#cybercanonhofcandidate โ Public Fediverse posts
Live and recent posts from across the Fediverse tagged #cybercanonhofcandidate, aggregated by home.social.
-
๐๐ฟ๐ฒ๐๐ต ๐ฅ๐ฒ๐๐ถ๐ฒ๐ ๐๐ฎ๐ป๐ฑ๐ฒ๐ฑ ๐ค๐๐
This week, two committee members are independently recommending Daniel Kahneman's ๐๐๐๐ฃ๐ ๐๐ฃ๐, ๐๐๐จ๐ฉ ๐๐ฃ๐ ๐๐ก๐ค๐ฌ for the CyberCanon Hall of Fame.
๐ Be sure to check out their detailed reviews and why it's valuable for cyber pros -> https://cybercanon.org/thinking-fast-and-slow/
#CybersecurityBooks #Cyberpsychology #CyberCanonHoFCandidate
(1/3...)
-
๐๐ฟ๐ฒ๐๐ต ๐ฅ๐ฒ๐๐ถ๐ฒ๐ ๐๐ฎ๐ป๐ฑ๐ฒ๐ฑ ๐ค๐๐
This week, two committee members are independently recommending Daniel Kahneman's ๐๐๐๐ฃ๐ ๐๐ฃ๐, ๐๐๐จ๐ฉ ๐๐ฃ๐ ๐๐ก๐ค๐ฌ for the CyberCanon Hall of Fame.
๐ Be sure to check out their detailed reviews and why it's valuable for cyber pros -> https://cybercanon.org/thinking-fast-and-slow/
#CybersecurityBooks #Cyberpsychology #CyberCanonHoFCandidate
(1/3...)
-
๐๐ฟ๐ฒ๐๐ต ๐ฅ๐ฒ๐๐ถ๐ฒ๐ ๐๐ฎ๐ป๐ฑ๐ฒ๐ฑ ๐ค๐๐
This week, two committee members are independently recommending Daniel Kahneman's ๐๐๐๐ฃ๐ ๐๐ฃ๐, ๐๐๐จ๐ฉ ๐๐ฃ๐ ๐๐ก๐ค๐ฌ for the CyberCanon Hall of Fame.
๐ Be sure to check out their detailed reviews and why it's valuable for cyber pros -> https://cybercanon.org/thinking-fast-and-slow/
#CybersecurityBooks #Cyberpsychology #CyberCanonHoFCandidate
(1/3...)
-
๐๐ฟ๐ฒ๐๐ต ๐ฅ๐ฒ๐๐ถ๐ฒ๐ ๐๐ฎ๐ป๐ฑ๐ฒ๐ฑ ๐ค๐๐
This week, two committee members are independently recommending Daniel Kahneman's ๐๐๐๐ฃ๐ ๐๐ฃ๐, ๐๐๐จ๐ฉ ๐๐ฃ๐ ๐๐ก๐ค๐ฌ for the CyberCanon Hall of Fame.
๐ Be sure to check out their detailed reviews and why it's valuable for cyber pros -> https://cybercanon.org/thinking-fast-and-slow/
#CybersecurityBooks #Cyberpsychology #CyberCanonHoFCandidate
(1/3...)
-
๐๐ฟ๐ฒ๐๐ต ๐ฅ๐ฒ๐๐ถ๐ฒ๐ ๐๐ฎ๐ป๐ฑ๐ฒ๐ฑ ๐ค๐๐
This week, two committee members are independently recommending Daniel Kahneman's ๐๐๐๐ฃ๐ ๐๐ฃ๐, ๐๐๐จ๐ฉ ๐๐ฃ๐ ๐๐ก๐ค๐ฌ for the CyberCanon Hall of Fame.
๐ Be sure to check out their detailed reviews and why it's valuable for cyber pros -> https://cybercanon.org/thinking-fast-and-slow/
#CybersecurityBooks #Cyberpsychology #CyberCanonHoFCandidate
(1/3...)
-
๐Review Incoming...
This week, we dive into GRC. Andrew Chrostowski provides a Hall of Fame Rec for ๐๐๐ ๐พ๐ฎ๐๐๐ง๐จ๐๐๐ช๐ง๐๐ฉ๐ฎ ๐๐ช๐๐๐ ๐ฉ๐ค ๐๐ค๐ซ๐๐ง๐ฃ๐๐ฃ๐๐, ๐๐๐จ๐ , ๐๐ฃ๐ ๐พ๐ค๐ข๐ฅ๐ก๐๐๐ฃ๐๐ by Jason Edwards and Griffin Weaver.
