The Cybersecurity Canon: Rise of the Machines: A Cybernetics History

The Cybersecurity Canon: Rise of the Machines: A Cybernetics History

We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  The [...]

Rejoice! Eight New Books Inducted into the Cybersecurity Canon

Rejoice! Eight New Books Inducted into the Cybersecurity Canon

I am very excited today to announce the 2016 inductees into the Cybersecurity Canon: our hall of fame for cybersecurity books. 2016 March Madness Winner & Cybersecurity Canon Inductee “Zero Day” by Mark Russinovich 2016 Inductees selected by the Cybersecurity Canon Committee “@War” by Shane Harris “The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes” by Dawn [...]

The Cybersecurity Canon: Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization

The Cybersecurity Canon: Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization

We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  [...]

The Cybersecurity Canon: Dragnet Nation

The Cybersecurity Canon: Dragnet Nation

We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  The [...]

The Cybersecurity Canon: Cyberdeterrence and Cyberwar

The Cybersecurity Canon: Cyberdeterrence and Cyberwar

We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  The [...]