227 Followers
290 Following
215 Posts
We vet #Cybersecurity books. Our reviews are written by real life experts, heroes, and hackers who led through the biggest exploits.
www.cybercanon.org
Also known as the Cybersecurity Canon Project
Founded: 2013
websitehttps://cybercanon.org/
verificationhttps://cybercanon.org/

🔓 Review Drop: Hacks, Leaks, and Revelations

This week, be sure to read Meghan Jacquot's CyberCanon Review of Micah Lee's 𝙃𝙖𝙘𝙠𝙨, 𝙇𝙚𝙖𝙠𝙨, 𝙖𝙣𝙙 𝙍𝙚𝙫𝙚𝙡𝙖𝙩𝙞𝙤𝙣𝙨 👇

https://cybercanon.org/hacks-leaks-and-revelations-the-art-of-analyzing-hacked-and-leaked-data/

#CybersecurityBooks #Databreach | @micahflee

𝘌𝘷𝘦𝘳𝘺 𝘧𝘦𝘸 𝘸𝘦𝘦𝘬𝘴 𝘸𝘦 𝘩𝘦𝘢𝘳 𝘢𝘣𝘰𝘶𝘵 𝘢 𝘯𝘦𝘸 𝘥𝘢𝘵𝘢 𝘣𝘳𝘦𝘢𝘤𝘩, 𝘣𝘶𝘵 𝘩𝘰𝘸 𝘤𝘢𝘯 𝘸𝘦 𝘭𝘦𝘢𝘳𝘯 𝘮𝘰𝘳𝘦 𝘢𝘣𝘰𝘶𝘵 𝘵𝘩𝘦 𝘥𝘢𝘵𝘢 𝘵𝘩𝘢𝘵 𝘪𝘴 𝘪𝘯 𝘵𝘩𝘦𝘴𝘦 𝘣𝘳𝘦𝘢𝘤𝘩𝘦𝘴? 𝘔𝘪𝘤𝘢𝘩 𝘓𝘦𝘦’𝘴 “𝘏𝘢𝘤𝘬𝘴, 𝘓𝘦𝘢𝘬𝘴, 𝘢𝘯𝘥 𝘙𝘦𝘷𝘦𝘭𝘢𝘵𝘪𝘰𝘯𝘴” 𝘴𝘩𝘢𝘳𝘦𝘴 𝘤𝘰𝘯𝘵𝘦𝘹𝘵, 𝘳𝘦𝘭𝘦𝘷𝘢𝘯𝘵 𝘤𝘢𝘴𝘦 𝘴𝘵𝘶𝘥𝘪𝘦𝘴 𝘢𝘯𝘥 𝘵𝘦𝘤𝘩𝘯𝘪𝘲𝘶𝘦𝘴 𝘧𝘰𝘳 𝘣𝘦𝘨𝘪𝘯𝘯𝘦𝘳𝘴, 𝘱𝘳𝘢𝘤𝘵𝘪𝘵𝘪𝘰𝘯𝘦𝘳𝘴 𝘰𝘳 𝘳𝘦𝘴𝘦𝘢𝘳𝘤𝘩𝘦𝘳𝘴...

🗓️ March Review Recap 📝

Yes, we're nearly halfway through April, but we wanted to make sure folks saw all our reviews published last month...

🐢 Engineering Secure Devices: https://cybercanon.org/engineering-secure-devices/
🪖 Battlefield Cyber: https://cybercanon.org/battlefield-cyber-how-china-and-russia-are-undermining-our-democracy-and-national-security/
⚖️ The Cybersecurity Guide to Governance, Risk, and Compliance: https://cybercanon.org/the-cybersecurity-guide-to-governance-risk-and-compliance/
⚛ Behavioral AI: https://cybercanon.org/behavioral-ai-unleash-decision-making-with-data/
🧠 Stepping Through Cybersecurity Risk Management:
https://cybercanon.org/stepping-through-cybersecurity-risk-management-a-systems-thinking-approach/

#CybersecurityBooks

𝗔𝗜 𝘄𝗶𝘁𝗵𝗼𝘂𝘁 𝘁𝗵𝗲 𝗛𝘆𝗽𝗲 (𝗼𝗿 𝗕𝗹𝗶𝗻𝗱 𝗦𝗽𝗼𝘁𝘀) 🦾⚖️

For this week's review, Yisehak Lemma examines 𝙏𝙝𝙚 𝘼𝙄 𝘾𝙤𝙣𝙪𝙣𝙙𝙧𝙪𝙢, written by the father-son duo of Caleb and Rex Briggs.

