
Books
Non-Fiction
- Code Girls: The Untold Story of the American Women Code Breakers Who Helped Win World War II, Liza Mundy
- The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage, Cliff Stoll
- Cyber War: The Next Threat to National Security and What to Do About It, Richard A. Clarke
- Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals, Bart McDonough
- Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career, Dr. Gerald Auger, Jax Scott, Jonathan Helmus, Kim Nguygen, Heath Adams
- Cybersecurity for Everyone, a Human-Centered Approach to Protecting Yourself and Your Community, Cathy Olieslaeger
- Empowering Cyber Educators: Strategies and Tools for Educators Shaping the Future of Cybersecurity, Jason Edwards
- Future Crimes, Marc Goodman
- IN Security: Why a Failure to Attract and Retain Women in Cybersecurity is Making Us All Less Safe, Jane Frankland
- Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath, Ted Koppel
- Measuring and Managing Information Risk: a FAIR Approach, Jack Freund & Jack Jones
- Navigating the Cybersecurity Career Path, Helen E. Patton
- Raising Critical Thinkers: A Parent’s Guide to Growing Wise Kids in the Digital Age, Julie Bogart, Barbara Oakley
- Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers, Andy Greenberg
- Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door, Brian Krebs
- The Art of Invisibility: The World’s Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, Kevin Mitnik & Robert Vamosi
- The Sisterhood: The Secret History of Women at the CIA, Liza Mundy
- The Struggle Is Real: A Blueprint to Excelling Into The Cybersecurity Discipline, Katia Dean
- This is How They Tell Me the World Ends: The Cyber Weapons Arms Race, Nicole Perlroth
- Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency, Andy Greenberg
- Women Know Cyber: 100 Fascinating Females Fighting Cybercrime, Steve Morgan & Di Freeze
Fiction
- Digital Fortress, Dan Brown
- Girl With the Dragon Tattoo, Stieg Larsson (trilogy)
- The ghost at the table (Stephanie McBride — cybercrime detective series), Lee Hopkins
- Threat Vector, Tom Clancy
For the Kids
- Cybersecurity Activity Book for Kids: Learn about Online Safety while Coloring, Solving Word Puzzles, Mazes and more, Dfour Press
- Cybersecurity Activity Book for Teens: Learn about Online Safety and Privacy while Coloring, Solving Word Puzzles, Mazes and more, Dfour Press
- Cybersecurity for Teens: Learn the Terms, Daniel Amadi
- How We Got Cyber Smart: A book about how to stay safe online, Lisa Rothfield-Kirschner
- Life Skills for Kids in a Digital World: Navigating the Foundational Life Skills Needed for Digital Literacy, Online Safety, and Privacy, Amy Daniels
- Security Squad: Your Kid’s Playbook to Cybersecurity, Cyberbullying, and Coding!, Bjorn Beam
- See Yourself in Cybersecurity, Zinet Kemal
More book listings
If you’re not a big reader, watch some TV
Blogs
The question of cybersecurity certifications comes up very frequently on discussion boards. What is the best certificate to get? Is a college degree better for getting a cybersecurity role? What education or skills are needed for various cybersecurity roles? And many, many more. In this post, I’ll try to clarify some of these questions and more.
Blog on various cybersecurity career choices.
Keeping you informed and protected on the Net. Bleeping Computer is an information security and technology news publication created in 2004. Millions of visitors come to BleepingComputer.com every month to learn about the latest security threats, technology news, ways to stay protected online, and how to use their computers more efficiently.
CIO is the place where you find news, information technology articles, insight and analysis on major data breaches and online threats. Covering multiple aspects of world wide web, it provides in-depth, content rich information for IT professionals and normal users.
Cybersecurity Ventures, Steve Morgan
Reports, articles, blogs, interviews and more
Steve Morgan is founder and Editor-in-Chief at Cybercrime Magazine and Cybersecurity Ventures. His blogs and articles can be seen at CSO, DarkReading, Entrepreneur, Forbes, IDG, and others.
