home.social

#cybercanonhof โ€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #cybercanonhof, aggregated by home.social.

  1. ๐Ÿ“œ ๐—ง๐—ผ๐—ฑ๐—ฎ๐˜† ๐—ถ๐—ป ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—›๐—ถ๐˜€๐˜๐—ผ๐—ฟ๐˜† | ๐—๐—ฎ๐—ป๐˜‚๐—ฎ๐—ฟ๐˜† ๐Ÿญ๐Ÿณ, ๐Ÿฎ๐Ÿฌ๐Ÿญ๐Ÿต

    Seven years ago today, Troy Hunt ( @troyhunt ) disclosed Collection #1, one of the largest known aggregations of breached credentials at the time.

    ๐Ÿ‘‰ See Troy's original write-up on this finding: troyhunt.com/the-773-million-r

    Collection #1 showed how old breaches become new threats at scale when data is reused, automated, and repackaged. For deeper context on why this happens, we recommend two #CyberCanonHoF books published years before this incident.

    ๐™Ž๐™ฅ๐™–๐™ข ๐™‰๐™–๐™ฉ๐™ž๐™ค๐™ฃ - the economics of stolen data ( @briankrebs )
    ๐Ÿ“ Review: cybercanon.org/spam-nation/
    ๐Ÿ›๏ธ Amazon affiliate link: amzn.to/4o0m5wz

    ๐™†๐™ž๐™ฃ๐™œ๐™ฅ๐™ž๐™ฃ - how cybercrime gets monetized ( @Kpoulsen )
    ๐Ÿ“ Review: cybercanon.org/kingpin-how-a-h
    ๐Ÿ›๏ธ Amazon affiliate link: amzn.to/4nWQCv4

    #CybersecurityHistory #CybersecurityBooks #DataBreach

    #CybersecurityHistory #CybersecurityBooks #DataBreach

  2. ๐Ÿ“œ ๐—ง๐—ผ๐—ฑ๐—ฎ๐˜† ๐—ถ๐—ป ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—›๐—ถ๐˜€๐˜๐—ผ๐—ฟ๐˜† | ๐—๐—ฎ๐—ป๐˜‚๐—ฎ๐—ฟ๐˜† ๐Ÿญ๐Ÿณ, ๐Ÿฎ๐Ÿฌ๐Ÿญ๐Ÿต

    Seven years ago today, Troy Hunt ( @troyhunt ) disclosed Collection #1, one of the largest known aggregations of breached credentials at the time.

    ๐Ÿ‘‰ See Troy's original write-up on this finding: troyhunt.com/the-773-million-r

    Collection #1 showed how old breaches become new threats at scale when data is reused, automated, and repackaged. For deeper context on why this happens, we recommend two #CyberCanonHoF books published years before this incident.

    ๐™Ž๐™ฅ๐™–๐™ข ๐™‰๐™–๐™ฉ๐™ž๐™ค๐™ฃ - the economics of stolen data ( @briankrebs )
    ๐Ÿ“ Review: cybercanon.org/spam-nation/
    ๐Ÿ›๏ธ Amazon affiliate link: amzn.to/4o0m5wz

    ๐™†๐™ž๐™ฃ๐™œ๐™ฅ๐™ž๐™ฃ - how cybercrime gets monetized ( @Kpoulsen )
    ๐Ÿ“ Review: cybercanon.org/kingpin-how-a-h
    ๐Ÿ›๏ธ Amazon affiliate link: amzn.to/4nWQCv4

    #CybersecurityHistory #CybersecurityBooks #DataBreach

    #CybersecurityHistory #CybersecurityBooks #DataBreach

  3. ๐Ÿ“œ ๐—ง๐—ผ๐—ฑ๐—ฎ๐˜† ๐—ถ๐—ป ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—›๐—ถ๐˜€๐˜๐—ผ๐—ฟ๐˜† | ๐—๐—ฎ๐—ป๐˜‚๐—ฎ๐—ฟ๐˜† ๐Ÿญ๐Ÿณ, ๐Ÿฎ๐Ÿฌ๐Ÿญ๐Ÿต

    Seven years ago today, Troy Hunt ( @troyhunt ) disclosed Collection #1, one of the largest known aggregations of breached credentials at the time.

    ๐Ÿ‘‰ See Troy's original write-up on this finding: troyhunt.com/the-773-million-r

    Collection #1 showed how old breaches become new threats at scale when data is reused, automated, and repackaged. For deeper context on why this happens, we recommend two #CyberCanonHoF books published years before this incident.

    ๐™Ž๐™ฅ๐™–๐™ข ๐™‰๐™–๐™ฉ๐™ž๐™ค๐™ฃ - the economics of stolen data ( @briankrebs )
    ๐Ÿ“ Review: cybercanon.org/spam-nation/
    ๐Ÿ›๏ธ Amazon affiliate link: amzn.to/4o0m5wz

    ๐™†๐™ž๐™ฃ๐™œ๐™ฅ๐™ž๐™ฃ - how cybercrime gets monetized ( @Kpoulsen )
    ๐Ÿ“ Review: cybercanon.org/kingpin-how-a-h
    ๐Ÿ›๏ธ Amazon affiliate link: amzn.to/4nWQCv4

    #CybersecurityHistory #CybersecurityBooks #DataBreach

    #CybersecurityHistory #CybersecurityBooks #DataBreach

  4. ๐Ÿ“œ ๐—ง๐—ผ๐—ฑ๐—ฎ๐˜† ๐—ถ๐—ป ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—›๐—ถ๐˜€๐˜๐—ผ๐—ฟ๐˜† | ๐—๐—ฎ๐—ป๐˜‚๐—ฎ๐—ฟ๐˜† ๐Ÿญ๐Ÿณ, ๐Ÿฎ๐Ÿฌ๐Ÿญ๐Ÿต

    Seven years ago today, Troy Hunt ( @troyhunt ) disclosed Collection #1, one of the largest known aggregations of breached credentials at the time.

    ๐Ÿ‘‰ See Troy's original write-up on this finding: troyhunt.com/the-773-million-r

    Collection #1 showed how old breaches become new threats at scale when data is reused, automated, and repackaged. For deeper context on why this happens, we recommend two #CyberCanonHoF books published years before this incident.

    ๐™Ž๐™ฅ๐™–๐™ข ๐™‰๐™–๐™ฉ๐™ž๐™ค๐™ฃ - the economics of stolen data ( @briankrebs )
    ๐Ÿ“ Review: cybercanon.org/spam-nation/
    ๐Ÿ›๏ธ Amazon affiliate link: amzn.to/4o0m5wz

    ๐™†๐™ž๐™ฃ๐™œ๐™ฅ๐™ž๐™ฃ - how cybercrime gets monetized ( @Kpoulsen )
    ๐Ÿ“ Review: cybercanon.org/kingpin-how-a-h
    ๐Ÿ›๏ธ Amazon affiliate link: amzn.to/4nWQCv4

    #CybersecurityHistory #CybersecurityBooks #DataBreach

    #CybersecurityHistory #CybersecurityBooks #DataBreach

  5. ๐Ÿ“œ ๐—ง๐—ผ๐—ฑ๐—ฎ๐˜† ๐—ถ๐—ป ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—›๐—ถ๐˜€๐˜๐—ผ๐—ฟ๐˜† | ๐—๐—ฎ๐—ป๐˜‚๐—ฎ๐—ฟ๐˜† ๐Ÿญ๐Ÿณ, ๐Ÿฎ๐Ÿฌ๐Ÿญ๐Ÿต

    Seven years ago today, Troy Hunt ( @troyhunt ) disclosed Collection #1, one of the largest known aggregations of breached credentials at the time.