🔎 Full review: https://cybercanon.org/the-ai-conundrum/

#CybersecurityBooks #AISecurity #AIGovernance

𝘛𝘩𝘦 𝘢𝘶𝘵𝘩𝘰𝘳𝘴 𝘥𝘦𝘮𝘺𝘴𝘵𝘪𝘧𝘺 𝘈𝘐 𝘣𝘺 𝘦𝘹𝘱𝘭𝘢𝘪𝘯𝘪𝘯𝘨 𝘪𝘵𝘴 𝘤𝘰𝘳𝘦 𝘮𝘢𝘵𝘩𝘦𝘮𝘢𝘵𝘪𝘤𝘢𝘭 𝘱𝘳𝘪𝘯𝘤𝘪𝘱𝘭𝘦𝘴, 𝘦𝘹𝘱𝘰𝘴𝘪𝘯𝘨 𝘪𝘵𝘴 𝘭𝘪𝘮𝘪𝘵𝘢𝘵𝘪𝘰𝘯𝘴, 𝘢𝘯𝘥 𝘰𝘧𝘧𝘦𝘳𝘪𝘯𝘨 𝘢 𝘯𝘰𝘯𝘵𝘦𝘤𝘩𝘯𝘪𝘤𝘢𝘭 𝘣𝘶𝘵 𝘱𝘳𝘢𝘤𝘵𝘪𝘤𝘢𝘭 𝘳𝘪𝘴𝘬 𝘢𝘴𝘴𝘦𝘴𝘴𝘮𝘦𝘯𝘵 𝘧𝘳𝘢𝘮𝘦𝘸𝘰𝘳𝘬. 𝘞𝘳𝘪𝘵𝘵𝘦𝘯 𝘧𝘳𝘰𝘮 𝘥𝘶𝘢𝘭 𝘱𝘦𝘳𝘴𝘱𝘦𝘤𝘵𝘪𝘷𝘦𝘴–𝘰𝘯𝘦 𝘧𝘳𝘰𝘮 𝘢 𝘷𝘦𝘵𝘦𝘳𝘢𝘯 𝘈𝘐 𝘱𝘳𝘢𝘤𝘵𝘪𝘵𝘪𝘰𝘯𝘦𝘳 𝘢𝘯𝘥 𝘵𝘩𝘦 𝘰𝘵𝘩𝘦𝘳 𝘧𝘳𝘰𝘮 𝘢 𝘯𝘦𝘸𝘦𝘳 𝘪𝘯𝘥𝘶𝘴𝘵𝘳𝘺...

🏛️ 𝗛𝗮𝗹𝗹 𝗼𝗳 𝗙𝗮𝗺𝗲 𝗥𝗲𝗰𝗼 𝗜𝗻𝗰𝗼𝗺𝗶𝗻𝗴!

Jack Freund, a man who knows a thing or two about cyber risk (author of the FAIR HoF book), provides a Hall of Fame nomination for 𝙎𝙩𝙚𝙥𝙥𝙞𝙣𝙜 𝙏𝙝𝙧𝙤𝙪𝙜𝙝 𝘾𝙮𝙗𝙚𝙧𝙨𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙍𝙞𝙨𝙠 𝙈𝙖𝙣𝙖𝙜𝙚𝙢𝙚𝙣𝙩 by Jennifer Bayuk.

