#cybercanon โ Public Fediverse posts
Live and recent posts from across the Fediverse tagged #cybercanon, aggregated by home.social.
-
๐๏ธ ๐น๐๐๐๐๐๐๐๐๐ ๐ด๐๐๐๐๐๐๐ ๐๏ธ
Be sure to subscribe to the #CyberCanon #Newsletter to be informed of our latest reviews, Hall of Fame book highlights, and more. In this edition, we give a special shout-out to our friends at #TheCyberNest.๐ชน
https://cybercanon.substack.com/p/cybercanon-april-2026-part-2
-
๐ก๏ธ ๐ง๐ผ๐ฑ๐ฎ๐'๐ ๐ฅ๐ฒ๐๐ถ๐ฒ๐! ๐งฑ
This week, our #CyberCanon Committee provides you with Debra Baker's ๐ผ ๐พ๐๐๐ ๐๐ช๐๐๐ ๐ฉ๐ค ๐พ๐ฎ๐๐๐ง ๐๐๐จ๐๐ก๐๐๐ฃ๐๐.
Read Jack Freund, Ph.D.'s assessment ๐ https://cybercanon.org/a-ciso-guide-to-cyber-resilience/
-
โ๏ธ ๐ฅ๐ฒ๐๐ถ๐ฒ๐ ๐๐ฟ๐ผ๐ฝ๐ฝ๐ฒ๐ฑ ๐ช
We have back-to-back reviews from Larry Pesce. Today, Larry offers his insights on Chris Miller's widely well-regarded book, ๐พ๐๐๐ฅ ๐๐๐ง, from a cyber pro's perspective:
๐ You'll want to read this review https://cybercanon.org/chip-war-the-quest-to-dominate-the-worlds-most-critical-technology/
๐๏ธ Reminder: Our review pages contain links to purchase via Amazon or your local bookstore via Bookshop(dot)org. Doing so supports the #CyberCanon, a 100% volunteer-run nonprofit. ๐
-
๐ ๐ง๐ผ๐ฑ๐ฎ๐ ๐ถ๐ป ๐๐๐ฏ๐ฒ๐ฟ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ถ๐๐๐ผ๐ฟ๐!
On November 2, 1988, the Morris Worm became the first major computer virus to spread across the Internet. What began as a graduate studentโs โexperimentโ quickly spiraled out of control, taking down much of the early Internet and costing millions in cleanup. It also gave rise to one of cybersecurityโs most important realizations: even well-intentioned code can cause catastrophic damage in a connected world.
To learn more, ๐๐๐ฃ๐๐ฎ ๐ฝ๐๐๐ง ๐๐ค๐๐จ ๐๐๐๐จ๐๐๐ฃ๐ by Scott Shapiro, a #CyberCanonHoFCandidate, covers the #MorrisWorm as one of its five infamous hacks. See our review โก๏ธ https://tinyurl.com/r2b3zc2u
๐ฅAnd as a bonus, many may not be aware that ๐๐๐ ๐พ๐ช๐๐ ๐ค๐ค'๐จ ๐๐๐ also contains an interesting perspective on the Morris Worm. A year after astronomer Cliff Stoll's spy tracking journey, he was one of many admins around the country who were investigating the Morris Worm live as it was spreading through the night. Cliff writes about this experience in the book's epilogue, where he discovers that the author of the worm was actually the son of NSA's Chief Scientist, Robert Morris, whom Cliff worked with in relation to his international hacker sleuthing a year earlier.
#CyberCanonHoF review โก๏ธ https://tinyurl.com/3rywf7zw
-
๐ ๐ก๐ฒ๐ ๐๐ผ๐ผ๐ธ ๐ฅ๐ฒ๐๐ถ๐ฒ๐(๐)! ๐
This week, not 1, but 2๏ธโฃ #CyberCanon Committee Members review ๐๐๐ ๐พ๐ค๐ข๐๐ฃ๐ ๐๐๐ซ๐ by Mustafa Suleyman with Michael Bhaskar.
This book is widely known, but to what extent does it offer meaningful value to cybersecurity professionals? ๐ค
This is exactly what Jessica Buerger and Susan Hansche help determine in their insightful reviews ๐ https://tinyurl.com/49x3aetp
๐ If our efforts assist in your decision to purchase, please use our affiliate link to support the Canon ๐ https://amzn.to/45SrpL9
-
At #DEFCON, we spent time talking with Kurtis Minder and Jon DiMaggio, industry leaders in cyber threat intelligence. Both are authors of books on the Canon's list to review. We came away quite impressed, especially by their immense passion for fighting cyber crime.
Jon also led a boisterous session with John Fokker in front of a packed crowd of hundreds just moments after Jon released Volume 7 of Analyst1's Ransomware Diaries. Definitely a highlight of the week!
Read more about this story and others from #HackerSummerCamp in our August Newsletter ๐ https://tinyurl.com/canon-aug25-nl
-
Our August Newsletter ๐๏ธ is now live featuring #CyberCanon Hall of Fame winners, candidates, and cyber author-focused recaps from #BlackHat and #defcon.
Definitely worth taking a peek ๐ https://tinyurl.com/canon-aug25-nl
-
Kim Zetter's (@kimzetter) 2014 book ๐๐ฐ๐ถ๐ฏ๐ต๐ฅ๐ฐ๐ธ๐ฏ ๐ต๐ฐ ๐ก๐ฆ๐ณ๐ฐ ๐๐ข๐บ was one of the first inducted into the Cybersecurity Canon Hall of Fame ๐. The book unpacks the story of #Stuxnet and was a first of its kind to turn a real-world cyber espionage operation ๐ตโโ๏ธ into a gripping thriller of a book.
Last week, Kim joined #CyberCanon President Rick Howard at the ๐๐ฆ๐ฅ๐ฏ๐ฆ๐ด๐ฅ๐ข๐บ ๐๐ฆ๐ฆ ๐๐ณ๐ข๐ฎ gathering for a candid discussion and Q&A with an eager group of about 40 cybersecurity leaders.
This event was coordinated before the recent Operation Midnight Hammer attack, which made the timing for this Stuxnet conversation impeccable. Many members attributed this to the uncanny foresight of Wee Dram host J. Carlos Vega, CISSP. ๐
Book review ๐ https://tinyurl.com/mubj2z4n
#CyberCanonHoF #Cybersecurity #CybersecurityBooks #CyberEspionage