//
archives

Cybersecurity Canon

This category contains 53 posts

The Cybersecurity Canon: How to Measure Anything in Cybersecurity Risk


We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  The Cybersecurity Canon … Continue reading

The Cybersecurity Canon: Rise of the Machines: A Cybernetics History


We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  The … Continue reading

Rejoice! Eight New Books Inducted into the Cybersecurity Canon


I am very excited today to announce the 2016 inductees into the Cybersecurity Canon: our hall of fame for cybersecurity books. 2016 March Madness Winner & Cybersecurity Canon Inductee “Zero Day” by Mark Russinovich 2016 Inductees selected by the Cybersecurity Canon Committee “@War” by Shane Harris “The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes” by Dawn … Continue reading

The Cybersecurity Canon: Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization


We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  … Continue reading

The Cybersecurity Canon: Dragnet Nation


We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  The … Continue reading

The Cybersecurity Canon: Cyberdeterrence and Cyberwar


We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  The … Continue reading

The Cybersecurity Canon: CRACK99: The Takedown of a $100 Million Chinese Software Pirate


We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  The … Continue reading

The Cybersecurity Canon: Information Warfare: Chaos on the Electronic Superhighway


We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  … Continue reading

The Cybersecurity Canon: Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath


We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  … Continue reading

The Cybersecurity Canon: Metasploit: The Penetration Tester’s Guide


We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  … Continue reading

Web Stats

  • 104,546 hits
@PhilipHungCao

@PhilipHungCao

@PhilipHungCao, SACS, CISM, CASP, CCSP, CCSK, CIW-WSP, PCNSE7, ACSP, CCDA, DCSE, JNCIA, MCTS, MCSA, VCP5-DCV, VCP6-NV, ZCNT is a #TekF@rmer. He has 16 years experience in ICT industry in various sectors & positions.

Personal Links

View Full Profile →

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 1,614 other followers

Twitter Updates

Archives

February 2017
M T W T F S S
« Jan    
 12345
6789101112
13141516171819
20212223242526
2728