Hack the Gap: Close the cybersecurity talent gap with interactive tools and data
To help close the cybersecurity skills gap, CyberSeek provides detailed, actionable data about supply and demand in the cybersecurity job market.
There are many opportunities for workers to start and advance their careers within cybersecurity. This interactive career pathway shows key jobs within cybersecurity, common transition opportunities between them, and detailed information about the salaries, credentials, and skillsets associated with each role.
Cybersecurity Supply/Demand Heat Map
Cybersecurity talent gaps exist across the country. Closing these gaps requires detailed knowledge of the cybersecurity workforce in your region. This interactive heat map provides a granular snapshot of demand and supply data for cybersecurity jobs at the state and metro area levels, and can be used to grasp the challenges and opportunities facing your local cybersecurity workforce.
DARKReading.com encompasses 13 communities, each of which drills deeper into the enterprise security challenge: Analytics, Attacks & Breaches, Application Security, Careers and People, Cloud Security, Endpoint, IoT, Mobile, Operations, Perimeter, Risk, Threat Intelligence, and Vulnerabilities and Threats. Each community is led by editors and subject matter experts who collaborate with security researchers, technology specialists, industry analysts and other Dark Reading members to provide timely, accurate and informative articles that lead to spirited discussions.
Our goal is to challenge community members to think about security by providing strong, even unconventional points of view, backed by hard-nosed reporting, hands-on experience and the professional knowledge that comes only with years of work in the information security industry.
DARKReading Webinars: https://www.darkreading.com/webinar_upcoming.asp
Digital Forensics and Incident Response Blog Geared Toward Beginners.
Arm yourself with the best cybersecurity guidance to better understand — and protect — your critical infrastructure.
Information and insight on today’s advanced threats from the leader in advanced threat prevention.
A one-stop-source for the information security industry. The magazine contains news articles, white papers, a list of upcoming events & conferences and a lot of webinars.
(ISC)² Cybersecurity Workforce Study
The (ISC)² Cybersecurity Workforce Study is conducted annually to assess the cybersecurity workforce gap, better understand the barriers facing the cybersecurity profession and uncover strategies that organizations can use to recruit, build and strengthen their cybersecurity teams. It provides insights on these talented individuals who are excelling in this profession, securing their organizations’ critical assets and advancing in their careers. This year’s study also offers the industry’s first known estimate of the number of cybersecurity professionals currently working in the field.
Krebs on Security, Brian Krebs
Cybersecurity journalism at its best.
Thinking of a Cybersecurity Career? Read This.
Naked Security is the newsroom of Sophos, the well-known developer of computer security products. Lots of useful security news, opinions, advice and research.
Each day they post a new tip that focuses on and explains a specific topic and actionable steps people can take to protect themselves, their family and their organization.
SC supplies information security professionals with a wide range of business and technical information resources. You’ll discover news articles, product reviews, white papers, videos and more.
This blog is focused on teaching Cybersecurity content in a simple way. The infosec topics covered including latest technologies, governance, learning platforms and security best practices.
Learn how to protect yourself, your family and your devices with these tips and resources.
How to become a cybersecurity pro: A cheat sheet
The Hacker News is the most popular, independent and trusted source for the latest news headlines on cybersecurity, hacking, computer security, cybercrime, privacy, vulnerabilities and technology for all businesses, information security professionals and hackers worldwide.
Troy Hunt’s blog showcases a lot of the different issues with which he is familiar. He is a Microsoft MVP and Pluralsight author whose credentials also include working with Pfizer. His blog posts focus on customer and individual user interfaces and security. Written with an approachable tone, this blog is a great one for the non-technical c-suite reader.
Focused on security at the application level.
Amongst the various reports they produce, it is worth subscribing to their annual Verizon Data Breach Investigations Report (DBIR).
Wired’s section on privacy, crime and security online is packed with articles and resources. Many of the stories have a national/international flavor.
Last but not least, a good resource on the latest cybersecurity news.
Find more security blogs: https://blog.feedspot.com/cyber_security_blogs/