    ๐Ÿ‘‰ See Troy's original write-up on this finding: troyhunt.com/the-773-million-r

    Collection #1 showed how old breaches become new threats at scale when data is reused, automated, and repackaged. For deeper context on why this happens, we recommend two #CyberCanonHoF books published years before this incident.

    ๐™Ž๐™ฅ๐™–๐™ข ๐™‰๐™–๐™ฉ๐™ž๐™ค๐™ฃ - the economics of stolen data ( @briankrebs )
    ๐Ÿ“ Review: cybercanon.org/spam-nation/
    ๐Ÿ›๏ธ Amazon affiliate link: amzn.to/4o0m5wz

    ๐™†๐™ž๐™ฃ๐™œ๐™ฅ๐™ž๐™ฃ - how cybercrime gets monetized ( @Kpoulsen )
    ๐Ÿ“ Review: cybercanon.org/kingpin-how-a-h
    ๐Ÿ›๏ธ Amazon affiliate link: amzn.to/4nWQCv4

    #CybersecurityHistory #CybersecurityBooks #DataBreach

    #CybersecurityHistory #CybersecurityBooks #DataBreach

  6. This weekend is brought to you by this quote from Mark Bowden, author of ๐™’๐™ค๐™ง๐™ข: ๐™๐™๐™š ๐™๐™ž๐™ง๐™จ๐™ฉ ๐˜ฟ๐™ž๐™œ๐™ž๐™ฉ๐™–๐™ก ๐™’๐™ค๐™ง๐™ก๐™™ ๐™’๐™–๐™ง, a 2017 CyberCanon Hall of Fame winner.

    Check out Rick's review if you have never read it, as it is an entertaining read in itself ๐Ÿ‘‰ cybercanon.org/worm-the-first-

    If you want your own copy, this affiliate link helps support the Canon: amzn.to/47Xfr3Q

    #Cybersecurity #CyberCanonHoF #CybersecurityBooks #CyberWar

    @raceBannon99 @TheAtlantic

  7. This weekend is brought to you by this quote from Mark Bowden, author of ๐™’๐™ค๐™ง๐™ข: ๐™๐™๐™š ๐™๐™ž๐™ง๐™จ๐™ฉ ๐˜ฟ๐™ž๐™œ๐™ž๐™ฉ๐™–๐™ก ๐™’๐™ค๐™ง๐™ก๐™™ ๐™’๐™–๐™ง, a 2017 CyberCanon Hall of Fame winner.

    Check out Rick's review if you have never read it, as it is an entertaining read in itself ๐Ÿ‘‰ cybercanon.org/worm-the-first-

    If you want your own copy, this affiliate link helps support the Canon: amzn.to/47Xfr3Q

    #Cybersecurity #CyberCanonHoF #CybersecurityBooks #CyberWar

    @raceBannon99 @TheAtlantic

  8. This weekend is brought to you by this quote from Mark Bowden, author of ๐™’๐™ค๐™ง๐™ข: ๐™๐™๐™š ๐™๐™ž๐™ง๐™จ๐™ฉ ๐˜ฟ๐™ž๐™œ๐™ž๐™ฉ๐™–๐™ก ๐™’๐™ค๐™ง๐™ก๐™™ ๐™’๐™–๐™ง, a 2017 CyberCanon Hall of Fame winner.

    Check out Rick's review if you have never read it, as it is an entertaining read in itself ๐Ÿ‘‰ cybercanon.org/worm-the-first-

    If you want your own copy, this affiliate link helps support the Canon: amzn.to/47Xfr3Q

    #Cybersecurity #CyberCanonHoF #CybersecurityBooks #CyberWar

    @raceBannon99 @TheAtlantic

  9. This weekend is brought to you by this quote from Mark Bowden, author of ๐™’๐™ค๐™ง๐™ข: ๐™๐™๐™š ๐™๐™ž๐™ง๐™จ๐™ฉ ๐˜ฟ๐™ž๐™œ๐™ž๐™ฉ๐™–๐™ก ๐™’๐™ค๐™ง๐™ก๐™™ ๐™’๐™–๐™ง, a 2017 CyberCanon Hall of Fame winner.

    Check out Rick's review if you have never read it, as it is an entertaining read in itself ๐Ÿ‘‰ cybercanon.org/worm-the-first-

    If you want your own copy, this affiliate link helps support the Canon: amzn.to/47Xfr3Q

    #Cybersecurity #CyberCanonHoF #CybersecurityBooks #CyberWar

    @raceBannon99 @TheAtlantic

  10. This weekend is brought to you by this quote from Mark Bowden, author of ๐™’๐™ค๐™ง๐™ข: ๐™๐™๐™š ๐™๐™ž๐™ง๐™จ๐™ฉ ๐˜ฟ๐™ž๐™œ๐™ž๐™ฉ๐™–๐™ก ๐™’๐™ค๐™ง๐™ก๐™™ ๐™’๐™–๐™ง, a 2017 CyberCanon Hall of Fame winner.

    Check out Rick's review if you have never read it, as it is an entertaining read in itself ๐Ÿ‘‰ cybercanon.org/worm-the-first-

    If you want your own copy, this affiliate link helps support the Canon: amzn.to/47Xfr3Q

    #Cybersecurity #CyberCanonHoF #CybersecurityBooks #CyberWar

    @raceBannon99 @TheAtlantic

  11. ๐Ÿ“…๐—ง๐—ผ๐—ฑ๐—ฎ๐˜† ๐—ถ๐—ป ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—›๐—ถ๐˜€๐˜๐—ผ๐—ฟ๐˜†!

    On November 2, 1988, the Morris Worm became the first major computer virus to spread across the Internet. What began as a graduate studentโ€™s โ€œexperimentโ€ quickly spiraled out of control, taking down much of the early Internet and costing millions in cleanup. It also gave rise to one of cybersecurityโ€™s most important realizations: even well-intentioned code can cause catastrophic damage in a connected world.

    To learn more, ๐™๐™–๐™ฃ๐™˜๐™ฎ ๐˜ฝ๐™š๐™–๐™ง ๐™‚๐™ค๐™š๐™จ ๐™‹๐™๐™ž๐™จ๐™๐™ž๐™ฃ๐™œ by Scott Shapiro, a #CyberCanonHoFCandidate, covers the #MorrisWorm as one of its five infamous hacks. See our review โžก๏ธ tinyurl.com/r2b3zc2u

    ๐Ÿ’ฅAnd as a bonus, many may not be aware that ๐™๐™๐™š ๐˜พ๐™ช๐™˜๐™ ๐™ค๐™ค'๐™จ ๐™€๐™œ๐™œ also contains an interesting perspective on the Morris Worm. A year after astronomer Cliff Stoll's spy tracking journey, he was one of many admins around the country who were investigating the Morris Worm live as it was spreading through the night. Cliff writes about this experience in the book's epilogue, where he discovers that the author of the worm was actually the son of NSA's Chief Scientist, Robert Morris, whom Cliff worked with in relation to his international hacker sleuthing a year earlier.

