home.social

#cybersecuritybooks โ€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #cybersecuritybooks, aggregated by home.social.

  1. ๐Ÿค๐Ÿป ๐Ÿค–
    In this weekโ€™s #CyberCanonReview, Jeff Thompson takes on ๐˜ผ๐™œ๐™š๐™ฃ๐™ฉ๐™จ ๐™ž๐™ฃ ๐™ฉ๐™๐™š ๐™‡๐™ค๐™ฃ๐™œ ๐™‚๐™–๐™ข๐™š ๐™ค๐™› ๐˜ผ๐™„ by Marjorie McShane, Sergei Nirenburg, and Jesse English, a research team from Rensselaer Polytechnic Institute.

    ๐Ÿ“ tinyurl.com/2fduxxhm

    ๐Ÿ›’ tinyurl.com/4f2v3rtd

    #CybersecurityBooks #AISecurity

    (1/2...)

  2. ๐Ÿช We've hooked another review ๐Ÿช

    This week, Aleksandra Scalco reviews ๐™‹๐™๐™ž๐™จ๐™๐™ž๐™ฃ๐™œ ๐™›๐™ค๐™ง ๐˜ผ๐™ฃ๐™จ๐™ฌ๐™š๐™ง๐™จ: ๐™๐™ž๐™จ๐™  ๐™„๐™™๐™š๐™ฃ๐™ฉ๐™ž๐™›๐™ž๐™˜๐™–๐™ฉ๐™ž๐™ค๐™ฃ ๐™–๐™ฃ๐™™ ๐™ˆ๐™ž๐™ฉ๐™ž๐™œ๐™–๐™ฉ๐™ž๐™ค๐™ฃ ๐™Ž๐™ฉ๐™ง๐™–๐™ฉ๐™š๐™œ๐™ž๐™š๐™จ, an IET book authored by Terry Merz and Lawrence Shaw...

    ๐Ÿ“ cybercanon.org/phishing-for-an

    #CybersecurityBooks #SecurityAwareness #Risk

  3. ๐Ÿช We've hooked another review ๐Ÿช

    This week, Aleksandra Scalco reviews ๐™‹๐™๐™ž๐™จ๐™๐™ž๐™ฃ๐™œ ๐™›๐™ค๐™ง ๐˜ผ๐™ฃ๐™จ๐™ฌ๐™š๐™ง๐™จ: ๐™๐™ž๐™จ๐™  ๐™„๐™™๐™š๐™ฃ๐™ฉ๐™ž๐™›๐™ž๐™˜๐™–๐™ฉ๐™ž๐™ค๐™ฃ ๐™–๐™ฃ๐™™ ๐™ˆ๐™ž๐™ฉ๐™ž๐™œ๐™–๐™ฉ๐™ž๐™ค๐™ฃ ๐™Ž๐™ฉ๐™ง๐™–๐™ฉ๐™š๐™œ๐™ž๐™š๐™จ, an IET book authored by Terry Merz and Lawrence Shaw...

    ๐Ÿ“ cybercanon.org/phishing-for-an

    #CybersecurityBooks #SecurityAwareness #Risk

  4. ๐Ÿช We've hooked another review ๐Ÿช

    This week, Aleksandra Scalco reviews ๐™‹๐™๐™ž๐™จ๐™๐™ž๐™ฃ๐™œ ๐™›๐™ค๐™ง ๐˜ผ๐™ฃ๐™จ๐™ฌ๐™š๐™ง๐™จ: ๐™๐™ž๐™จ๐™  ๐™„๐™™๐™š๐™ฃ๐™ฉ๐™ž๐™›๐™ž๐™˜๐™–๐™ฉ๐™ž๐™ค๐™ฃ ๐™–๐™ฃ๐™™ ๐™ˆ๐™ž๐™ฉ๐™ž๐™œ๐™–๐™ฉ๐™ž๐™ค๐™ฃ ๐™Ž๐™ฉ๐™ง๐™–๐™ฉ๐™š๐™œ๐™ž๐™š๐™จ, an IET book authored by Terry Merz and Lawrence Shaw...

    ๐Ÿ“ cybercanon.org/phishing-for-an

    #CybersecurityBooks #SecurityAwareness #Risk

  5. ๐Ÿช We've hooked another review ๐Ÿช

    This week, Aleksandra Scalco reviews ๐™‹๐™๐™ž๐™จ๐™๐™ž๐™ฃ๐™œ ๐™›๐™ค๐™ง ๐˜ผ๐™ฃ๐™จ๐™ฌ๐™š๐™ง๐™จ: ๐™๐™ž๐™จ๐™  ๐™„๐™™๐™š๐™ฃ๐™ฉ๐™ž๐™›๐™ž๐™˜๐™–๐™ฉ๐™ž๐™ค๐™ฃ ๐™–๐™ฃ๐™™ ๐™ˆ๐™ž๐™ฉ๐™ž๐™œ๐™–๐™ฉ๐™ž๐™ค๐™ฃ ๐™Ž๐™ฉ๐™ง๐™–๐™ฉ๐™š๐™œ๐™ž๐™š๐™จ, an IET book authored by Terry Merz and Lawrence Shaw...

