CyberCanon
banner
cybercanon.org
CyberCanon
@cybercanon.org
We vet #Cybersecurity books. Our reviews are written by real life experts, heroes, and hackers who led through the biggest exploits.

www.cybercanon.org

Also known as the Cybersecurity Canon Project
Founded: 2013
At our Committee Review Meeting, Dr. Georgianna (George) Shea and Adrian Sanabria led discussions of 2 HoF candidates.

🏭 George discussed 𝘾𝙤𝙪𝙣𝙩𝙚𝙧𝙞𝙣𝙜 𝘾𝙮𝙗𝙚𝙧 𝙎𝙖𝙗𝙤𝙩𝙖𝙜𝙚 by Andrew Bochman and Sarah Freeman 👉 tinyurl.com/4pdbrufk

🏗️ Adrian shared Ross Haleliuk's 𝘾𝙮𝙗𝙚𝙧 𝙛𝙤𝙧 𝘽𝙪𝙞𝙡𝙙𝙚𝙧𝙨 👉 tinyurl.com/2envxjx9
November 20, 2025 at 6:36 PM
🔏𝗡𝗲𝘄 𝗥𝗲𝘃𝗶𝗲𝘄 𝗗𝗿𝗼𝗽 📖

Jeny Teheran discusses why Dr. Susan Landau’s 𝙇𝙞𝙨𝙩𝙚𝙣𝙞𝙣𝙜 𝙄𝙣 is a must-read exploration of privacy, encryption, and the ongoing struggle over government access to secure systems, recommending it for the CyberCanon Hall of Fame.

📝Review: cybercanon.org/listening-in...

(1/2..)
November 19, 2025 at 1:23 PM
Reposted by CyberCanon
A Canon Hall of Fame classic, 𝘚𝘦𝘤𝘶𝘳𝘪𝘵𝘺 𝘌𝘯𝘨𝘪𝘯𝘦𝘦𝘳𝘪𝘯𝘨, by Dr. Ross Anderson continues to prove its significance in modern security practices.

Our most recent #Newsletter covers an Infosecurity Magazine article that aligns with the book’s theme.

📰: cybercanon.substack.com/p/november-n...
November 15, 2025 at 12:15 AM
A Canon Hall of Fame classic, 𝘚𝘦𝘤𝘶𝘳𝘪𝘵𝘺 𝘌𝘯𝘨𝘪𝘯𝘦𝘦𝘳𝘪𝘯𝘨, by Dr. Ross Anderson continues to prove its significance in modern security practices.

Our most recent #Newsletter covers an Infosecurity Magazine article that aligns with the book’s theme.

📰: cybercanon.substack.com/p/november-n...
November 15, 2025 at 12:15 AM
🚨𝗗𝗲𝗰𝗿𝘆𝗽𝘁𝗶𝗻𝗴 𝗮 𝗻𝗲𝘄 𝗿𝗲𝗮𝗱...

“𝘋𝘳. 𝘑𝘦𝘢𝘯-𝘗𝘩𝘪𝘭𝘪𝘱𝘱𝘦 𝘈𝘶𝘮𝘢𝘴𝘴𝘰𝘯 𝘪𝘴 𝘵𝘩𝘦 𝘚𝘵𝘦𝘷𝘦𝘯 𝘚𝘱𝘪𝘦𝘭𝘣𝘦𝘳𝘨 𝘰𝘧 𝘤𝘳𝘺𝘱𝘵𝘰𝘨𝘳𝘢𝘱𝘩𝘺. 𝘑𝘗 𝘬𝘯𝘰𝘸𝘴 𝘩𝘰𝘸 𝘵𝘰 𝘵𝘦𝘭𝘭 𝘢 𝘴𝘵𝘰𝘳𝘺.”

- Sandip Dholakia, in his review of @aumasson.jp's 𝗖𝗿𝘆𝗽𝘁𝗼 𝗗𝗶𝗰𝘁𝗶𝗼𝗻𝗮𝗿𝘆, recommending it for the Canon Hall of Fame.

📝 Read the review: cybercanon.org/crypto-dicti...
November 11, 2025 at 2:30 PM
🗓️𝗢𝗰𝘁𝗼𝗯𝗲𝗿 𝗕𝗼𝗼𝗸 𝗥𝗲𝘃𝗶𝗲𝘄 𝗥𝗲𝗰𝗮𝗽!📚

In case you missed any...