    #CyberCanonHoF review โžก๏ธ tinyurl.com/3rywf7zw

    #CyberCanon #CybersecurityHistory #CybersecurityBooks

  12. ๐Ÿ“…๐—ง๐—ผ๐—ฑ๐—ฎ๐˜† ๐—ถ๐—ป ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—›๐—ถ๐˜€๐˜๐—ผ๐—ฟ๐˜†!

    On November 2, 1988, the Morris Worm became the first major computer virus to spread across the Internet. What began as a graduate studentโ€™s โ€œexperimentโ€ quickly spiraled out of control, taking down much of the early Internet and costing millions in cleanup. It also gave rise to one of cybersecurityโ€™s most important realizations: even well-intentioned code can cause catastrophic damage in a connected world.

    To learn more, ๐™๐™–๐™ฃ๐™˜๐™ฎ ๐˜ฝ๐™š๐™–๐™ง ๐™‚๐™ค๐™š๐™จ ๐™‹๐™๐™ž๐™จ๐™๐™ž๐™ฃ๐™œ by Scott Shapiro, a #CyberCanonHoFCandidate, covers the #MorrisWorm as one of its five infamous hacks. See our review โžก๏ธ tinyurl.com/r2b3zc2u

    ๐Ÿ’ฅAnd as a bonus, many may not be aware that ๐™๐™๐™š ๐˜พ๐™ช๐™˜๐™ ๐™ค๐™ค'๐™จ ๐™€๐™œ๐™œ also contains an interesting perspective on the Morris Worm. A year after astronomer Cliff Stoll's spy tracking journey, he was one of many admins around the country who were investigating the Morris Worm live as it was spreading through the night. Cliff writes about this experience in the book's epilogue, where he discovers that the author of the worm was actually the son of NSA's Chief Scientist, Robert Morris, whom Cliff worked with in relation to his international hacker sleuthing a year earlier.

    #CyberCanonHoF review โžก๏ธ tinyurl.com/3rywf7zw

    #CyberCanon #CybersecurityHistory #CybersecurityBooks

  13. ๐Ÿ“…๐—ง๐—ผ๐—ฑ๐—ฎ๐˜† ๐—ถ๐—ป ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—›๐—ถ๐˜€๐˜๐—ผ๐—ฟ๐˜†!

    On November 2, 1988, the Morris Worm became the first major computer virus to spread across the Internet. What began as a graduate studentโ€™s โ€œexperimentโ€ quickly spiraled out of control, taking down much of the early Internet and costing millions in cleanup. It also gave rise to one of cybersecurityโ€™s most important realizations: even well-intentioned code can cause catastrophic damage in a connected world.

    To learn more, ๐™๐™–๐™ฃ๐™˜๐™ฎ ๐˜ฝ๐™š๐™–๐™ง ๐™‚๐™ค๐™š๐™จ ๐™‹๐™๐™ž๐™จ๐™๐™ž๐™ฃ๐™œ by Scott Shapiro, a #CyberCanonHoFCandidate, covers the #MorrisWorm as one of its five infamous hacks. See our review โžก๏ธ tinyurl.com/r2b3zc2u

    ๐Ÿ’ฅAnd as a bonus, many may not be aware that ๐™๐™๐™š ๐˜พ๐™ช๐™˜๐™ ๐™ค๐™ค'๐™จ ๐™€๐™œ๐™œ also contains an interesting perspective on the Morris Worm. A year after astronomer Cliff Stoll's spy tracking journey, he was one of many admins around the country who were investigating the Morris Worm live as it was spreading through the night. Cliff writes about this experience in the book's epilogue, where he discovers that the author of the worm was actually the son of NSA's Chief Scientist, Robert Morris, whom Cliff worked with in relation to his international hacker sleuthing a year earlier.

    #CyberCanonHoF review โžก๏ธ tinyurl.com/3rywf7zw

    #CyberCanon #CybersecurityHistory #CybersecurityBooks

  14. ๐Ÿ“…๐—ง๐—ผ๐—ฑ๐—ฎ๐˜† ๐—ถ๐—ป ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—›๐—ถ๐˜€๐˜๐—ผ๐—ฟ๐˜†!

    On November 2, 1988, the Morris Worm became the first major computer virus to spread across the Internet. What began as a graduate studentโ€™s โ€œexperimentโ€ quickly spiraled out of control, taking down much of the early Internet and costing millions in cleanup. It also gave rise to one of cybersecurityโ€™s most important realizations: even well-intentioned code can cause catastrophic damage in a connected world.

    To learn more, ๐™๐™–๐™ฃ๐™˜๐™ฎ ๐˜ฝ๐™š๐™–๐™ง ๐™‚๐™ค๐™š๐™จ ๐™‹๐™๐™ž๐™จ๐™๐™ž๐™ฃ๐™œ by Scott Shapiro, a #CyberCanonHoFCandidate, covers the #MorrisWorm as one of its five infamous hacks. See our review โžก๏ธ tinyurl.com/r2b3zc2u

    ๐Ÿ’ฅAnd as a bonus, many may not be aware that ๐™๐™๐™š ๐˜พ๐™ช๐™˜๐™ ๐™ค๐™ค'๐™จ ๐™€๐™œ๐™œ also contains an interesting perspective on the Morris Worm. A year after astronomer Cliff Stoll's spy tracking journey, he was one of many admins around the country who were investigating the Morris Worm live as it was spreading through the night. Cliff writes about this experience in the book's epilogue, where he discovers that the author of the worm was actually the son of NSA's Chief Scientist, Robert Morris, whom Cliff worked with in relation to his international hacker sleuthing a year earlier.

    #CyberCanonHoF review โžก๏ธ tinyurl.com/3rywf7zw

    #CyberCanon #CybersecurityHistory #CybersecurityBooks

  15. ๐Ÿ“…๐—ง๐—ผ๐—ฑ๐—ฎ๐˜† ๐—ถ๐—ป ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—›๐—ถ๐˜€๐˜๐—ผ๐—ฟ๐˜†!

    On November 2, 1988, the Morris Worm became the first major computer virus to spread across the Internet. What began as a graduate studentโ€™s โ€œexperimentโ€ quickly spiraled out of control, taking down much of the early Internet and costing millions in cleanup. It also gave rise to one of cybersecurityโ€™s most important realizations: even well-intentioned code can cause catastrophic damage in a connected world.