    ๐Ÿ“ cybercanon.org/phishing-for-an

    #CybersecurityBooks #SecurityAwareness #Risk

  6. ๐Ÿช We've hooked another review ๐Ÿช

    This week, Aleksandra Scalco reviews ๐™‹๐™๐™ž๐™จ๐™๐™ž๐™ฃ๐™œ ๐™›๐™ค๐™ง ๐˜ผ๐™ฃ๐™จ๐™ฌ๐™š๐™ง๐™จ: ๐™๐™ž๐™จ๐™  ๐™„๐™™๐™š๐™ฃ๐™ฉ๐™ž๐™›๐™ž๐™˜๐™–๐™ฉ๐™ž๐™ค๐™ฃ ๐™–๐™ฃ๐™™ ๐™ˆ๐™ž๐™ฉ๐™ž๐™œ๐™–๐™ฉ๐™ž๐™ค๐™ฃ ๐™Ž๐™ฉ๐™ง๐™–๐™ฉ๐™š๐™œ๐™ž๐™š๐™จ, an IET book authored by Terry Merz and Lawrence Shaw...

    ๐Ÿ“ cybercanon.org/phishing-for-an

    #CybersecurityBooks #SecurityAwareness #Risk

  7. ๐Ÿ›๏ธ ๐—›๐—ฎ๐—น๐—น ๐—ผ๐—ณ ๐—™๐—ฎ๐—บ๐—ฒ ๐—ฅ๐—ฒ๐—ฐ๐—ผ ๐—œ๐—ป๐—ฐ๐—ผ๐—บ๐—ถ๐—ป๐—ด!

    Jack Freund, a man who knows a thing or two about cyber risk (author of the FAIR HoF book), provides a Hall of Fame nomination for ๐™Ž๐™ฉ๐™š๐™ฅ๐™ฅ๐™ž๐™ฃ๐™œ ๐™๐™๐™ง๐™ค๐™ช๐™œ๐™ ๐˜พ๐™ฎ๐™—๐™š๐™ง๐™จ๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐™๐™ž๐™จ๐™  ๐™ˆ๐™–๐™ฃ๐™–๐™œ๐™š๐™ข๐™š๐™ฃ๐™ฉ by Jennifer Bayuk.

    ๐Ÿ“ Read Jack's thorough assessment: cybercanon.org/stepping-throug

    #CybersecurityBooks #CyberCanonReview #CyberCanonHallofFameCandidate #CyberRisk

  8. โš› Review Day! โš›

    Thomas Laugle provides a "niche" recommendation for Dr. Rogayeh Tabrizi's ๐˜ฝ๐™š๐™๐™–๐™ซ๐™ž๐™ค๐™ง๐™–๐™ก ๐˜ผ๐™„: ๐™๐™ฃ๐™ก๐™š๐™–๐™จ๐™ ๐˜ฟ๐™š๐™˜๐™ž๐™จ๐™ž๐™ค๐™ฃ ๐™ˆ๐™–๐™ ๐™ž๐™ฃ๐™œ ๐™ฌ๐™ž๐™ฉ๐™ ๐˜ฟ๐™–๐™ฉ๐™–

    โœ๏ธ Read Thomas' thorough analysis: cybercanon.org/behavioral-ai-u

    #CybersecurityBooks #AISecurity #GRC #SecurityAwareness

  9. ๐Ÿข ๐—Ÿ๐—ฎ๐˜๐—ฒ๐˜€๐˜ ๐—ฟ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐—ต๐—ฎ๐˜€ ๐—ฏ๐—ฒ๐—ฒ๐—ป ๐—ฑ๐—ฟ๐—ผ๐—ฝ๐—ฝ๐—ฒ๐—ฑ! ๐Ÿ‘‡

    This week, Jose Miguel Parrella evaluates an embedded security book, ๐™€๐™ฃ๐™œ๐™ž๐™ฃ๐™š๐™š๐™ง๐™ž๐™ฃ๐™œ ๐™Ž๐™š๐™˜๐™ช๐™ง๐™š ๐˜ฟ๐™š๐™ซ๐™ž๐™˜๐™š๐™จ by Dominik Merli...

