Books
Non-Fiction
- Blockchain Revolution, Don Tapscott
- Code Girls, Liza Mundy
- The Cuckoo’s Egg, Cliff Stoll
- Cyber War, Richard A. Clarke
- Cyber Smart, Bart McDonough
- Cybersecurity Career Master Plan, Dr. Gerald Auger
- Future Crimes, Marc Goodman
- Lights Out, Ted Koppel
- Measuring and Managing Information Risk: a FAIR Approach, Jack Freund & Jack Jones
- Sandworm, Andy Greenberg
- Spam Nation, Brian Krebs
- The Art of Invisibility, Kevin Mitnik
- This is How They Tell Me the World Ends, Nicole Perlroth
- Women Know Cyber, Steve Morgan & Di Freeze
Fiction
- Digital Fortress, Dan Brown
- Girl With the Dragon Tattoo, Stieg Larsson (trilogy)
- Threat Vector, Tom Clancy
More book listings: https://icdt.osu.edu/cybercanon
Blogs
Worth reading their Watch Commander’s Logs or their Healthcare blog page.
The question of cybersecurity certifications comes up very frequently on discussion boards. What is the best certificate to get? Is a college degree better for getting a cybersecurity role? What education or skills are needed for various cybersecurity roles? And many, many more. In this post, I’ll try to clarify some of these questions and more.
Blog on various cybersecurity career choices.
Keeping you informed and protected on the Net. Bleeping Computer is an information security and technology news publication created in 2004. Millions of visitors come to BleepingComputer.com every month to learn about the latest security threats, technology news, ways to stay protected online, and how to use their computers more efficiently.
CIO is the place where you find news, information technology articles, insight and analysis on major data breaches and online threats. Covering multiple aspects of world wide web, it provides in-depth, content rich information for IT professionals and normal users.
Cybersecurity Ventures, Steve Morgan
Reports, articles, blogs, interviews and more
Steve Morgan is founder and Editor-in-Chief at Cybercrime Magazine and Cybersecurity Ventures. His blogs and articles can be seen at CSO, DarkReading, Entrepreneur, Forbes, IDG, and others.
Hack the Gap: Close the cybersecurity talent gap with interactive tools and data
To help close the cybersecurity skills gap, CyberSeek provides detailed, actionable data about supply and demand in the cybersecurity job market.
There are many opportunities for workers to start and advance their careers within cybersecurity. This interactive career pathway shows key jobs within cybersecurity, common transition opportunities between them, and detailed information about the salaries, credentials, and skillsets associated with each role.
Cybersecurity Supply/Demand Heat Map
Cybersecurity talent gaps exist across the country. Closing these gaps requires detailed knowledge of the cybersecurity workforce in your region. This interactive heat map provides a granular snapshot of demand and supply data for cybersecurity jobs at the state and metro area levels, and can be used to grasp the challenges and opportunities facing your local cybersecurity workforce.
DARKReading.com encompasses 13 communities, each of which drills deeper into the enterprise security challenge: Analytics, Attacks & Breaches, Application Security, Careers and People, Cloud Security, Endpoint, IoT, Mobile, Operations, Perimeter, Risk, Threat Intelligence, and Vulnerabilities and Threats. Each community is led by editors and subject matter experts who collaborate with security researchers, technology specialists, industry analysts and other Dark Reading members to provide timely, accurate and informative articles that lead to spirited discussions.
Our goal is to challenge community members to think about security by providing strong, even unconventional points of view, backed by hard-nosed reporting, hands-on experience and the professional knowledge that comes only with years of work in the information security industry.
DARKReading Webinars: https://www.darkreading.com/webinar_upcoming.asp
Digital Forensics and Incident Response Blog Geared Toward Beginners.
Arm yourself with the best cybersecurity guidance to better understand — and protect — your critical infrastructure.
Information and insight on today’s advanced threats from the leader in advanced threat prevention.
Threat map: https://www.fireeye.com/cyber-map/threat-map.html
A one-stop-source for the information security industry. The magazine contains news articles, white papers, a list of upcoming events & conferences and a lot of webinars.
(ISC)² Cybersecurity Workforce Study
The (ISC)² Cybersecurity Workforce Study is conducted annually to assess the cybersecurity workforce gap, better understand the barriers facing the cybersecurity profession and uncover strategies that organizations can use to recruit, build and strengthen their cybersecurity teams. It provides insights on these talented individuals who are excelling in this profession, securing their organizations’ critical assets and advancing in their careers. This year’s study also offers the industry’s first known estimate of the number of cybersecurity professionals currently working in the field.
Krebs on Security, Brian Krebs
Cybersecurity journalism at its best.
Thinking of a Cybersecurity Career? Read This.
Naked Security is the newsroom of Sophos, the well-known developer of computer security products. Lots of useful security news, opinions, advice and research.
Each day they post a new tip that focuses on and explains a specific topic and actionable steps people can take to protect themselves, their family and their organization.
SC supplies information security professionals with a wide range of business and technical information resources. You’ll discover news articles, product reviews, white papers, videos and more.
This blog is focused on teaching Cybersecurity content in a simple way. The infosec topics covered including latest technologies, governance, learning platforms and security best practices.
Learn how to protect yourself, your family and your devices with these tips and resources.
How to become a cybersecurity pro: A cheat sheet
The Hacker News is the most popular, independent and trusted source for the latest news headlines on cybersecurity, hacking, computer security, cybercrime, privacy, vulnerabilities and technology for all businesses, information security professionals and hackers worldwide.
Troy Hunt’s blog showcases a lot of the different issues with which he is familiar. He is a Microsoft MVP and Pluralsight author whose credentials also include working with Pfizer. His blog posts focus on customer and individual user interfaces and security. Written with an approachable tone, this blog is a great one for the non-technical c-suite reader.
Focused on security at the application level.
Amongst the various reports they produce, it is worth subscribing to their annual Verizon Data Breach Investigations Report (DBIR).
Wired’s section on privacy, crime and security online is packed with articles and resources. Many of the stories have a national/international flavor.
Last but not least, a good resource on the latest cybersecurity news.
Find more security blogs: https://blog.feedspot.com/cyber_security_blogs/