Cybersecurity Canon Review: “Exponential Organizations”


We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  The Cybersecurity Canon [...]

The Cybersecurity Canon – CISO: Desk Reference Guide; A Practical Guide for CISOs Volume 2


We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  The Cybersecurity Canon [...]

The Cybersecurity Canon – American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road


We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  The Cybersecurity Canon [...]

The Cybersecurity Canon: The Seventh Sense: Power, Fortune, and Survival in the Age of Networks


We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  The Cybersecurity Canon [...]

The Cybersecurity Canon: How to Measure Anything in Cybersecurity Risk


We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  The Cybersecurity Canon [...]

The Cybersecurity Canon: Rise of the Machines: A Cybernetics History


We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  The [...]

Rejoice! Eight New Books Inducted into the Cybersecurity Canon


I am very excited today to announce the 2016 inductees into the Cybersecurity Canon: our hall of fame for cybersecurity books. 2016 March Madness Winner & Cybersecurity Canon Inductee “Zero Day” by Mark Russinovich 2016 Inductees selected by the Cybersecurity Canon Committee “@War” by Shane Harris “The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes” by Dawn [...]