#cybersecuritybooks โ Public Fediverse posts
Live and recent posts from across the Fediverse tagged #cybersecuritybooks, aggregated by home.social.
-
๐ค๐ป ๐ค
In this weekโs #CyberCanonReview, Jeff Thompson takes on ๐ผ๐๐๐ฃ๐ฉ๐จ ๐๐ฃ ๐ฉ๐๐ ๐๐ค๐ฃ๐ ๐๐๐ข๐ ๐ค๐ ๐ผ๐ by Marjorie McShane, Sergei Nirenburg, and Jesse English, a research team from Rensselaer Polytechnic Institute.
๐ https://tinyurl.com/2fduxxhm
๐ https://tinyurl.com/4f2v3rtd
#CybersecurityBooks #AISecurity(1/2...)
-
๐ช We've hooked another review ๐ช
This week, Aleksandra Scalco reviews ๐๐๐๐จ๐๐๐ฃ๐ ๐๐ค๐ง ๐ผ๐ฃ๐จ๐ฌ๐๐ง๐จ: ๐๐๐จ๐ ๐๐๐๐ฃ๐ฉ๐๐๐๐๐๐ฉ๐๐ค๐ฃ ๐๐ฃ๐ ๐๐๐ฉ๐๐๐๐ฉ๐๐ค๐ฃ ๐๐ฉ๐ง๐๐ฉ๐๐๐๐๐จ, an IET book authored by Terry Merz and Lawrence Shaw...
๐ https://cybercanon.org/phishing-for-answers-risk-identification-and-mitigation-strategies/
-
๐ช We've hooked another review ๐ช
This week, Aleksandra Scalco reviews ๐๐๐๐จ๐๐๐ฃ๐ ๐๐ค๐ง ๐ผ๐ฃ๐จ๐ฌ๐๐ง๐จ: ๐๐๐จ๐ ๐๐๐๐ฃ๐ฉ๐๐๐๐๐๐ฉ๐๐ค๐ฃ ๐๐ฃ๐ ๐๐๐ฉ๐๐๐๐ฉ๐๐ค๐ฃ ๐๐ฉ๐ง๐๐ฉ๐๐๐๐๐จ, an IET book authored by Terry Merz and Lawrence Shaw...
๐ https://cybercanon.org/phishing-for-answers-risk-identification-and-mitigation-strategies/
-
๐ช We've hooked another review ๐ช
This week, Aleksandra Scalco reviews ๐๐๐๐จ๐๐๐ฃ๐ ๐๐ค๐ง ๐ผ๐ฃ๐จ๐ฌ๐๐ง๐จ: ๐๐๐จ๐ ๐๐๐๐ฃ๐ฉ๐๐๐๐๐๐ฉ๐๐ค๐ฃ ๐๐ฃ๐ ๐๐๐ฉ๐๐๐๐ฉ๐๐ค๐ฃ ๐๐ฉ๐ง๐๐ฉ๐๐๐๐๐จ, an IET book authored by Terry Merz and Lawrence Shaw...
๐ https://cybercanon.org/phishing-for-answers-risk-identification-and-mitigation-strategies/
-
๐ช We've hooked another review ๐ช
This week, Aleksandra Scalco reviews ๐๐๐๐จ๐๐๐ฃ๐ ๐๐ค๐ง ๐ผ๐ฃ๐จ๐ฌ๐๐ง๐จ: ๐๐๐จ๐ ๐๐๐๐ฃ๐ฉ๐๐๐๐๐๐ฉ๐๐ค๐ฃ ๐๐ฃ๐ ๐๐๐ฉ๐๐๐๐ฉ๐๐ค๐ฃ ๐๐ฉ๐ง๐๐ฉ๐๐๐๐๐จ, an IET book authored by Terry Merz and Lawrence Shaw...
๐ https://cybercanon.org/phishing-for-answers-risk-identification-and-mitigation-strategies/
-
๐ช We've hooked another review ๐ช
This week, Aleksandra Scalco reviews ๐๐๐๐จ๐๐๐ฃ๐ ๐๐ค๐ง ๐ผ๐ฃ๐จ๐ฌ๐๐ง๐จ: ๐๐๐จ๐ ๐๐๐๐ฃ๐ฉ๐๐๐๐๐๐ฉ๐๐ค๐ฃ ๐๐ฃ๐ ๐๐๐ฉ๐๐๐๐ฉ๐๐ค๐ฃ ๐๐ฉ๐ง๐๐ฉ๐๐๐๐๐จ, an IET book authored by Terry Merz and Lawrence Shaw...
๐ https://cybercanon.org/phishing-for-answers-risk-identification-and-mitigation-strategies/
-
๐๏ธ ๐๐ฎ๐น๐น ๐ผ๐ณ ๐๐ฎ๐บ๐ฒ ๐ฅ๐ฒ๐ฐ๐ผ ๐๐ป๐ฐ๐ผ๐บ๐ถ๐ป๐ด!
