What’s Your Favorite Cybersecurity Book? Maybe It Should Be In the Canon

Chad Berndtson


Category: Cybersecurity

cybersec canon red

The Cybersecurity Canon is official, and you can see our website here. We modeled it after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have 20 books on the initial candidate list but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite – we’re actively soliciting your feedback!

The Cybersecurity Canon is a real thing for our community. We have designed it so that you can directly participate in the process. Please do so!

The members of our Cybersecurity Canon committee have been submitting reviews of Canon-worthy books throughout the past year. Here are just some of the titles that have entered the discussion since we began publishing reviews in November 2013:

We will celebrate the Cybersecurity Canon and make a new induction at Ignite 2015. Register now to join us March 30-April 1, 2015 in Las Vegas.

ignite 2015

1 Reader Comment

  1. Threat Vector by Tom Clancy

Got something to say?

Get updates: Unit 42

Sign up to receive the latest news, cyber threat intelligence and research from Unit42

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.


© 2018 Palo Alto Networks, Inc. All rights reserved.