Andrew's review ๐ https://cybercanon.org/the-cybersecurity-guide-to-governance-risk-and-compliance/
-
๐ ๐ง๐ผ๐ฑ๐ฎ๐ ๐ถ๐ป ๐๐๐ฏ๐ฒ๐ฟ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ถ๐๐๐ผ๐ฟ๐!
On November 2, 1988, the Morris Worm became the first major computer virus to spread across the Internet. What began as a graduate studentโs โexperimentโ quickly spiraled out of control, taking down much of the early Internet and costing millions in cleanup. It also gave rise to one of cybersecurityโs most important realizations: even well-intentioned code can cause catastrophic damage in a connected world.
To learn more, ๐๐๐ฃ๐๐ฎ ๐ฝ๐๐๐ง ๐๐ค๐๐จ ๐๐๐๐จ๐๐๐ฃ๐ by Scott Shapiro, a #CyberCanonHoFCandidate, covers the #MorrisWorm as one of its five infamous hacks. See our review โก๏ธ https://tinyurl.com/r2b3zc2u
๐ฅAnd as a bonus, many may not be aware that ๐๐๐ ๐พ๐ช๐๐ ๐ค๐ค'๐จ ๐๐๐ also contains an interesting perspective on the Morris Worm. A year after astronomer Cliff Stoll's spy tracking journey, he was one of many admins around the country who were investigating the Morris Worm live as it was spreading through the night. Cliff writes about this experience in the book's epilogue, where he discovers that the author of the worm was actually the son of NSA's Chief Scientist, Robert Morris, whom Cliff worked with in relation to his international hacker sleuthing a year earlier.
#CyberCanonHoF review โก๏ธ https://tinyurl.com/3rywf7zw
-
๐ ๐ง๐ผ๐ฑ๐ฎ๐ ๐ถ๐ป ๐๐๐ฏ๐ฒ๐ฟ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ถ๐๐๐ผ๐ฟ๐!
On November 2, 1988, the Morris Worm became the first major computer virus to spread across the Internet. What began as a graduate studentโs โexperimentโ quickly spiraled out of control, taking down much of the early Internet and costing millions in cleanup. It also gave rise to one of cybersecurityโs most important realizations: even well-intentioned code can cause catastrophic damage in a connected world.
To learn more, ๐๐๐ฃ๐๐ฎ ๐ฝ๐๐๐ง ๐๐ค๐๐จ ๐๐๐๐จ๐๐๐ฃ๐ by Scott Shapiro, a #CyberCanonHoFCandidate, covers the #MorrisWorm as one of its five infamous hacks. See our review โก๏ธ https://tinyurl.com/r2b3zc2u
๐ฅAnd as a bonus, many may not be aware that ๐๐๐ ๐พ๐ช๐๐ ๐ค๐ค'๐จ ๐๐๐ also contains an interesting perspective on the Morris Worm. A year after astronomer Cliff Stoll's spy tracking journey, he was one of many admins around the country who were investigating the Morris Worm live as it was spreading through the night. Cliff writes about this experience in the book's epilogue, where he discovers that the author of the worm was actually the son of NSA's Chief Scientist, Robert Morris, whom Cliff worked with in relation to his international hacker sleuthing a year earlier.
#CyberCanonHoF review โก๏ธ https://tinyurl.com/3rywf7zw
-
๐ ๐ง๐ผ๐ฑ๐ฎ๐ ๐ถ๐ป ๐๐๐ฏ๐ฒ๐ฟ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ถ๐๐๐ผ๐ฟ๐!
On November 2, 1988, the Morris Worm became the first major computer virus to spread across the Internet. What began as a graduate studentโs โexperimentโ quickly spiraled out of control, taking down much of the early Internet and costing millions in cleanup. It also gave rise to one of cybersecurityโs most important realizations: even well-intentioned code can cause catastrophic damage in a connected world.
To learn more, ๐๐๐ฃ๐๐ฎ ๐ฝ๐๐๐ง ๐๐ค๐๐จ ๐๐๐๐จ๐๐๐ฃ๐ by Scott Shapiro, a #CyberCanonHoFCandidate, covers the #MorrisWorm as one of its five infamous hacks. See our review โก๏ธ https://tinyurl.com/r2b3zc2u
๐ฅAnd as a bonus, many may not be aware that ๐๐๐ ๐พ๐ช๐๐ ๐ค๐ค'๐จ ๐๐๐ also contains an interesting perspective on the Morris Worm. A year after astronomer Cliff Stoll's spy tracking journey, he was one of many admins around the country who were investigating the Morris Worm live as it was spreading through the night. Cliff writes about this experience in the book's epilogue, where he discovers that the author of the worm was actually the son of NSA's Chief Scientist, Robert Morris, whom Cliff worked with in relation to his international hacker sleuthing a year earlier.
