The Cybersecurity Canon is official, and you can see our website here. We modeled it after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have 20 books on the initial candidate list but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite – we’re actively soliciting your feedback!
The Cybersecurity Canon is a real thing for our community. We have designed it so that you can directly participate in the process. Please do so!
The members of our Cybersecurity Canon committee have been submitting reviews of Canon-worthy books throughout the past year. Here are just some of the titles that have entered the discussion since we began publishing reviews in November 2013:
- Where Wizards Stay Up Late: The Origins of The Internet (1996) by Katie Hafner
- Spam Nation: The Inside Story of Organized Cybercrime from Global Epidemic to Your Front Door (2014) by Brian Krebs
- The Practice of Network Security Monitoring: Understanding Incident Detection and Response (2013) by Richard Bejtlich
- Lexicon (2013) by Max Barry
- No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State (2014) by Glenn Greenwald (Part 1)
- No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State (2014) by Glenn Greenwald (Part 2)
- Secrets and Lies: Digital Security in a Networked World (2000) by Bruce Schneier
[Palo Alto Networks Blog]