🧑‍💼 𝙏𝙝𝙚 𝙏𝙧𝙖𝙣𝙨𝙛𝙤𝙧𝙢𝙖𝙩𝙞𝙤𝙣𝙖𝙡 𝙇𝙚𝙖𝙙𝙚𝙧: tinyurl.com/94z7ujsu

🔏 𝘿𝙞𝙛𝙛𝙚𝙧𝙚𝙣𝙩𝙞𝙖𝙡 𝙋𝙧𝙞𝙫𝙖𝙘𝙮: tinyurl.com/2s3jk4cn

🤖 𝘼𝙄-𝘿𝙧𝙞𝙫𝙚𝙣 𝘾𝙮𝙗𝙚𝙧𝙨𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙖𝙣𝙙 𝙏𝙝𝙧𝙚𝙖𝙩 𝙄𝙣𝙩𝙚𝙡𝙡𝙞𝙜𝙚𝙣𝙘𝙚: tinyurl.com/4k263a9c

🧠 𝙐𝙣𝙠𝙣𝙤𝙬𝙖𝙗𝙡𝙚 𝙈𝙞𝙣𝙙𝙨: tinyurl.com/yc4r5r4r

#CybersecurityBooks
November 6, 2025 at 6:18 PM
Did you catch our latest newsletter over on Substack?

It covers various topics, including #hactivism, and how @parmy.bsky.social 's Hall of Fame book, 𝙒𝙚 𝘼𝙧𝙚 𝘼𝙣𝙤𝙣𝙮𝙢𝙤𝙪𝙨, ties into today's cyber threats.

📰 tinyurl.com/2zbsvsfx
November 5, 2025 at 6:27 PM
👩‍💻𝗜𝘁'𝘀 𝗥𝗲𝘃𝗶𝗲𝘄 𝗗𝗮𝘆!🧠

This week, Kevin Magee provides a Hall of Fame recommendation for Sarah Armstrong-Smith’s 𝙐𝙣𝙙𝙚𝙧𝙨𝙩𝙖𝙣𝙙 𝙩𝙝𝙚 𝘾𝙮𝙗𝙚𝙧 𝘼𝙩𝙩𝙖𝙘𝙠𝙚𝙧 𝙈𝙞𝙣𝙙𝙨𝙚𝙩

Read why he believes it will help you "transform your response to threats" ➡️ tinyurl.com/56nzxp5z

#CISO #SecurityAwareness #ThreatIntelligence
November 4, 2025 at 3:31 PM
📅𝗧𝗼𝗱𝗮𝘆 𝗶𝗻 𝗖𝘆𝗯𝗲𝗿𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗛𝗶𝘀𝘁𝗼𝗿𝘆!

On November 2, 1988, the Morris Worm became the first major computer virus to spread across the Internet.

𝙁𝙖𝙣𝙘𝙮 𝘽𝙚𝙖𝙧 𝙂𝙤𝙚𝙨 𝙋𝙝𝙞𝙨𝙝𝙞𝙣𝙜 by @scottjshapiro.bsky.social , covers the #MorrisWorm as one of its five infamous hacks. Our review ➡️ tinyurl.com/r2b3zc2u

(1/3..)
November 2, 2025 at 3:34 PM
🎃It's Halloween. But forget ghost stories, the scariest stories are true.

In 𝙎𝙖𝙣𝙙𝙬𝙤𝙧𝙢, @agreenberg.bsky.social unravels a real-life cyber-thriller. A Russian hacking unit unleashes chaos around the world, turning code into a weapon and critical infrastructure into targets.

💀 tinyurl.com/mu9aht95
October 31, 2025 at 5:05 PM
If your mission this October is to elevate awareness, not just compliance, here is a book worth putting in your team’s hands...

𝙄𝙛 𝙄𝙩’𝙨 𝙎𝙢𝙖𝙧𝙩, 𝙄𝙩’𝙨 𝙑𝙪𝙡𝙣𝙚𝙧𝙖𝙗𝙡𝙚 by Mikko Hypponen weaves technical insight with human stories, showing how every connected thing holds risk.

tinyurl.com/y9ne2uzk
October 30, 2025 at 2:37 PM
🧠 New CyberCanon review!

Jeffrey Pierdomenico dives into Mark Bailey’s Unknowable Minds, exploring AI, ethics, and security.

“Putting humanity above all else” has never felt more urgent.