Jack Freund, a man who knows a thing or two about cyber risk (author of the FAIR HoF book), provides a Hall of Fame nomination for ๐๐ฉ๐๐ฅ๐ฅ๐๐ฃ๐ ๐๐๐ง๐ค๐ช๐๐ ๐พ๐ฎ๐๐๐ง๐จ๐๐๐ช๐ง๐๐ฉ๐ฎ ๐๐๐จ๐ ๐๐๐ฃ๐๐๐๐ข๐๐ฃ๐ฉ by Jennifer Bayuk.
๐ Read Jack's thorough assessment: https://cybercanon.org/stepping-through-cybersecurity-risk-management-a-systems-thinking-approach/
#CybersecurityBooks #CyberCanonReview #CyberCanonHallofFameCandidate #CyberRisk
-
โ Review Day! โ
Thomas Laugle provides a "niche" recommendation for Dr. Rogayeh Tabrizi's ๐ฝ๐๐๐๐ซ๐๐ค๐ง๐๐ก ๐ผ๐: ๐๐ฃ๐ก๐๐๐จ๐ ๐ฟ๐๐๐๐จ๐๐ค๐ฃ ๐๐๐ ๐๐ฃ๐ ๐ฌ๐๐ฉ๐ ๐ฟ๐๐ฉ๐
โ๏ธ Read Thomas' thorough analysis: https://cybercanon.org/behavioral-ai-unleash-decision-making-with-data/
-
๐ข ๐๐ฎ๐๐ฒ๐๐ ๐ฟ๐ฒ๐๐ถ๐ฒ๐ ๐ต๐ฎ๐ ๐ฏ๐ฒ๐ฒ๐ป ๐ฑ๐ฟ๐ผ๐ฝ๐ฝ๐ฒ๐ฑ! ๐
This week, Jose Miguel Parrella evaluates an embedded security book, ๐๐ฃ๐๐๐ฃ๐๐๐ง๐๐ฃ๐ ๐๐๐๐ช๐ง๐ ๐ฟ๐๐ซ๐๐๐๐จ by Dominik Merli...
๐ Check out Jose's full review: https://cybercanon.org/engineering-secure-devices/
-
๐ก๏ธ ๐ง๐ผ๐ฑ๐ฎ๐'๐ ๐ฅ๐ฒ๐๐ถ๐ฒ๐! ๐งฑ
This week, our #CyberCanon Committee provides you with Debra Baker's ๐ผ ๐พ๐๐๐ ๐๐ช๐๐๐ ๐ฉ๐ค ๐พ๐ฎ๐๐๐ง ๐๐๐จ๐๐ก๐๐๐ฃ๐๐.
Read Jack Freund, Ph.D.'s assessment ๐ https://cybercanon.org/a-ciso-guide-to-cyber-resilience/
-
On November 24, 2014, Sony Pictures Entertainment experienced a landmark cyber-attack. A hacker group calling itself the โGuardians of Peaceโ unleashed destructive malware, wiped large portions of the studioโs network, and dumped terabytes of sensitive internal data.
๐พ๐ฎ๐๐๐ง ๐๐๐ง๐จ: ๐๐๐๐ ๐จ ๐๐๐๐ฉ ๐๐๐ค๐๐ ๐๐ ๐ฉ๐๐ ๐๐ค๐ง๐ก๐, by Charles Arthur, covers this pivotal event amongst other cyber attacks.
See our review ๐ https://cybercanon.org/cyber-wars-hacks-that-shocked-the-world
#CybersecurityHistory #SonyHack #CyberWar #CybersecurityBooks
-
A Canon Hall of Fame classic by Dr. Ross Anderson continues to prove its significance in modern security practices.
Our most recent #Newsletter covers an Infosecurity Magazine article that aligns with many points from two recent canon-reviewed books, as well as an old favorite, ๐๐ฆ๐ค๐ถ๐ณ๐ช๐ต๐บ ๐๐ฏ๐จ๐ช๐ฏ๐ฆ๐ฆ๐ณ๐ช๐ฏ๐จ.
While Ron Woernerโs Canon review was of the 2008 2nd edition, Dr. Anderson has since released a 3rd edition just a few years ago.
๐ฐ https://cybercanon.substack.com/p/november-newsletter-spotlight-on
๐๏ธ If interested in purchasing the latest edition and supporting the Canon, please consider using this affiliate link: https://amzn.to/47NiFa4
-
๐ ๐ง๐ผ๐ฑ๐ฎ๐ ๐ถ๐ป ๐๐๐ฏ๐ฒ๐ฟ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ถ๐๐๐ผ๐ฟ๐!
On November 2, 1988, the Morris Worm became the first major computer virus to spread across the Internet. What began as a graduate studentโs โexperimentโ quickly spiraled out of control, taking down much of the early Internet and costing millions in cleanup. It also gave rise to one of cybersecurityโs most important realizations: even well-intentioned code can cause catastrophic damage in a connected world.