    To learn more, ๐™๐™–๐™ฃ๐™˜๐™ฎ ๐˜ฝ๐™š๐™–๐™ง ๐™‚๐™ค๐™š๐™จ ๐™‹๐™๐™ž๐™จ๐™๐™ž๐™ฃ๐™œ by Scott Shapiro, a #CyberCanonHoFCandidate, covers the #MorrisWorm as one of its five infamous hacks. See our review โžก๏ธ tinyurl.com/r2b3zc2u

    ๐Ÿ’ฅAnd as a bonus, many may not be aware that ๐™๐™๐™š ๐˜พ๐™ช๐™˜๐™ ๐™ค๐™ค'๐™จ ๐™€๐™œ๐™œ also contains an interesting perspective on the Morris Worm. A year after astronomer Cliff Stoll's spy tracking journey, he was one of many admins around the country who were investigating the Morris Worm live as it was spreading through the night. Cliff writes about this experience in the book's epilogue, where he discovers that the author of the worm was actually the son of NSA's Chief Scientist, Robert Morris, whom Cliff worked with in relation to his international hacker sleuthing a year earlier.

    #CyberCanonHoF review โžก๏ธ tinyurl.com/3rywf7zw

    #CyberCanon #CybersecurityHistory #CybersecurityBooks

  16. ๐ŸŽƒIt's Halloween. But forget ghost stories, the scariest stories are true.

    In ๐™Ž๐™–๐™ฃ๐™™๐™ฌ๐™ค๐™ง๐™ข, @agreenberg unravels a real-life cyber-thriller. A Russian hacking unit unleashes chaos around the world, turning code into a weapon and critical infrastructure into targets. No jump scares. Just power grids going dark, global companies paralyzed, and governments scrambling in the shadows.

    At #CyberCanon, we honor books that reveal how close the digital and physical worlds really are and how fragile our sense of safety can be when the next exploit lurks unseen.

    ๐Ÿ’€ tinyurl.com/mu9aht95

    #Cybersecurity #CybersecurityBooks #CyberCanonHoF #Halloween

  17. ๐ŸŽƒIt's Halloween. But forget ghost stories, the scariest stories are true.

    In ๐™Ž๐™–๐™ฃ๐™™๐™ฌ๐™ค๐™ง๐™ข, @agreenberg unravels a real-life cyber-thriller. A Russian hacking unit unleashes chaos around the world, turning code into a weapon and critical infrastructure into targets. No jump scares. Just power grids going dark, global companies paralyzed, and governments scrambling in the shadows.

    At #CyberCanon, we honor books that reveal how close the digital and physical worlds really are and how fragile our sense of safety can be when the next exploit lurks unseen.

    ๐Ÿ’€ tinyurl.com/mu9aht95

    #Cybersecurity #CybersecurityBooks #CyberCanonHoF #Halloween

  18. ๐ŸŽƒIt's Halloween. But forget ghost stories, the scariest stories are true.

    In ๐™Ž๐™–๐™ฃ๐™™๐™ฌ๐™ค๐™ง๐™ข, @agreenberg unravels a real-life cyber-thriller. A Russian hacking unit unleashes chaos around the world, turning code into a weapon and critical infrastructure into targets. No jump scares. Just power grids going dark, global companies paralyzed, and governments scrambling in the shadows.

    At #CyberCanon, we honor books that reveal how close the digital and physical worlds really are and how fragile our sense of safety can be when the next exploit lurks unseen.

    ๐Ÿ’€ tinyurl.com/mu9aht95

    #Cybersecurity #CybersecurityBooks #CyberCanonHoF #Halloween

  19. ๐ŸŽƒIt's Halloween. But forget ghost stories, the scariest stories are true.

    In ๐™Ž๐™–๐™ฃ๐™™๐™ฌ๐™ค๐™ง๐™ข, @agreenberg unravels a real-life cyber-thriller. A Russian hacking unit unleashes chaos around the world, turning code into a weapon and critical infrastructure into targets. No jump scares. Just power grids going dark, global companies paralyzed, and governments scrambling in the shadows.

    At #CyberCanon, we honor books that reveal how close the digital and physical worlds really are and how fragile our sense of safety can be when the next exploit lurks unseen.

    ๐Ÿ’€ tinyurl.com/mu9aht95

    #Cybersecurity #CybersecurityBooks #CyberCanonHoF #Halloween

  20. ๐ŸŽƒIt's Halloween. But forget ghost stories, the scariest stories are true.

    In ๐™Ž๐™–๐™ฃ๐™™๐™ฌ๐™ค๐™ง๐™ข, @agreenberg unravels a real-life cyber-thriller. A Russian hacking unit unleashes chaos around the world, turning code into a weapon and critical infrastructure into targets. No jump scares. Just power grids going dark, global companies paralyzed, and governments scrambling in the shadows.

    At #CyberCanon, we honor books that reveal how close the digital and physical worlds really are and how fragile our sense of safety can be when the next exploit lurks unseen.

    ๐Ÿ’€ tinyurl.com/mu9aht95

    #Cybersecurity #CybersecurityBooks #CyberCanonHoF #Halloween

  21. This #CybersecurityAwarenessMonth, remember security awareness isnโ€™t about information. Itโ€™s about ๐˜ต๐˜ณ๐˜ข๐˜ฏ๐˜ด๐˜ง๐˜ฐ๐˜ณ๐˜ฎ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ. ๐Ÿ›->๐Ÿฆ‹

    At CyberCanon, we celebrate books that go beyond technical defense to ๐™ฉ๐™ง๐™–๐™ฃ๐™จ๐™›๐™ค๐™ง๐™ข our understanding of security.

    Perry Carpenterโ€™s ๐™๐™ง๐™–๐™ฃ๐™จ๐™›๐™ค๐™ง๐™ข๐™–๐™ฉ๐™ž๐™ค๐™ฃ๐™–๐™ก ๐™Ž๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐˜ผ๐™ฌ๐™–๐™ง๐™š๐™ฃ๐™š๐™จ๐™จ reframes awareness as a human challenge, not a compliance task ๐Ÿ‘‰tinyurl.com/u6kr7dzz

    Read about this Hall of Famer and more CyberCanon-approved books that shape the culture of security.

    #CyberCanonHoF #CybersecurityBooks #SecurityAwareness #SecurityCulture

  22. This #CybersecurityAwarenessMonth, remember security awareness isnโ€™t about information. Itโ€™s about ๐˜ต๐˜ณ๐˜ข๐˜ฏ๐˜ด๐˜ง๐˜ฐ๐˜ณ๐˜ฎ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ. ๐Ÿ›->๐Ÿฆ‹

    At CyberCanon, we celebrate books that go beyond technical defense to ๐™ฉ๐™ง๐™–๐™ฃ๐™จ๐™›๐™ค๐™ง๐™ข our understanding of security.

    Perry Carpenterโ€™s ๐™๐™ง๐™–๐™ฃ๐™จ๐™›๐™ค๐™ง๐™ข๐™–๐™ฉ๐™ž๐™ค๐™ฃ๐™–๐™ก ๐™Ž๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐˜ผ๐™ฌ๐™–๐™ง๐™š๐™ฃ๐™š๐™จ๐™จ reframes awareness as a human challenge, not a compliance task ๐Ÿ‘‰tinyurl.com/u6kr7dzz

    Read about this Hall of Famer and more CyberCanon-approved books that shape the culture of security.