🔗 cybercanon.org/unknowable-minds

From: @imprintacademic.bsky.social

#AIsecurity #CybersecurityBooks
October 28, 2025 at 2:35 PM
This #CybersecurityAwarenessMonth, remember security awareness isn’t about information. It’s about 𝘵𝘳𝘢𝘯𝘴𝘧𝘰𝘳𝘮𝘢𝘵𝘪𝘰𝘯. 🐛->🦋

We celebrate books that go beyond technical defense to 𝙩𝙧𝙖𝙣𝙨𝙛𝙤𝙧𝙢 our understanding of security, like @perrycarpenter.bsky.social 's 𝙏𝙧𝙖𝙣𝙨𝙛𝙤𝙧𝙢𝙖𝙩𝙞𝙤𝙣𝙖𝙡 𝙎𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝘼𝙬𝙖𝙧𝙚𝙣𝙚𝙨𝙨

(1/2)...
October 23, 2025 at 6:58 PM
🤖🔐𝗕𝗼𝗼𝗸 𝗥𝗲𝘃𝗶𝗲𝘄 𝗗𝗿𝗼𝗽!

This week, Daniel "Rags" Ragsdale provides a timely review of Dr. Iqbal H. Sarker's 𝘼𝙄-𝘿𝙧𝙞𝙫𝙚𝙣 𝘾𝙮𝙗𝙚𝙧𝙨𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙖𝙣𝙙 𝙏𝙝𝙧𝙚𝙖𝙩 𝙄𝙣𝙩𝙚𝙡𝙡𝙞𝙜𝙚𝙣𝙘𝙚, from Springer.

Full review 👉 tinyurl.com/4k263a9c

#Cybersecurity #AI #CybersecurityBooks #IoT #OT #ThreatIntelligence

(1/3)...
October 21, 2025 at 3:09 PM
🗞️Did you miss our October Newsletter?

🔦https://tinyurl.com/33n4y4w9

In this edition, we are shining a light on a Hall of Famer for #CybersecurityAwarenessMonth:

🦊𝘾𝙮𝙗𝙚𝙧𝙨𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙈𝙮𝙩𝙝𝙨 𝙖𝙣𝙙 𝙈𝙞𝙨𝙘𝙤𝙣𝙘𝙚𝙥𝙩𝙞𝙤𝙣𝙨 by Gene Spafford, @ladyofgeek.bsky.social, and josiahdykstra.bsky.social

#CybersecurityBooks
October 20, 2025 at 3:40 PM
Valid account usage is the #1 access vector in identity threat reports per @talosintelligence.com: tinyurl.com/2twf98ry

Implementing #ZeroTrust has never been more important. Here are 3 book recs…

0️⃣ Hall of Famer 𝙕𝙚𝙧𝙤 𝙏𝙧𝙪𝙨𝙩 𝙉𝙚𝙩𝙬𝙤𝙧𝙠𝙨 by Evan Gilman and Doug Barth: tinyurl.com/3h5mnbyd

(1/2)...
October 17, 2025 at 12:12 AM
🔏𝗥𝗲𝘃𝗶𝗲𝘄 𝗗𝗮𝘆 𝗧𝘂𝗲𝘀𝗱𝗮𝘆!📖

#DifferentialPrivacy is an increasingly popular, though controversial, approach. This week, @benrothke.bsky.social provides a Hall of Fame recommendation of @simson.net 's 𝘋𝘪𝘧𝘧𝘦𝘳𝘦𝘯𝘵𝘪𝘢𝘭 𝘗𝘳𝘪𝘷𝘢𝘤𝘺, from @mitpress.bsky.social.

👉 tinyurl.com/2s3jk4cn

#CybersecurityBooks #DP
October 14, 2025 at 1:35 PM
🛩️𝗕𝗼𝗼𝗸 𝗥𝗲𝘃𝗶𝗲𝘄 𝗗𝗮𝘆!

"It’s not a cybersecurity book, but it’s a book that will help you become the kind of cybersecurity leader we need more of."

This week, Caroline Wong reviews Matt Mayberry's:

𝙏𝙝𝙚 𝙏𝙧𝙖𝙣𝙨𝙛𝙤𝙧𝙢𝙖𝙩𝙞𝙤𝙣𝙖𝙡 𝙇𝙚𝙖𝙙𝙚𝙧

Full review 👉 tinyurl.com/94z7ujsu

#CybersecurityLeaders

(1/2)...
October 7, 2025 at 1:43 PM
📢 𝗧𝗵𝗲 𝗖𝘆𝗯𝗲𝗿𝗡𝗲𝘀𝘁 𝘅 𝗖𝘆𝗯𝗲𝗿𝗖𝗮𝗻𝗼𝗻 𝗣𝗮𝗿𝘁𝗻𝗲𝗿𝘀𝗵𝗶𝗽 🤝

#Cybersecurity has no shortage of noise. What professionals need is 𝘀𝗶𝗴𝗻𝗮𝗹.