#CyberCanonHoF review โก๏ธ https://tinyurl.com/3rywf7zw
-
๐ ๐ง๐ผ๐ฑ๐ฎ๐ ๐ถ๐ป ๐๐๐ฏ๐ฒ๐ฟ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ถ๐๐๐ผ๐ฟ๐!
On November 2, 1988, the Morris Worm became the first major computer virus to spread across the Internet. What began as a graduate studentโs โexperimentโ quickly spiraled out of control, taking down much of the early Internet and costing millions in cleanup. It also gave rise to one of cybersecurityโs most important realizations: even well-intentioned code can cause catastrophic damage in a connected world.
To learn more, ๐๐๐ฃ๐๐ฎ ๐ฝ๐๐๐ง ๐๐ค๐๐จ ๐๐๐๐จ๐๐๐ฃ๐ by Scott Shapiro, a #CyberCanonHoFCandidate, covers the #MorrisWorm as one of its five infamous hacks. See our review โก๏ธ https://tinyurl.com/r2b3zc2u
๐ฅAnd as a bonus, many may not be aware that ๐๐๐ ๐พ๐ช๐๐ ๐ค๐ค'๐จ ๐๐๐ also contains an interesting perspective on the Morris Worm. A year after astronomer Cliff Stoll's spy tracking journey, he was one of many admins around the country who were investigating the Morris Worm live as it was spreading through the night. Cliff writes about this experience in the book's epilogue, where he discovers that the author of the worm was actually the son of NSA's Chief Scientist, Robert Morris, whom Cliff worked with in relation to his international hacker sleuthing a year earlier.
#CyberCanonHoF review โก๏ธ https://tinyurl.com/3rywf7zw
-
๐ ๐ง๐ผ๐ฑ๐ฎ๐ ๐ถ๐ป ๐๐๐ฏ๐ฒ๐ฟ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ถ๐๐๐ผ๐ฟ๐!
On November 2, 1988, the Morris Worm became the first major computer virus to spread across the Internet. What began as a graduate studentโs โexperimentโ quickly spiraled out of control, taking down much of the early Internet and costing millions in cleanup. It also gave rise to one of cybersecurityโs most important realizations: even well-intentioned code can cause catastrophic damage in a connected world.
To learn more, ๐๐๐ฃ๐๐ฎ ๐ฝ๐๐๐ง ๐๐ค๐๐จ ๐๐๐๐จ๐๐๐ฃ๐ by Scott Shapiro, a #CyberCanonHoFCandidate, covers the #MorrisWorm as one of its five infamous hacks. See our review โก๏ธ https://tinyurl.com/r2b3zc2u
๐ฅAnd as a bonus, many may not be aware that ๐๐๐ ๐พ๐ช๐๐ ๐ค๐ค'๐จ ๐๐๐ also contains an interesting perspective on the Morris Worm. A year after astronomer Cliff Stoll's spy tracking journey, he was one of many admins around the country who were investigating the Morris Worm live as it was spreading through the night. Cliff writes about this experience in the book's epilogue, where he discovers that the author of the worm was actually the son of NSA's Chief Scientist, Robert Morris, whom Cliff worked with in relation to his international hacker sleuthing a year earlier.
#CyberCanonHoF review โก๏ธ https://tinyurl.com/3rywf7zw
-
If your mission this October is to elevate awareness, not just compliance, here is a book worth putting in your teamโs hands...
๐๐ ๐๐ฉโ๐จ ๐๐ข๐๐ง๐ฉ, ๐๐ฉโ๐จ ๐๐ช๐ก๐ฃ๐๐ง๐๐๐ก๐ by @mikko became a candidate for our Hall of Fame by weaving technical insight with human stories, showing how every connected thing holds risk.