    ๐Ÿ“ Check out Jose's full review: cybercanon.org/engineering-sec

    #CybersecurityBooks #EmbeddedSecurity | @jmp

  10. ๐Ÿ›ก๏ธ ๐—ง๐—ผ๐—ฑ๐—ฎ๐˜†'๐˜€ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„! ๐Ÿงฑ

    This week, our #CyberCanon Committee provides you with Debra Baker's ๐˜ผ ๐˜พ๐™„๐™Ž๐™Š ๐™‚๐™ช๐™ž๐™™๐™š ๐™ฉ๐™ค ๐˜พ๐™ฎ๐™—๐™š๐™ง ๐™๐™š๐™จ๐™ž๐™ก๐™ž๐™š๐™ฃ๐™˜๐™š.

    Read Jack Freund, Ph.D.'s assessment ๐Ÿ‘‰ cybercanon.org/a-ciso-guide-to

    #CybersecurityBooks #CISO #CyberResilience

  11. On November 24, 2014, Sony Pictures Entertainment experienced a landmark cyber-attack. A hacker group calling itself the โ€œGuardians of Peaceโ€ unleashed destructive malware, wiped large portions of the studioโ€™s network, and dumped terabytes of sensitive internal data.

    ๐˜พ๐™ฎ๐™—๐™š๐™ง ๐™’๐™–๐™ง๐™จ: ๐™ƒ๐™–๐™˜๐™ ๐™จ ๐™๐™๐™–๐™ฉ ๐™Ž๐™๐™ค๐™˜๐™ ๐™š๐™™ ๐™ฉ๐™๐™š ๐™’๐™ค๐™ง๐™ก๐™™, by Charles Arthur, covers this pivotal event amongst other cyber attacks.

    See our review ๐Ÿ‘‰ cybercanon.org/cyber-wars-hack

    #CybersecurityHistory #SonyHack #CyberWar #CybersecurityBooks

  12. A Canon Hall of Fame classic by Dr. Ross Anderson continues to prove its significance in modern security practices.

    Our most recent #Newsletter covers an Infosecurity Magazine article that aligns with many points from two recent canon-reviewed books, as well as an old favorite, ๐˜š๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜Œ๐˜ฏ๐˜จ๐˜ช๐˜ฏ๐˜ฆ๐˜ฆ๐˜ณ๐˜ช๐˜ฏ๐˜จ.

    While Ron Woernerโ€™s Canon review was of the 2008 2nd edition, Dr. Anderson has since released a 3rd edition just a few years ago.

    ๐Ÿ“ฐ cybercanon.substack.com/p/nove

    ๐Ÿ›๏ธ If interested in purchasing the latest edition and supporting the Canon, please consider using this affiliate link: amzn.to/47NiFa4

    #CybersecurityBooks #SecurityEngineering

  13. ๐Ÿ“…๐—ง๐—ผ๐—ฑ๐—ฎ๐˜† ๐—ถ๐—ป ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—›๐—ถ๐˜€๐˜๐—ผ๐—ฟ๐˜†!

    On November 2, 1988, the Morris Worm became the first major computer virus to spread across the Internet. What began as a graduate studentโ€™s โ€œexperimentโ€ quickly spiraled out of control, taking down much of the early Internet and costing millions in cleanup. It also gave rise to one of cybersecurityโ€™s most important realizations: even well-intentioned code can cause catastrophic damage in a connected world.

    To learn more, ๐™๐™–๐™ฃ๐™˜๐™ฎ ๐˜ฝ๐™š๐™–๐™ง ๐™‚๐™ค๐™š๐™จ ๐™‹๐™๐™ž๐™จ๐™๐™ž๐™ฃ๐™œ by Scott Shapiro, a #CyberCanonHoFCandidate, covers the #MorrisWorm as one of its five infamous hacks. See our review โžก๏ธ tinyurl.com/r2b3zc2u

    ๐Ÿ’ฅAnd as a bonus, many may not be aware that ๐™๐™๐™š ๐˜พ๐™ช๐™˜๐™ ๐™ค๐™ค'๐™จ ๐™€๐™œ๐™œ also contains an interesting perspective on the Morris Worm. A year after astronomer Cliff Stoll's spy tracking journey, he was one of many admins around the country who were investigating the Morris Worm live as it was spreading through the night. Cliff writes about this experience in the book's epilogue, where he discovers that the author of the worm was actually the son of NSA's Chief Scientist, Robert Morris, whom Cliff worked with in relation to his international hacker sleuthing a year earlier.