    #CyberCanonHoF #CybersecurityBooks #SecurityAwareness #SecurityCulture

  23. This #CybersecurityAwarenessMonth, remember security awareness isnโ€™t about information. Itโ€™s about ๐˜ต๐˜ณ๐˜ข๐˜ฏ๐˜ด๐˜ง๐˜ฐ๐˜ณ๐˜ฎ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ. ๐Ÿ›->๐Ÿฆ‹

    At CyberCanon, we celebrate books that go beyond technical defense to ๐™ฉ๐™ง๐™–๐™ฃ๐™จ๐™›๐™ค๐™ง๐™ข our understanding of security.

    Perry Carpenterโ€™s ๐™๐™ง๐™–๐™ฃ๐™จ๐™›๐™ค๐™ง๐™ข๐™–๐™ฉ๐™ž๐™ค๐™ฃ๐™–๐™ก ๐™Ž๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐˜ผ๐™ฌ๐™–๐™ง๐™š๐™ฃ๐™š๐™จ๐™จ reframes awareness as a human challenge, not a compliance task ๐Ÿ‘‰tinyurl.com/u6kr7dzz

    Read about this Hall of Famer and more CyberCanon-approved books that shape the culture of security.

    #CyberCanonHoF #CybersecurityBooks #SecurityAwareness #SecurityCulture

  24. This #CybersecurityAwarenessMonth, remember security awareness isnโ€™t about information. Itโ€™s about ๐˜ต๐˜ณ๐˜ข๐˜ฏ๐˜ด๐˜ง๐˜ฐ๐˜ณ๐˜ฎ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ. ๐Ÿ›->๐Ÿฆ‹

    At CyberCanon, we celebrate books that go beyond technical defense to ๐™ฉ๐™ง๐™–๐™ฃ๐™จ๐™›๐™ค๐™ง๐™ข our understanding of security.

    Perry Carpenterโ€™s ๐™๐™ง๐™–๐™ฃ๐™จ๐™›๐™ค๐™ง๐™ข๐™–๐™ฉ๐™ž๐™ค๐™ฃ๐™–๐™ก ๐™Ž๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐˜ผ๐™ฌ๐™–๐™ง๐™š๐™ฃ๐™š๐™จ๐™จ reframes awareness as a human challenge, not a compliance task ๐Ÿ‘‰tinyurl.com/u6kr7dzz

    Read about this Hall of Famer and more CyberCanon-approved books that shape the culture of security.

    #CyberCanonHoF #CybersecurityBooks #SecurityAwareness #SecurityCulture

  25. This #CybersecurityAwarenessMonth, remember security awareness isnโ€™t about information. Itโ€™s about ๐˜ต๐˜ณ๐˜ข๐˜ฏ๐˜ด๐˜ง๐˜ฐ๐˜ณ๐˜ฎ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ. ๐Ÿ›->๐Ÿฆ‹

    At CyberCanon, we celebrate books that go beyond technical defense to ๐™ฉ๐™ง๐™–๐™ฃ๐™จ๐™›๐™ค๐™ง๐™ข our understanding of security.

    Perry Carpenterโ€™s ๐™๐™ง๐™–๐™ฃ๐™จ๐™›๐™ค๐™ง๐™ข๐™–๐™ฉ๐™ž๐™ค๐™ฃ๐™–๐™ก ๐™Ž๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐˜ผ๐™ฌ๐™–๐™ง๐™š๐™ฃ๐™š๐™จ๐™จ reframes awareness as a human challenge, not a compliance task ๐Ÿ‘‰tinyurl.com/u6kr7dzz

    Read about this Hall of Famer and more CyberCanon-approved books that shape the culture of security.

    #CyberCanonHoF #CybersecurityBooks #SecurityAwareness #SecurityCulture

  26. ๐Ÿ—ž๏ธDid you miss our October Newsletter?

    ๐Ÿ”ฆtinyurl.com/33n4y4w9

    Be sure to read and subscribe over on Substack. In this edition, we are shining a light on a Hall of Famer for #CybersecurityAwarenessMonth:

    ๐ŸฆŠ๐˜พ๐™ฎ๐™—๐™š๐™ง๐™จ๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐™ˆ๐™ฎ๐™ฉ๐™๐™จ ๐™–๐™ฃ๐™™ ๐™ˆ๐™ž๐™จ๐™˜๐™ค๐™ฃ๐™˜๐™š๐™ฅ๐™ฉ๐™ž๐™ค๐™ฃ๐™จ by Gene Spafford, @theladyofgeek, and @dykstra

    #CyberCanonHoF #CybersecurityBooks #CybersecurityNewsletter

  27. ๐Ÿ—ž๏ธDid you miss our October Newsletter?

    ๐Ÿ”ฆtinyurl.com/33n4y4w9

    Be sure to read and subscribe over on Substack. In this edition, we are shining a light on a Hall of Famer for #CybersecurityAwarenessMonth:

    ๐ŸฆŠ๐˜พ๐™ฎ๐™—๐™š๐™ง๐™จ๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐™ˆ๐™ฎ๐™ฉ๐™๐™จ ๐™–๐™ฃ๐™™ ๐™ˆ๐™ž๐™จ๐™˜๐™ค๐™ฃ๐™˜๐™š๐™ฅ๐™ฉ๐™ž๐™ค๐™ฃ๐™จ by Gene Spafford, @theladyofgeek, and @dykstra

    #CyberCanonHoF #CybersecurityBooks #CybersecurityNewsletter

  28. ๐Ÿ—ž๏ธDid you miss our October Newsletter?

    ๐Ÿ”ฆtinyurl.com/33n4y4w9

    Be sure to read and subscribe over on Substack. In this edition, we are shining a light on a Hall of Famer for #CybersecurityAwarenessMonth:

    ๐ŸฆŠ๐˜พ๐™ฎ๐™—๐™š๐™ง๐™จ๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐™ˆ๐™ฎ๐™ฉ๐™๐™จ ๐™–๐™ฃ๐™™ ๐™ˆ๐™ž๐™จ๐™˜๐™ค๐™ฃ๐™˜๐™š๐™ฅ๐™ฉ๐™ž๐™ค๐™ฃ๐™จ by Gene Spafford, @theladyofgeek, and @dykstra

    #CyberCanonHoF #CybersecurityBooks #CybersecurityNewsletter

  29. ๐Ÿ—ž๏ธDid you miss our October Newsletter?

    ๐Ÿ”ฆtinyurl.com/33n4y4w9

    Be sure to read and subscribe over on Substack. In this edition, we are shining a light on a Hall of Famer for #CybersecurityAwarenessMonth:

    ๐ŸฆŠ๐˜พ๐™ฎ๐™—๐™š๐™ง๐™จ๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐™ˆ๐™ฎ๐™ฉ๐™๐™จ ๐™–๐™ฃ๐™™ ๐™ˆ๐™ž๐™จ๐™˜๐™ค๐™ฃ๐™˜๐™š๐™ฅ๐™ฉ๐™ž๐™ค๐™ฃ๐™จ by Gene Spafford, @theladyofgeek, and @dykstra

    #CyberCanonHoF #CybersecurityBooks #CybersecurityNewsletter

  30. ๐Ÿ—ž๏ธDid you miss our October Newsletter?