📝 Read Jack's thorough assessment: https://cybercanon.org/stepping-through-cybersecurity-risk-management-a-systems-thinking-approach/

#CybersecurityBooks #CyberCanonReview #CyberCanonHallofFameCandidate #CyberRisk

𝘛𝘩𝘪𝘴 𝘣𝘰𝘰𝘬 𝘴𝘶𝘤𝘤𝘦𝘦𝘥𝘴 𝘪𝘯 𝘣𝘭𝘦𝘯𝘥𝘪𝘯𝘨 𝘨𝘰𝘷𝘦𝘳𝘯𝘢𝘯𝘤𝘦, 𝘰𝘱𝘦𝘳𝘢𝘵𝘪𝘰𝘯𝘴 𝘢𝘯𝘥 𝘳𝘪𝘴𝘬 𝘮𝘢𝘯𝘢𝘨𝘦𝘮𝘦𝘯𝘵 𝘪𝘯𝘵𝘰 𝘢 𝘴𝘪𝘯𝘨𝘭𝘦 𝘯𝘢𝘳𝘳𝘢𝘵𝘪𝘷𝘦 𝘵𝘩𝘢𝘵 𝘪𝘴 𝘣𝘰𝘵𝘩 𝘴𝘵𝘳𝘶𝘤𝘵𝘶𝘳𝘦𝘥 𝘢𝘯𝘥 𝘢𝘤𝘤𝘦𝘴𝘴𝘪𝘣𝘭𝘦. 𝘐𝘵𝘴 𝘴𝘵𝘳𝘦𝘯𝘨𝘵𝘩 𝘭𝘪𝘦𝘴 𝘪𝘯 𝘤𝘭𝘦𝘢𝘳 𝘤𝘰𝘯𝘤𝘦𝘱𝘵𝘶𝘢𝘭 𝘥𝘦𝘧𝘪𝘯𝘪𝘵𝘪𝘰𝘯𝘴, 𝘴𝘶𝘤𝘩 𝘢𝘴 𝘳𝘦𝘢𝘭𝘪𝘻𝘦𝘥 𝘳𝘪𝘴𝘬 𝘢𝘯𝘥 𝘭𝘰𝘴𝘴 𝘦𝘷𝘦𝘯𝘵, 𝘵𝘩𝘰𝘶𝘨𝘩𝘵𝘧𝘶𝘭 𝘶𝘴𝘦 𝘰𝘧 𝘩𝘪𝘴𝘵𝘰𝘳𝘪𝘤𝘢𝘭 𝘤𝘢𝘴𝘦 𝘴𝘵𝘶𝘥𝘪𝘦𝘴...

CyberCanon-related Thursday sessions at #RSAC!

🔮 Nicole Perlroth - The Cyber Threat Landscape: Year in Review, Future in Focus, 8:30 AM

🧑‍🍳 Rick Howard - Cooking with CISOs, 9-12 PM: https://luma.com/a3i11jre

🧑‍💻 George Kurtz - Hacking Exposed, 10:50 AM

⛓️ Cassie Crossley - Book Signing at Bookstore for Software Supply Chain Security: Securing the End-to-End Supply Chain for Software, Firmware, and Hardware, 11 AM

(1/2...)

(...2/2)

🪶 Cassie Crossley - Birds of a Feather: Exploitable or Not? CRA-Ready Product Security Triage for CVEs, 1 PM

For more details, see the 𝘾𝙮𝙗𝙚𝙧𝘾𝙖𝙣𝙤𝙣 𝙍𝙎𝘼𝘾 𝘼𝙘𝙩𝙞𝙫𝙞𝙩𝙞𝙚𝙨 article: https://lnkd.in/eaaVHxAQ

#RSAC2026 | #CybersecurityBooks | #CyberCanonHallofFame

CyberCanon 2026 RSAC Activities

RSAC 2026 is occurring March 23-26! Here is your one-stop shop for RSAC sessions or activities with ties to the Cybersecurity Canon! The sections below include Book Signings, Canon Author and Committee Member Speaking sessions, Birds of a Feather sessions, and even representation at College Day. Boo