To learn more, ๐๐๐ฃ๐๐ฎ ๐ฝ๐๐๐ง ๐๐ค๐๐จ ๐๐๐๐จ๐๐๐ฃ๐ by Scott Shapiro, a #CyberCanonHoFCandidate, covers the #MorrisWorm as one of its five infamous hacks. See our review โก๏ธ https://tinyurl.com/r2b3zc2u
๐ฅAnd as a bonus, many may not be aware that ๐๐๐ ๐พ๐ช๐๐ ๐ค๐ค'๐จ ๐๐๐ also contains an interesting perspective on the Morris Worm. A year after astronomer Cliff Stoll's spy tracking journey, he was one of many admins around the country who were investigating the Morris Worm live as it was spreading through the night. Cliff writes about this experience in the book's epilogue, where he discovers that the author of the worm was actually the son of NSA's Chief Scientist, Robert Morris, whom Cliff worked with in relation to his international hacker sleuthing a year earlier.
#CyberCanonHoF review โก๏ธ https://tinyurl.com/3rywf7zw
-
๐๐ฅ๐ฒ๐๐ถ๐ฒ๐ ๐๐ฎ๐ ๐ง๐๐ฒ๐๐ฑ๐ฎ๐!๐
Differential Privacy is an increasingly popular, though controversial, technique for protecting confidential data by carefully introducing statistical noise. Even if you are very familiar with #DP, you likely don't know quite as much as Dr. Simson Garfinkel ( @xchatty )
This week, Ben Rothke ( @benrothke ) provides a Hall of Fame recommendation in his review of Garfinkel's new book, ๐๐ช๐ง๐ง๐ฆ๐ณ๐ฆ๐ฏ๐ต๐ช๐ข๐ญ ๐๐ณ๐ช๐ท๐ข๐ค๐บ, from The MIT Press Essential Knowledge Series. ( @themitpress )
Review๐ https://tinyurl.com/2s3jk4cn
#CybersecurityBooks #CyberCanonHoFCandidate #DifferentialPrivacy #DataPrivacy
-
๐ ๐ก๐ฒ๐ ๐๐ผ๐ผ๐ธ ๐ฅ๐ฒ๐๐ถ๐ฒ๐(๐)! ๐
This week, not 1, but 2๏ธโฃ #CyberCanon Committee Members review ๐๐๐ ๐พ๐ค๐ข๐๐ฃ๐ ๐๐๐ซ๐ by Mustafa Suleyman with Michael Bhaskar.
This book is widely known, but to what extent does it offer meaningful value to cybersecurity professionals? ๐ค
This is exactly what Jessica Buerger and Susan Hansche help determine in their insightful reviews ๐ https://tinyurl.com/49x3aetp
๐ If our efforts assist in your decision to purchase, please use our affiliate link to support the Canon ๐ https://amzn.to/45SrpL9
-
At #DEFCON, we spent time talking with Kurtis Minder and Jon DiMaggio, industry leaders in cyber threat intelligence. Both are authors of books on the Canon's list to review. We came away quite impressed, especially by their immense passion for fighting cyber crime.
Jon also led a boisterous session with John Fokker in front of a packed crowd of hundreds just moments after Jon released Volume 7 of Analyst1's Ransomware Diaries. Definitely a highlight of the week!
Read more about this story and others from #HackerSummerCamp in our August Newsletter ๐ https://tinyurl.com/canon-aug25-nl
-
Our August Newsletter ๐๏ธ is now live featuring #CyberCanon Hall of Fame winners, candidates, and cyber author-focused recaps from #BlackHat and #defcon.
Definitely worth taking a peek ๐ https://tinyurl.com/canon-aug25-nl
-
Kim Zetter's (@kimzetter) 2014 book ๐๐ฐ๐ถ๐ฏ๐ต๐ฅ๐ฐ๐ธ๐ฏ ๐ต๐ฐ ๐ก๐ฆ๐ณ๐ฐ ๐๐ข๐บ was one of the first inducted into the Cybersecurity Canon Hall of Fame ๐. The book unpacks the story of #Stuxnet and was a first of its kind to turn a real-world cyber espionage operation ๐ตโโ๏ธ into a gripping thriller of a book.
Last week, Kim joined #CyberCanon President Rick Howard at the ๐๐ฆ๐ฅ๐ฏ๐ฆ๐ด๐ฅ๐ข๐บ ๐๐ฆ๐ฆ ๐๐ณ๐ข๐ฎ gathering for a candid discussion and Q&A with an eager group of about 40 cybersecurity leaders.
This event was coordinated before the recent Operation Midnight Hammer attack, which made the timing for this Stuxnet conversation impeccable. Many members attributed this to the uncanny foresight of Wee Dram host J. Carlos Vega, CISSP. ๐
Book review ๐ https://tinyurl.com/mubj2z4n
#CyberCanonHoF #Cybersecurity #CybersecurityBooks #CyberEspionage