    ๐Ÿ”ฆtinyurl.com/33n4y4w9

    Be sure to read and subscribe over on Substack. In this edition, we are shining a light on a Hall of Famer for #CybersecurityAwarenessMonth:

    ๐ŸฆŠ๐˜พ๐™ฎ๐™—๐™š๐™ง๐™จ๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐™ˆ๐™ฎ๐™ฉ๐™๐™จ ๐™–๐™ฃ๐™™ ๐™ˆ๐™ž๐™จ๐™˜๐™ค๐™ฃ๐™˜๐™š๐™ฅ๐™ฉ๐™ž๐™ค๐™ฃ๐™จ by Gene Spafford, @theladyofgeek, and @dykstra

    #CyberCanonHoF #CybersecurityBooks #CybersecurityNewsletter

  31. ๐Ÿ—“๏ธREMINDER๐Ÿ—“๏ธ

    Thursday, 9/25, our very own Rick Howard will be presenting at
    Bitwarden's #OpenSourceSecuritySummit along side Rinki Sethi and Andy Greenberg.

    It's free, it's virtual, and it's only 2 hours, so no excuses. โ˜บ๏ธ

    ๐Ÿ‘‰ bitwarden.com/open-source-secu

    Andy is a rare 2X #CyberCanon Hall of Fame winner for his books Sandworm and Tracers in the Dark.

    ๐™Ž๐™–๐™ฃ๐™™๐™ฌ๐™ค๐™ง๐™ข review: tinyurl.com/mu9aht95

    ๐™๐™ง๐™–๐™˜๐™š๐™ง๐™จ ๐™ž๐™ฃ ๐™ฉ๐™๐™š ๐˜ฟ๐™–๐™ง๐™  review: tinyurl.com/3xw76xxp

    @bitwarden
    @agreenberg
    #CyberCanonHoF #Cybersecurity #CybersecurityBooks

  32. ๐Ÿ—“๏ธREMINDER๐Ÿ—“๏ธ

    Thursday, 9/25, our very own Rick Howard will be presenting at
    Bitwarden's #OpenSourceSecuritySummit along side Rinki Sethi and Andy Greenberg.

    It's free, it's virtual, and it's only 2 hours, so no excuses. โ˜บ๏ธ

    ๐Ÿ‘‰ bitwarden.com/open-source-secu

    Andy is a rare 2X #CyberCanon Hall of Fame winner for his books Sandworm and Tracers in the Dark.

    ๐™Ž๐™–๐™ฃ๐™™๐™ฌ๐™ค๐™ง๐™ข review: tinyurl.com/mu9aht95

    ๐™๐™ง๐™–๐™˜๐™š๐™ง๐™จ ๐™ž๐™ฃ ๐™ฉ๐™๐™š ๐˜ฟ๐™–๐™ง๐™  review: tinyurl.com/3xw76xxp

    @bitwarden
    @agreenberg
    #CyberCanonHoF #Cybersecurity #CybersecurityBooks

  33. ๐Ÿ—“๏ธREMINDER๐Ÿ—“๏ธ

    Thursday, 9/25, our very own Rick Howard will be presenting at
    Bitwarden's #OpenSourceSecuritySummit along side Rinki Sethi and Andy Greenberg.

    It's free, it's virtual, and it's only 2 hours, so no excuses. โ˜บ๏ธ

    ๐Ÿ‘‰ bitwarden.com/open-source-secu

    Andy is a rare 2X #CyberCanon Hall of Fame winner for his books Sandworm and Tracers in the Dark.

    ๐™Ž๐™–๐™ฃ๐™™๐™ฌ๐™ค๐™ง๐™ข review: tinyurl.com/mu9aht95

    ๐™๐™ง๐™–๐™˜๐™š๐™ง๐™จ ๐™ž๐™ฃ ๐™ฉ๐™๐™š ๐˜ฟ๐™–๐™ง๐™  review: tinyurl.com/3xw76xxp

    @bitwarden
    @agreenberg
    #CyberCanonHoF #Cybersecurity #CybersecurityBooks

  34. ๐Ÿ—“๏ธREMINDER๐Ÿ—“๏ธ

    Thursday, 9/25, our very own Rick Howard will be presenting at
    Bitwarden's #OpenSourceSecuritySummit along side Rinki Sethi and Andy Greenberg.

    It's free, it's virtual, and it's only 2 hours, so no excuses. โ˜บ๏ธ

    ๐Ÿ‘‰ bitwarden.com/open-source-secu

    Andy is a rare 2X #CyberCanon Hall of Fame winner for his books Sandworm and Tracers in the Dark.

    ๐™Ž๐™–๐™ฃ๐™™๐™ฌ๐™ค๐™ง๐™ข review: tinyurl.com/mu9aht95

    ๐™๐™ง๐™–๐™˜๐™š๐™ง๐™จ ๐™ž๐™ฃ ๐™ฉ๐™๐™š ๐˜ฟ๐™–๐™ง๐™  review: tinyurl.com/3xw76xxp

    @bitwarden
    @agreenberg
    #CyberCanonHoF #Cybersecurity #CybersecurityBooks

  35. ๐Ÿ—“๏ธREMINDER๐Ÿ—“๏ธ

    Thursday, 9/25, our very own Rick Howard will be presenting at
    Bitwarden's #OpenSourceSecuritySummit along side Rinki Sethi and Andy Greenberg.

    It's free, it's virtual, and it's only 2 hours, so no excuses. โ˜บ๏ธ

    ๐Ÿ‘‰ bitwarden.com/open-source-secu

    Andy is a rare 2X #CyberCanon Hall of Fame winner for his books Sandworm and Tracers in the Dark.

    ๐™Ž๐™–๐™ฃ๐™™๐™ฌ๐™ค๐™ง๐™ข review: tinyurl.com/mu9aht95

    ๐™๐™ง๐™–๐™˜๐™š๐™ง๐™จ ๐™ž๐™ฃ ๐™ฉ๐™๐™š ๐˜ฟ๐™–๐™ง๐™  review: tinyurl.com/3xw76xxp

    @bitwarden
    @agreenberg
    #CyberCanonHoF #Cybersecurity #CybersecurityBooks

  36. Have you heard about this new thing called #AI?!

    (Yes, fairly weak attempt at humor, but give us a break, we're busy over reading and writing over here!)

    This week's book may not be well known (yet), but Andrew Chrostowski thinks that needs to change and is recommending it for the #CyberCanon Hall of Fame ๐Ÿฆ.