๐ https://tinyurl.com/y9ne2uzk
Why this matters during #CybersecurityAwarenessMonth:
1. In a hyperconnected world, vulnerability is the shadow companion of innovation.
2. Technology alone cannot defend. The human factor is equally critical.
3. Stories fuel understanding. A cautionary tale sticks longer than dry technical specs.#CyberCanonHoFCandidate #SecurityCulture #CybersecurityBooks
-
๐๐ฅ๐ฒ๐๐ถ๐ฒ๐ ๐๐ฎ๐ ๐ง๐๐ฒ๐๐ฑ๐ฎ๐!๐
Differential Privacy is an increasingly popular, though controversial, technique for protecting confidential data by carefully introducing statistical noise. Even if you are very familiar with #DP, you likely don't know quite as much as Dr. Simson Garfinkel ( @xchatty )
This week, Ben Rothke ( @benrothke ) provides a Hall of Fame recommendation in his review of Garfinkel's new book, ๐๐ช๐ง๐ง๐ฆ๐ณ๐ฆ๐ฏ๐ต๐ช๐ข๐ญ ๐๐ณ๐ช๐ท๐ข๐ค๐บ, from The MIT Press Essential Knowledge Series. ( @themitpress )
Review๐ https://tinyurl.com/2s3jk4cn
#CybersecurityBooks #CyberCanonHoFCandidate #DifferentialPrivacy #DataPrivacy
-
๐ฅ๐ ๐๐ผ๐ผ๐ธ ๐ฅ๐ฒ๐๐ถ๐ฒ๐ ๐๐ฎ๐!
This week, Stephanie Pirman provides a Hall of Fame recommendation for Matt Hand's ๐๐ซ๐๐๐๐ฃ๐ ๐๐ฟ๐: ๐๐๐ ๐ฟ๐๐๐๐ฃ๐๐ฉ๐๐ซ๐ ๐๐ช๐๐๐ ๐ฉ๐ค ๐ฟ๐๐๐๐๐ฉ๐๐ฃ๐ ๐๐ฃ๐๐ฅ๐ค๐๐ฃ๐ฉ ๐ฟ๐๐ฉ๐๐๐ฉ๐๐ค๐ฃ ๐๐ฎ๐จ๐ฉ๐๐ข๐จ from @nostarch.
Evading EDR provides "๐ข ๐ค๐ฐ๐ฎ๐ฑ๐ณ๐ฆ๐ฉ๐ฆ๐ฏ๐ด๐ช๐ท๐ฆ ๐ฐ๐ท๐ฆ๐ณ๐ท๐ช๐ฆ๐ธ ๐ฐ๐ง ๐๐๐๐ด ๐ง๐ณ๐ฐ๐ฎ ๐ต๐ฉ๐ณ๐ฆ๐ฆ ๐ค๐ฐ๐ณ๐ฆ ๐ฑ๐ฆ๐ณ๐ด๐ฑ๐ฆ๐ค๐ต๐ช๐ท๐ฆ๐ด: ๐ฉ๐ฐ๐ธ ๐๐๐ ๐ธ๐ฐ๐ณ๐ฌ๐ด, ๐ฉ๐ฐ๐ธ ๐ข๐ฏ ๐ข๐ต๐ต๐ข๐ค๐ฌ๐ฆ๐ณ ๐ค๐ข๐ฏ ๐ฆ๐ท๐ข๐ฅ๐ฆ ๐๐๐, ๐ข๐ฏ๐ฅ ๐ธ๐ฉ๐ข๐ต ๐ฅ๐ฆ๐ง๐ฆ๐ฏ๐ฅ๐ฆ๐ณ๐ด ๐ค๐ข๐ฏ ๐ฅ๐ฐ ๐ข๐ฃ๐ฐ๐ถ๐ต ๐ช๐ต. ๐๐๐ ๐ช๐ต๐ด๐ฆ๐ญ๐ง ๐ช๐ด ๐ฆ๐น๐ต๐ณ๐ฆ๐ฎ๐ฆ๐ญ๐บ ๐ต๐ฆ๐ค๐ฉ๐ฏ๐ช๐ค๐ข๐ญ; ๐ต๐ฉ๐ถ๐ด, ๐ต๐ฉ๐ช๐ด ๐ฃ๐ฐ๐ฐ๐ฌ ๐ช๐ด ๐ข๐ญ๐ด๐ฐ ๐ฆ๐น๐ต๐ณ๐ฆ๐ฎ๐ฆ๐ญ๐บ ๐ต๐ฆ๐ค๐ฉ๐ฏ๐ช๐ค๐ข๐ญ[...] ๐๐ฏ๐ฆ ๐ฐ๐ง ๐ต๐ฉ๐ฆ ๐ด๐ต๐ณ๐ฐ๐ฏ๐จ๐ฆ๐ด๐ต ๐ฑ๐ฐ๐ช๐ฏ๐ต๐ด ๐ฐ๐ง โ๐๐ท๐ข๐ฅ๐ช๐ฏ๐จ ๐๐๐โ ๐ช๐ด ๐ฉ๐ฐ๐ธ ๐๐ข๐ต๐ต ๐๐ข๐ฏ๐ฅ ๐ฅ๐ช๐ด๐ต๐ช๐ญ๐ญ๐ด ๐ต๐ฉ๐ฆ๐ด๐ฆ ๐ค๐ฐ๐ฎ๐ฑ๐ญ๐ฆ๐น ๐ต๐ฆ๐ค๐ฉ๐ฏ๐ช๐ค๐ข๐ญ ๐ต๐ฐ๐ฑ๐ช๐ค๐ด ๐ช๐ฏ๐ต๐ฐ ๐ฅ๐ช๐จ๐ฆ๐ด๐ต๐ช๐ฃ๐ญ๐ฆ ๐ฑ๐ณ๐ฐ๐ด๐ฆ."