That’s why we’re excited to announce a new #partnership:

📚 #CyberCanon curates timeless, peer-reviewed cybersecurity books every professional should know.
...(1/3)
September 30, 2025 at 4:10 PM
⚖️𝗕𝗼𝗼𝗸 𝗥𝗲𝘃𝗶𝗲𝘄 𝗗𝗿𝗼𝗽!⚖️

This week, @josiahdykstra.bsky.social provides a Hall of Fame recommendation review of 𝘾𝙮𝙗𝙚𝙧𝙨𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙞𝙣 𝘾𝙤𝙣𝙩𝙚𝙭𝙩: 𝙏𝙚𝙘𝙝𝙣𝙤𝙡𝙤𝙜𝙮, 𝙋𝙤𝙡𝙞𝙘𝙮, 𝙖𝙣𝙙 𝙇𝙖𝙬 by professors 🧑‍🏫 Chris Hoofnagle and Golden Richard III. @nolaforensix.bsky.social

Full review 👉 tinyurl.com/mv6255mk

(1/2)...
September 30, 2025 at 1:49 PM
🗓️REMINDER🗓️

Thursday, 9/25, our very own Rick Howard will be presenting at
@bitwarden.bsky.social's #OpenSourceSecuritySummit along side Rinki Sethi and Andy Greenberg agreenberg.bsky.social.

It's free, it's virtual, and it's only 2 hours, so no excuses. ☺️

👉 bitwarden.com/open-source-...

(1/2)
September 23, 2025 at 7:09 PM
Have you heard about this new thing called #AI?!

(Yes, fairly weak attempt at humor, but give us a break, we're busy over reading and writing over here!)

This week's book may not be well known (yet), but Andrew Chrostowski thinks that needs to change and is recommending it for...
(1/2)
September 23, 2025 at 3:25 PM
🌊 𝗡𝗲𝘄 𝗕𝗼𝗼𝗸 𝗥𝗲𝘃𝗶𝗲𝘄(𝘀)! 🌊

This week, not 1, but 2️⃣ #CyberCanon Committee Members review 𝙏𝙝𝙚 𝘾𝙤𝙢𝙞𝙣𝙜 𝙒𝙖𝙫𝙚 by @mustafasuleymanai.bsky.social with Michael Bhaskar.

This book is widely known, but to what extent does it offer meaningful value to cybersecurity professionals? 🤔

This is exactly...
(1/2)
September 16, 2025 at 12:52 PM
🚨📖 𝗡𝗲𝘄 𝗕𝗼𝗼𝗸 𝗥𝗲𝘃𝗶𝗲𝘄 𝗗𝗿𝗼𝗽! 📖🚨

This week Joanna Grama @runforserenity.bsky.social
submits her review of Jessica Barker’s 𝙃𝙖𝙘𝙠𝙚𝙙: 𝙏𝙝𝙚 𝙎𝙚𝙘𝙧𝙚𝙩𝙨 𝘽𝙚𝙝𝙞𝙣𝙙 𝘾𝙮𝙗𝙚𝙧 𝘼𝙩𝙩𝙖𝙘𝙠𝙨.

📝 Full review 👉 tinyurl.com/mryyszv5

🛒 Get the book for $11! 👉 amzn.to/4n5W6DC

#CyberCanon #Cybersecurity #CybersecurityBooks #Hacking
September 9, 2025 at 6:51 PM
💥📘 𝗕𝗼𝗼𝗸 𝗥𝗲𝘃𝗶𝗲𝘄 𝗗𝗮𝘆!

This week, Stephanie Pirman provides a Hall of Fame recommendation for @matterpreter.bsky.social Matt Hand's 𝙀𝙫𝙖𝙙𝙞𝙣𝙜 𝙀𝘿𝙍 from @nostarchpress.bsky.social.

Evading EDR provides "𝘢 𝘤𝘰𝘮𝘱𝘳𝘦𝘩𝘦𝘯𝘴𝘪𝘷𝘦 𝘰𝘷𝘦𝘳𝘷𝘪𝘦𝘸 𝘰𝘧 𝘌𝘋𝘙𝘴 𝘧𝘳𝘰𝘮 𝘵𝘩𝘳𝘦𝘦 𝘤𝘰𝘳𝘦 𝘱𝘦𝘳𝘴𝘱𝘦𝘤𝘵𝘪𝘷𝘦𝘴: 𝘩𝘰𝘸 𝘌𝘋𝘙 𝘸𝘰𝘳𝘬𝘴, 𝘩𝘰𝘸 𝘢𝘯 𝘢𝘵𝘵𝘢𝘤𝘬𝘦𝘳 𝘤𝘢𝘯...
September 2, 2025 at 1:27 PM