    Read why ๐˜ผ๐™ง๐™ฉ๐™ž๐™›๐™ž๐™˜๐™ž๐™–๐™ก ๐™„๐™ฃ๐™ฉ๐™š๐™ก๐™ก๐™ž๐™œ๐™š๐™ฃ๐™˜๐™š ๐™–๐™ฃ๐™™ ๐™ˆ๐™–๐™˜๐™๐™ž๐™ฃ๐™š ๐™‡๐™š๐™–๐™ง๐™ฃ๐™ž๐™ฃ๐™œ ๐™๐™ค๐™ช๐™ฃ๐™™๐™–๐™ฉ๐™ž๐™ค๐™ฃ๐™จ: ๐™‡๐™š๐™–๐™ง๐™ฃ๐™ž๐™ฃ๐™œ ๐™๐™ง๐™ค๐™ข ๐™€๐™ญ๐™ฅ๐™š๐™ง๐™ž๐™š๐™ฃ๐™˜๐™š by Andrew Lowe and Steve Lawless is a #CyberCanonHoF candidate ๐Ÿ‘‰ tinyurl.com/326sztx9

    Publisher: BCS, The Chartered Institute for IT

    #CyberSecurityBooks #CyberSecurity

  37. Have you heard about this new thing called #AI?!

    (Yes, fairly weak attempt at humor, but give us a break, we're busy over reading and writing over here!)

    This week's book may not be well known (yet), but Andrew Chrostowski thinks that needs to change and is recommending it for the #CyberCanon Hall of Fame ๐Ÿฆ.

    Read why ๐˜ผ๐™ง๐™ฉ๐™ž๐™›๐™ž๐™˜๐™ž๐™–๐™ก ๐™„๐™ฃ๐™ฉ๐™š๐™ก๐™ก๐™ž๐™œ๐™š๐™ฃ๐™˜๐™š ๐™–๐™ฃ๐™™ ๐™ˆ๐™–๐™˜๐™๐™ž๐™ฃ๐™š ๐™‡๐™š๐™–๐™ง๐™ฃ๐™ž๐™ฃ๐™œ ๐™๐™ค๐™ช๐™ฃ๐™™๐™–๐™ฉ๐™ž๐™ค๐™ฃ๐™จ: ๐™‡๐™š๐™–๐™ง๐™ฃ๐™ž๐™ฃ๐™œ ๐™๐™ง๐™ค๐™ข ๐™€๐™ญ๐™ฅ๐™š๐™ง๐™ž๐™š๐™ฃ๐™˜๐™š by Andrew Lowe and Steve Lawless is a #CyberCanonHoF candidate ๐Ÿ‘‰ tinyurl.com/326sztx9

    Publisher: BCS, The Chartered Institute for IT

    #CyberSecurityBooks #CyberSecurity

  38. Have you heard about this new thing called #AI?!

    (Yes, fairly weak attempt at humor, but give us a break, we're busy over reading and writing over here!)

    This week's book may not be well known (yet), but Andrew Chrostowski thinks that needs to change and is recommending it for the #CyberCanon Hall of Fame ๐Ÿฆ.

    Read why ๐˜ผ๐™ง๐™ฉ๐™ž๐™›๐™ž๐™˜๐™ž๐™–๐™ก ๐™„๐™ฃ๐™ฉ๐™š๐™ก๐™ก๐™ž๐™œ๐™š๐™ฃ๐™˜๐™š ๐™–๐™ฃ๐™™ ๐™ˆ๐™–๐™˜๐™๐™ž๐™ฃ๐™š ๐™‡๐™š๐™–๐™ง๐™ฃ๐™ž๐™ฃ๐™œ ๐™๐™ค๐™ช๐™ฃ๐™™๐™–๐™ฉ๐™ž๐™ค๐™ฃ๐™จ: ๐™‡๐™š๐™–๐™ง๐™ฃ๐™ž๐™ฃ๐™œ ๐™๐™ง๐™ค๐™ข ๐™€๐™ญ๐™ฅ๐™š๐™ง๐™ž๐™š๐™ฃ๐™˜๐™š by Andrew Lowe and Steve Lawless is a #CyberCanonHoF candidate ๐Ÿ‘‰ tinyurl.com/326sztx9

    Publisher: BCS, The Chartered Institute for IT

    #CyberSecurityBooks #CyberSecurity

  39. Have you heard about this new thing called #AI?!

    (Yes, fairly weak attempt at humor, but give us a break, we're busy over reading and writing over here!)

    This week's book may not be well known (yet), but Andrew Chrostowski thinks that needs to change and is recommending it for the #CyberCanon Hall of Fame ๐Ÿฆ.

    Read why ๐˜ผ๐™ง๐™ฉ๐™ž๐™›๐™ž๐™˜๐™ž๐™–๐™ก ๐™„๐™ฃ๐™ฉ๐™š๐™ก๐™ก๐™ž๐™œ๐™š๐™ฃ๐™˜๐™š ๐™–๐™ฃ๐™™ ๐™ˆ๐™–๐™˜๐™๐™ž๐™ฃ๐™š ๐™‡๐™š๐™–๐™ง๐™ฃ๐™ž๐™ฃ๐™œ ๐™๐™ค๐™ช๐™ฃ๐™™๐™–๐™ฉ๐™ž๐™ค๐™ฃ๐™จ: ๐™‡๐™š๐™–๐™ง๐™ฃ๐™ž๐™ฃ๐™œ ๐™๐™ง๐™ค๐™ข ๐™€๐™ญ๐™ฅ๐™š๐™ง๐™ž๐™š๐™ฃ๐™˜๐™š by Andrew Lowe and Steve Lawless is a #CyberCanonHoF candidate ๐Ÿ‘‰ tinyurl.com/326sztx9

    Publisher: BCS, The Chartered Institute for IT

    #CyberSecurityBooks #CyberSecurity

  40. Have you heard about this new thing called #AI?!

    (Yes, fairly weak attempt at humor, but give us a break, we're busy over reading and writing over here!)

    This week's book may not be well known (yet), but Andrew Chrostowski thinks that needs to change and is recommending it for the #CyberCanon Hall of Fame ๐Ÿฆ.

    Read why ๐˜ผ๐™ง๐™ฉ๐™ž๐™›๐™ž๐™˜๐™ž๐™–๐™ก ๐™„๐™ฃ๐™ฉ๐™š๐™ก๐™ก๐™ž๐™œ๐™š๐™ฃ๐™˜๐™š ๐™–๐™ฃ๐™™ ๐™ˆ๐™–๐™˜๐™๐™ž๐™ฃ๐™š ๐™‡๐™š๐™–๐™ง๐™ฃ๐™ž๐™ฃ๐™œ ๐™๐™ค๐™ช๐™ฃ๐™™๐™–๐™ฉ๐™ž๐™ค๐™ฃ๐™จ: ๐™‡๐™š๐™–๐™ง๐™ฃ๐™ž๐™ฃ๐™œ ๐™๐™ง๐™ค๐™ข ๐™€๐™ญ๐™ฅ๐™š๐™ง๐™ž๐™š๐™ฃ๐™˜๐™š by Andrew Lowe and Steve Lawless is a #CyberCanonHoF candidate ๐Ÿ‘‰ tinyurl.com/326sztx9

    Publisher: BCS, The Chartered Institute for IT

    #CyberSecurityBooks #CyberSecurity

  41. Our August Newsletter ๐Ÿ—ž๏ธ is now live featuring #CyberCanon Hall of Fame winners, candidates, and cyber author-focused recaps from #BlackHat and #defcon.