    #CyberCanonHoF review โžก๏ธ tinyurl.com/3rywf7zw

    #CyberCanon #CybersecurityHistory #CybersecurityBooks

  14. ๐Ÿ”๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฎ๐˜† ๐—ง๐˜‚๐—ฒ๐˜€๐—ฑ๐—ฎ๐˜†!๐Ÿ“–

    Differential Privacy is an increasingly popular, though controversial, technique for protecting confidential data by carefully introducing statistical noise. Even if you are very familiar with #DP, you likely don't know quite as much as Dr. Simson Garfinkel ( @xchatty )

    This week, Ben Rothke ( @benrothke ) provides a Hall of Fame recommendation in his review of Garfinkel's new book, ๐˜‹๐˜ช๐˜ง๐˜ง๐˜ฆ๐˜ณ๐˜ฆ๐˜ฏ๐˜ต๐˜ช๐˜ข๐˜ญ ๐˜—๐˜ณ๐˜ช๐˜ท๐˜ข๐˜ค๐˜บ, from The MIT Press Essential Knowledge Series. ( @themitpress )

    Review๐Ÿ‘‰ tinyurl.com/2s3jk4cn

    #CybersecurityBooks #CyberCanonHoFCandidate #DifferentialPrivacy #DataPrivacy

  15. ๐ŸŒŠ ๐—ก๐—ฒ๐˜„ ๐—•๐—ผ๐—ผ๐—ธ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„(๐˜€)! ๐ŸŒŠ

    This week, not 1, but 2๏ธโƒฃ #CyberCanon Committee Members review ๐™๐™๐™š ๐˜พ๐™ค๐™ข๐™ž๐™ฃ๐™œ ๐™’๐™–๐™ซ๐™š by Mustafa Suleyman with Michael Bhaskar.

    This book is widely known, but to what extent does it offer meaningful value to cybersecurity professionals? ๐Ÿค”

    This is exactly what Jessica Buerger and Susan Hansche help determine in their insightful reviews ๐Ÿ‘‰ tinyurl.com/49x3aetp

    ๐Ÿ›’ If our efforts assist in your decision to purchase, please use our affiliate link to support the Canon ๐Ÿ‘‰ amzn.to/45SrpL9

    #CybersecurityBooks #AICybersecurity #AI #QuantumComputing

  16. At #DEFCON, we spent time talking with Kurtis Minder and Jon DiMaggio, industry leaders in cyber threat intelligence. Both are authors of books on the Canon's list to review. We came away quite impressed, especially by their immense passion for fighting cyber crime.

    Jon also led a boisterous session with John Fokker in front of a packed crowd of hundreds just moments after Jon released Volume 7 of Analyst1's Ransomware Diaries. Definitely a highlight of the week!

    Read more about this story and others from #HackerSummerCamp in our August Newsletter ๐Ÿ‘‰ tinyurl.com/canon-aug25-nl

    #CyberCanon #CybersecurityBooks #CTI #Ransomware #REvil

  17. Our August Newsletter ๐Ÿ—ž๏ธ is now live featuring #CyberCanon Hall of Fame winners, candidates, and cyber author-focused recaps from #BlackHat and #defcon.

    Definitely worth taking a peek ๐Ÿ‘‰ tinyurl.com/canon-aug25-nl

    #CyberSecurityBooks #CyberCanonHoF #HackerSummerCamp #BHUSA

  18. Kim Zetter's (@kimzetter) 2014 book ๐˜Š๐˜ฐ๐˜ถ๐˜ฏ๐˜ต๐˜ฅ๐˜ฐ๐˜ธ๐˜ฏ ๐˜ต๐˜ฐ ๐˜ก๐˜ฆ๐˜ณ๐˜ฐ ๐˜‹๐˜ข๐˜บ was one of the first inducted into the Cybersecurity Canon Hall of Fame ๐Ÿ†. The book unpacks the story of #Stuxnet and was a first of its kind to turn a real-world cyber espionage operation ๐Ÿ•ตโ€โ™€๏ธ into a gripping thriller of a book.

    Last week, Kim joined #CyberCanon President Rick Howard at the ๐˜ž๐˜ฆ๐˜ฅ๐˜ฏ๐˜ฆ๐˜ด๐˜ฅ๐˜ข๐˜บ ๐˜ž๐˜ฆ๐˜ฆ ๐˜‹๐˜ณ๐˜ข๐˜ฎ gathering for a candid discussion and Q&A with an eager group of about 40 cybersecurity leaders.

    This event was coordinated before the recent Operation Midnight Hammer attack, which made the timing for this Stuxnet conversation impeccable. Many members attributed this to the uncanny foresight of Wee Dram host J. Carlos Vega, CISSP. ๐Ÿ˜„

    Book review ๐Ÿ‘‰ tinyurl.com/mubj2z4n

    #CyberCanonHoF #Cybersecurity #CybersecurityBooks #CyberEspionage