Author Nikki Robinson
Effective Vulnerability Management Book
Author Chris Hughes
๐ฒ ๐ ๐๐'๐ ๐๐ผ๐ผ๐ธ ๐ฅ๐ฒ๐๐ถ๐ฒ๐ ๐๐ฎ๐! ๐๐ฒ
"Chris Hughes and Nikki Robinson provide a valuable contribution to our profession with ๐๐ง๐ง๐ฆ๐ค๐ต๐ช๐ท๐ฆ ๐๐ถ๐ญ๐ฏ๐ฆ๐ณ๐ข๐ฃ๐ช๐ญ๐ช๐ต๐บ ๐๐ข๐ฏ๐ข๐จ๐ฆ๐ฎ๐ฆ๐ฏ๐ต: ๐๐ข๐ฏ๐ข๐จ๐ช๐ฏ๐จ ๐๐ช๐ด๐ฌ ๐ช๐ฏ ๐ต๐ฉ๐ฆ ๐๐ถ๐ญ๐ฏ๐ฆ๐ณ๐ข๐ฃ๐ญ๐ฆ ๐๐ช๐จ๐ช๐ต๐ข๐ญ ๐๐ค๐ฐ๐ด๐บ๐ด๐ต๐ฆ๐ฎ. The book offers an approachable overview of one of our industryโs most challenging domains...
29.07.2025 15:40 โ ๐ 1 ๐ 1 ๐ฌ 1 ๐ 0
Author Michael Wooldridge holding 3 of his books including A Brief History of Artificial Intelligence
๐ ๐ Book Review Day!
You're likely consumed with the AI hype train ๐ค ๐, but do know the history of what led to today's world of AI bots and agents?
University of Oxford's Ashall Professor of the Foundations of Artificial Intelligence, Michael Wooldridge, certainly does!...
tinyurl.com/2dkzax3z
22.07.2025 13:39 โ ๐ 2 ๐ 1 ๐ฌ 1 ๐ 0
Photo of Kim Zetter's Countdown to Zero Day
Kim Zetter's 2014 book ๐๐ฐ๐ถ๐ฏ๐ต๐ฅ๐ฐ๐ธ๐ฏ ๐ต๐ฐ ๐ก๐ฆ๐ณ๐ฐ ๐๐ข๐บ was one of the first inducted into the Canon Hall of Fame ๐. It unpacks the story of #Stuxnet and a 1st of its kind to turn a real-world cyber espionage operation ๐ตโโ๏ธ into a gripping thriller.
Book review: tinyurl.com/mubj2z4n
@kimzetter.bsky.social
21.07.2025 18:53 โ ๐ 20 ๐ 3 ๐ฌ 1 ๐ 0
Jessica Barker singing her books at RSAC including 'Confident Cyber Security'
New week, new book review to check out. And this one is getting a Hall of Fame nomination...
"If thereโs one book Iโve consistently recommended to those peering into the cybersecurity industry from the outside, itโs Jessica Barker's 'Confident Cyber Security'...
tinyurl.com/4brjsfpd
14.07.2025 15:18 โ ๐ 1 ๐ 1 ๐ฌ 1 ๐ 0
The Language of Deception review screenshot
๐จ๐ ๐๐๐ฐ ๐๐จ๐จ๐ค ๐ซ๐๐ฏ๐ข๐๐ฐ ๐๐ซ๐จ๐ฉ ๐๐จ
This week, ๐๐๐๐ ๐๐ก๐จ๐ฆ๐ฉ๐ฌ๐จ๐ง provides us with some great insights on โ๐๐ก๐ ๐๐๐ง๐ ๐ฎ๐๐ ๐ ๐จ๐ ๐๐๐๐๐ฉ๐ญ๐ข๐จ๐ง: ๐๐๐๐ฉ๐จ๐ง๐ข๐ณ๐ข๐ง๐ ๐๐๐ฑ๐ญ ๐๐๐ง๐๐ซ๐๐ญ๐ข๐จ๐ง ๐๐โ by ๐๐ฎ๐ฌ๐ญ๐ข๐ง ๐๐ฎ๐ญ๐๐ก๐๐ง๐ฌ
The book is a comprehensive review of technologies used to manipulate, deceive, and defraud the public. It covers both old...
