produced podcast series by @rubrikinc was so impactful to many on the Canon Committee that we thought it deserved a review of its own ๐Ÿ‘‰ https://cybercanon.org/to-catch-a-thief-chinas-rise-to-cyber-supremacy/

@rubrikinc @NicoleP

๐Ÿ™ Today is the ๐—ก๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐—ฎ๐—น ๐——๐—ฎ๐˜† ๐—ผ๐—ณ ๐—š๐—ถ๐˜ƒ๐—ถ๐—ป๐—ด, and we would like your support. ๐Ÿ™

The Cybersecurity Canon Project is a decade-old all-volunteer nonprofit seeking to be the cybersecurity professional's first source for curated, timeless, and must-consume wisdom.

We are the Rock and Roll Hall of Fame for Cybersecurity books. We have inducted 50 books into the Hall of Fame and have written reviews for 250 others.

We engage the industryโ€™s top thought leaders to identify the most valuable cybersecurity content and guide the community by highlighting essential works, optional readings for those interested, and material best avoided.

If you like what we are trying to do, there are many ways to support us.

See our web page for more details ๐Ÿ‘‰ https://cybercanon.org/

Thanks for considering!

#Cybersecurity #CybersecurityBooks #GivingTuesday

๐Ÿ›๏ธ #CyberMonday is in full swing. Here is a reminder on how you can contribute to the Canon. We have something special for you: the #CyberCanon is now an Amazon affiliate!

Hereโ€™s what that means:
1. Every book review on https://CyberCanon.org contains a link that takes you directly to Amazon to purchase the book of your choice.
2. Each time you use one of these links, a % of your purchase will be contributed back to the CyberCanon.
3. This benefit applies to anything you buy on Amazon within the following 24 hours, not just books.

๐Ÿ“š Books make fantastic gifts for family, friends, colleagues, and teammates, really, everyone. Support us by beginning your Amazon shopping on https://CyberCanon.org and help continue our mission to curate cybersecurity content for the greater good of the cyber community.

#CybersecurityBooks #Giving #CyberMonday