Still Time to Vote for the Cybersecurity Canon

Chad Berndtson


Category: Cybersecurity

PAN_BlogHeader_Cybersecurity Canon

Have you had a chance to vote in this year’s poll to help us choose what books should join the Cybersecurity Canon?

We want to hear from you on the book that you think every cybersecurity professional should read. You have until February 28 to head to our Cybersecurity Canon website, take a look at the list of nominations, and cast your vote for your favorite.

We will induct the winners into the Canon at an Awards Ceremony during our annual Ignite Conference in Las Vegas on April 1, 2015.

1 Reader Comment

  1. I’m sorry the following two books didn’t make it into the list of nominations:

    CYBERPUNK: Outlaws and Hackers on the Computer Frontier

    http://www.amazon.com/CYBERPUNK-Outlaws-Hackers-Computer-Frontier/dp/0684818620/ref=sr_1_1?ie=UTF8&qid=1424177654&sr=8-1&keywords=cyberpunks

    Crypto: How the Code Rebels Beat the Government–Saving Privacy in the Digital Age (Penguin Press Science) [Kindle Edition]
    http://www.amazon.com/Crypto-Government–Saving-Privacy-Digital-Penguin-ebook/dp/B004IATDCO/ref=sr_1_1?ie=UTF8&qid=1424178056&sr=8-1&keywords=crypto+how+the+code+rebels+beat+the+government+saving+privacy+in+the+digital+age

    These books had a deep impact on shaping my development as a cybersecurity professional. The details and stories within each explain the history of cyber security better than many others begin to hint at. From tales of hacker exploits to the fight to secure our data from prying eyes, these books tell timeless tales that EVERY cybersecurity professional, and every one concerned with privacy (especially in the case of Crypto) should read.

    I found these two in the library when I was 12 years old…my life was never the same.

Got something to say?

Get updates: Unit 42

Sign up to receive the latest news, cyber threat intelligence and research from Unit42

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.


© 2018 Palo Alto Networks, Inc. All rights reserved.