10.07.2025 13:44 โ ๐ 1 ๐ 1 ๐ฌ 2 ๐ 0
"Read the best books first or you may not have a chance to read them at all" quote by Henry David Thoreau
This 1849 quote from Henry Thoreau is so applicable today to cybersecurity: with too much content and too much noise, where should you start?
The Cybersecurity Canon provides straightforward answers. Our team of cybersecurity experts reviews books so that you can prioritize what to read first...
10.07.2025 13:52 โ ๐ 1 ๐ 1 ๐ฌ 1 ๐ 0
"CyberCanon New Book Review" with a pic of the book, Investments Unlimted.
๐จ๐ New Book Review Drop! ๐๐จ
Investments Unlimited: A Novel About DevOps, Security, Audit Compliance, and Thriving in the Digital Age
tinyurl.com/cybercanon25...
โThroughout the book, the authors successfully model real-world challenges in ways that resonate. Whether itโs resistance from...
24.06.2025 11:47 โ ๐ 3 ๐ 3 ๐ฌ 1 ๐ 0
โฆBut, if I take all the stolen creds out there on the dark web over the past several years and mash them into one database, is that really a new โcolossal data breachโ?
Be better, folks. Or weโre just like the monsters in Monsters, Inc scared to hell of a cute little toddler yelling โboo!โ.
20.06.2025 18:26 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
โฆfocused sources and industry โexpertsโ see the headlines and fall prey, itโs irresponsible.
This doesnโt help security awareness. It does the opposite.
Per BleepingComputer (thanks Joe Tidy for sharing), a researcher found a database with a crap ton of creds. A LOT of credsโฆ
20.06.2025 18:26 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0
โฆloves to fall for and amplify without much thought. Then, 2 seconds later, we all complain that business leaders and users donโt listen to us.
I get that the big news outlets do it. Itโs a problem, mainly due to the system incentivizing this very thing.
But, when many respected cybersecurityโฆ
20.06.2025 18:26 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0
Monsterโs Inc screenshot when Boo yells โBoo!โ in the restaurant scaring all the patrons.
BREAKING: The Internet Still Has Leaked Credentials.
All over my feed is the latest โmassiveโ, โunimaginableโ, โcolossalโ, โdata breachโ, โEVER!โ. โA nightmareโ. ๐คจ
But, instead, this appears to be just some more of that good old fashioned fear mongering. The kind the cybersecurity communityโฆ
20.06.2025 18:26 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0
CyberCanon Newsletter #1 coming out of a steel pad-locked mailbox with a Substack logo.
๐ The #CyberCanon Newsletter Has Landed! ๐๏ธ
Weโre excited to announce the launch of our #Substack newsletter. It's your front-row seat to the best writing in #cybersecurity.
๐ ๐๐ผ substack.com/@cybercanon
19.06.2025 14:28 โ ๐ 1 ๐ 1 ๐ฌ 1 ๐ 0
๐ Books: The Original OSINT ๐
Over the weekend, a member of our team attended the @layer8conference.com, an OSINT and Social Engineering focused event.
Dr. Brian Nussbaumโs (@ilnuttree.bsky.social) interesting talk was right up our alley regarding OSINT National History referencingโฆ
(1/5)
17.06.2025 02:15 โ ๐ 4 ๐ 5 ๐ฌ 1 ๐ 0
CyberCanon book review screenshot of Cybersecurity Readiness
"I experienced tremendous technical and cultural challenges during our implementation and only wish that we had a book like this to navigate us."
๐ฅIt's Tuesday-review-day here at the #CyberCanon.๐ฅ
A new review by committee member Sandip Dholakia has been added to the Canon library...
(1/4)
17.06.2025 18:26 โ ๐ 1 ๐ 1 ๐ฌ 1 ๐ 0
Layer 8 Conference entrance
Layer 8 badge and Rae Baker book signing
OSINT themed CyberCanon sticker
โฆ
2026 edition.
#cybersecuritybooks #socialengineering #layer8con
cybercanon.org/spies-lies-a...
cybercanon.org/tracers-in-t...