Full review ๐https://tinyurl.com/2xrx9vtj
---
๐จ If Matt's book interests you, please consider purchasing here ๐ https://amzn.to/4m1vLpCFor the first time, the #CyberCanon has Amazon Affiliate links to purchase titles in the Canon library! Same cost to you, but a few ๐ต goes to the Canon to help keep us up and running. ๐
#CyberCanonHoFCandidate #Cybersecurity #CybersecurityBooks #EDR
-
๐จ๐ ๐๐'๐ ๐๐ผ๐ผ๐ธ ๐ฅ๐ฒ๐๐ถ๐ฒ๐ ๐๐ฎ๐! ๐๐จ
This week, Crystal Kobe provides a Hall of Fame recommendation for Perry Carpenter and Kai Roer 's ๐๐๐ ๐๐๐๐ช๐ง๐๐ฉ๐ฎ ๐พ๐ช๐ก๐ฉ๐ช๐ง๐ ๐๐ก๐๐ฎ๐๐ค๐ค๐ : ๐ผ๐ฃ ๐๐ญ๐๐๐ช๐ฉ๐๐ซ๐ ๐๐ช๐๐๐ ๐๐ค ๐๐๐๐ช๐๐๐ฃ๐ ๐๐๐จ๐ ๐๐ฃ๐ ๐ฟ๐๐ซ๐๐ก๐ค๐ฅ๐๐ฃ๐ ๐๐ค๐ช๐ง ๐๐ช๐ข๐๐ฃ ๐ฟ๐๐๐๐ฃ๐จ๐.
"As someone involved in human risk management and awareness training, I found the authorsโ central thesis, that resilient cybersecurity begins with culture, resonates deeply. They challenge the outdated notion of users as 'the weakest link' and reframe them as a powerful line of defense. Drawing on behavioral science, they show how consistent messaging, storytelling and social cues can shape secure behavior. Rather than seeing users as obstacles, they urge us to recognize them as people who need context, motivation and reinforcement in order to engage your organizationโs 'human layer defenses'.โ
Full review ๐ https://tinyurl.com/yzstbadx
#Cybersecurity #SecurityCulture #CybersecurityBooks #CyberCanonHoFCandidate
-
"If thereโs one book Iโve consistently recommended to those peering into the cybersecurity industry from the outside, itโs Jessica Barker's 'Confident Cyber Security.' I do so not just because it simplifies the complex but because it respects the readerโs intelligence while dismantling the harmful myths that gatekeep our field."
-- Kevin Magee, Cybersecurity Canon Review Committee MemberNew week, new book review to check out. And this one is getting a Hall of Fame nomination...
#CybersecurityBooks #SecuirtyAwareness #CyberCanon #CyberCanonHoFCandidate
-
"I experienced tremendous technical and cultural challenges during our implementation and only wish that we had a book like this to navigate us."
๐ฅIt's Tuesday-review-day here at the #CyberCanon.๐ฅ
A new review by committee member @iSandipD Dholakia has been added to the Canon library. This is one you may not have heard of, but you definitely should consider adding it to your bookshelves as Sandip is recommending it for the Hall of Fame!
"Cybersecurity Readiness: A Holistic and High-Performance Approach" by Dr. Dave Chatterjee, Ph.D. is a must-read book to combat modern-day cyber threats. The Duke Professor and podcast host has written a comprehensive guide to understanding and implementing effective cybersecurity measures to detect, protect and respond to cyberattacks in organizations. See the review link in the comments.
Check out the full review here: https://cybercanon.org/cybersecurity-readiness-a-holistic-and-high-performance-approach/