    Definitely worth taking a peek ๐Ÿ‘‰ tinyurl.com/canon-aug25-nl

    #CyberSecurityBooks #CyberCanonHoF #HackerSummerCamp #BHUSA

  42. Our August Newsletter ๐Ÿ—ž๏ธ is now live featuring #CyberCanon Hall of Fame winners, candidates, and cyber author-focused recaps from #BlackHat and #defcon.

    Definitely worth taking a peek ๐Ÿ‘‰ tinyurl.com/canon-aug25-nl

    #CyberSecurityBooks #CyberCanonHoF #HackerSummerCamp #BHUSA

  43. Our August Newsletter ๐Ÿ—ž๏ธ is now live featuring #CyberCanon Hall of Fame winners, candidates, and cyber author-focused recaps from #BlackHat and #defcon.

    Definitely worth taking a peek ๐Ÿ‘‰ tinyurl.com/canon-aug25-nl

    #CyberSecurityBooks #CyberCanonHoF #HackerSummerCamp #BHUSA

  44. Our August Newsletter ๐Ÿ—ž๏ธ is now live featuring #CyberCanon Hall of Fame winners, candidates, and cyber author-focused recaps from #BlackHat and #defcon.

    Definitely worth taking a peek ๐Ÿ‘‰ tinyurl.com/canon-aug25-nl

    #CyberSecurityBooks #CyberCanonHoF #HackerSummerCamp #BHUSA

  45. Our August Newsletter ๐Ÿ—ž๏ธ is now live featuring #CyberCanon Hall of Fame winners, candidates, and cyber author-focused recaps from #BlackHat and #defcon.

    Definitely worth taking a peek ๐Ÿ‘‰ tinyurl.com/canon-aug25-nl

    #CyberSecurityBooks #CyberCanonHoF #HackerSummerCamp #BHUSA

  46. ๐Ÿ“† ๐—”๐˜‚๐—ด๐˜‚๐˜€๐˜ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐—–๐—ผ๐—บ๐—บ๐—ถ๐˜๐˜๐—ฒ๐—ฒ ๐— ๐—ฒ๐—ฒ๐˜๐—ถ๐—ป๐—ด ๐—›๐—ถ๐—ด๐—ต๐—น๐—ถ๐—ด๐—ต๐˜๐˜€ ๐Ÿ“†

    We had our monthly review committee meeting this week and the Canon keeps getting better! Here are some quick highlights:

    ๐Ÿ…’ Stephanie Pirman and Joanna Grama led very engaged discussions of their detailed reviews.
    ๐Ÿ…’ Trying out new Hall of Fame scoring criteria
    ๐Ÿ…’ Welcomed 4 new committee members
    ๐Ÿ…’ 50 new reviews are currently staged with more arriving weekly!

    #CyberCanon #CyberCanonHoF #CybersecurityBooks #EDR #cyberespionage

  47. ๐Ÿ“† ๐—”๐˜‚๐—ด๐˜‚๐˜€๐˜ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐—–๐—ผ๐—บ๐—บ๐—ถ๐˜๐˜๐—ฒ๐—ฒ ๐— ๐—ฒ๐—ฒ๐˜๐—ถ๐—ป๐—ด ๐—›๐—ถ๐—ด๐—ต๐—น๐—ถ๐—ด๐—ต๐˜๐˜€ ๐Ÿ“†

    We had our monthly review committee meeting this week and the Canon keeps getting better! Here are some quick highlights:

    ๐Ÿ…’ Stephanie Pirman and Joanna Grama led very engaged discussions of their detailed reviews.
    ๐Ÿ…’ Trying out new Hall of Fame scoring criteria
    ๐Ÿ…’ Welcomed 4 new committee members
    ๐Ÿ…’ 50 new reviews are currently staged with more arriving weekly!

    #CyberCanon #CyberCanonHoF #CybersecurityBooks #EDR #cyberespionage

  48. ๐Ÿ“† ๐—”๐˜‚๐—ด๐˜‚๐˜€๐˜ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐—–๐—ผ๐—บ๐—บ๐—ถ๐˜๐˜๐—ฒ๐—ฒ ๐— ๐—ฒ๐—ฒ๐˜๐—ถ๐—ป๐—ด ๐—›๐—ถ๐—ด๐—ต๐—น๐—ถ๐—ด๐—ต๐˜๐˜€ ๐Ÿ“†

    We had our monthly review committee meeting this week and the Canon keeps getting better! Here are some quick highlights:

    ๐Ÿ…’ Stephanie Pirman and Joanna Grama led very engaged discussions of their detailed reviews.
    ๐Ÿ…’ Trying out new Hall of Fame scoring criteria
    ๐Ÿ…’ Welcomed 4 new committee members
    ๐Ÿ…’ 50 new reviews are currently staged with more arriving weekly!

    #CyberCanon #CyberCanonHoF #CybersecurityBooks #EDR #cyberespionage

  49. ๐Ÿ“† ๐—”๐˜‚๐—ด๐˜‚๐˜€๐˜ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐—–๐—ผ๐—บ๐—บ๐—ถ๐˜๐˜๐—ฒ๐—ฒ ๐— ๐—ฒ๐—ฒ๐˜๐—ถ๐—ป๐—ด ๐—›๐—ถ๐—ด๐—ต๐—น๐—ถ๐—ด๐—ต๐˜๐˜€ ๐Ÿ“†

    We had our monthly review committee meeting this week and the Canon keeps getting better! Here are some quick highlights:

    ๐Ÿ…’ Stephanie Pirman and Joanna Grama led very engaged discussions of their detailed reviews.
    ๐Ÿ…’ Trying out new Hall of Fame scoring criteria
    ๐Ÿ…’ Welcomed 4 new committee members
    ๐Ÿ…’ 50 new reviews are currently staged with more arriving weekly!

    #CyberCanon #CyberCanonHoF #CybersecurityBooks #EDR #cyberespionage

  50. ๐Ÿ“† ๐—”๐˜‚๐—ด๐˜‚๐˜€๐˜ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐—–๐—ผ๐—บ๐—บ๐—ถ๐˜๐˜๐—ฒ๐—ฒ ๐— ๐—ฒ๐—ฒ๐˜๐—ถ๐—ป๐—ด ๐—›๐—ถ๐—ด๐—ต๐—น๐—ถ๐—ด๐—ต๐˜๐˜€ ๐Ÿ“†

    We had our monthly review committee meeting this week and the Canon keeps getting better! Here are some quick highlights:

    ๐Ÿ…’ Stephanie Pirman and Joanna Grama led very engaged discussions of their detailed reviews.
    ๐Ÿ…’ Trying out new Hall of Fame scoring criteria
    ๐Ÿ…’ Welcomed 4 new committee members
    ๐Ÿ…’ 50 new reviews are currently staged with more arriving weekly!

    #CyberCanon #CyberCanonHoF #CybersecurityBooks #EDR #cyberespionage