(5/5)
17.06.2025 02:15 โ ๐ 2 ๐ 3 ๐ฌ 0 ๐ 0
CyberCanon OSINT stickers
Boston based folks, looking like another ๐ง๏ธ Saturday. Even more the reason to attend @layer8conference.com an OSINT and Social Engineering conference tomorrow. โฉ
If still on the fence, let it be known that a Canon team member will be in attendance and may have OSINT themed CyberCanon stickers. ๐ค
13.06.2025 12:41 โ ๐ 2 ๐ 2 ๐ฌ 0 ๐ 0
Help wanted sign joke about no pay but cool helmets
Well, we may not be offering cool helmets like your local fire department, but we do have a very nice logo you could put on your LinkedIn profile, ๐คท?
If you are passionate about cybersecurity and our mission, please check out the volunteer roles we are looking to fill.
11.06.2025 21:53 โ ๐ 2 ๐ 3 ๐ฌ 1 ๐ 0
Dark Avenger, Minecraft Wars, Killer Toasters... Super fun one that I enjoyed about famous hacks, definitely worth checking out...
10.06.2025 14:14 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
New Cybersecurity Canon Book Review for Fancy Bear Goes Phishing
๐จ๐ New Cybersecurity Canon Book Review Drop! ๐๐จ
Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks by Scott J. Shapiro @scottjshapiro.bsky.social
Reviewer J. Carlos Vega, CISSP takes us through this compelling dive into five infamous hacks...
(1/4)
10.06.2025 13:27 โ ๐ 14 ๐ 8 ๐ฌ 2 ๐ 0
CyberCanon.org screenshot - Join the community!
๐จ Big News: our new website is now live at CyberCanon.org! ๐จ
Explore our curated library of must-read cybersecurity books, suggest new titles, and support our mission to share the essential knowledge every InfoSec professional needs to learn, apply, and master.
(1/3)
30.05.2025 15:37 โ ๐ 2 ๐ 2 ๐ฌ 1 ๐ 0
The worldโs premier hacker conference. Serving the global hacker community since 1993.
Defcon.org
Forum.defcon.org
Defcon.social
The world's premier Technical Cybersecurity Conference Series
The World's Premier Technical Cybersecurity Conference Series
blackhat.com
Join Us at Black Hat USA this August 2-7, 2025: blackhat.com/us-25/
Security bean counter by day, wannabe exploit developer by night. Big fan of the 303.
macOS security researcher espousing no one's opinions but my own. Dogged follower of #lufc, at least until the world stops going round (IYKYK).
philastokes.com
#threatintel @Recorded Future | Formerly @PwC GTI | Malware & infrastructure analysis with a side of cyberpunk. ๐๐ She/her, support ๐ณ๏ธโ๐๐ณ๏ธโโง๏ธโจ
Infosec professional and recovering idiot. Mostly retweets. Canadian.
Threat Intelligence for Silent Push. Digital security for at-risk people.
Researcher, reader, runner. Eternal traveler, serial migrant, music lover, lapsed mathematician.
Signal: martijngrooten.37
Journalist - cyber/natn'l security. Speaker. Georgetown adjunct prof. Author - COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World's First Digital Weapon
Signal: KimZ.42
https://www.zetter-zeroday.com
Network engineer/IT Bachelor of Science. Avionics tech (Air Force) 25 years IT consultant. In light of what's happening in the world today, I want to help anyone who is concerned about their data. Cyber Security is more critical than ever. No sex accounts!
Helping technology leaders succeed through books (The Phoenix Project, Team Topologies), events (DevOps Enterprise Summit), research, podcasts (The Idealcast), and more.
Empowering Businesses Through Tech ๐ผ | Software Development ๐ฅ๏ธ | Digital Marketing & Growth Hacking ๐ | AI-driven Web Dev Enthusiast ๐ค | ML Research Tinkerer ๐
Educator | Author | Board Chair | Founder & Former CEO of Clearwater, Cyber Risk Coach-Advisor
https://bobchaput.com/
#CyberSecurity #ApplicationSecurity #Compliance #AI #Embedded #IoT #Opensource
IT security consultant. Creator of Layer 8 Conference and Podcast. Hockey fan (especially Bruins), I try to play golf sometimes. I have a dog and two cats.