Why am I passionate about this?

I have worked in cybersecurity for over 20 years and think it’s one of the most important topics in our modern world. Everyone needs to be secure–from young kids to elderly people avoiding online scams. As a practicing Chief Security Officer, I work with security technology and people every day, and I’m getting to live my childhood dream of being a writer helping people understand these complex challenges. Security is a part of the foundation of Maslow’s Hierarchy of Needs and allows everyone to live up to their full potential as humans. People are the most important part of security, and you don’t need a degree in computer science to be cyber secure.


I wrote

Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

By George Finney,

Book cover of Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

What is my book about?

This book is the most successful strategy for protecting yourself or your company from a cybersecurity incident. Everyone needs to…

When you buy books, we may earn a commission that helps keep our lights on (or join the rebellion as a member).

The books I picked & why

Book cover of The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage

George Finney Why did I love this book?

The first person to ever catch a hacker wasn’t an FBI or CIA agent. It was an astronomer, and his name was Clifford Stoll. This book is a biographical account of how he took on a German hacker who was selling secrets to the KGB in the 1980s. I love this book because it shows how anyone can play a role in cybersecurity.

As a kid, I watched the TV adaptation of the book for PBS’s NOVA program and went into cybersecurity in large part because of Stoll. Because cybersecurity wasn’t a profession at the time, Stoll created his own innovative techniques, like building the first computer honeypot to help catch the hacker in action. When his book was made into a PBS documentary, as a thank you for putting up with him and all the crazy things he had to do to track the hacker, he had all of his friends and coworkers play themselves in the documentary.

By Clifford Stoll,

Why should I read it?

4 authors picked The Cuckoo's Egg as one of their favorite books, and they share why you should read it.

What is this book about?

Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian).

Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name…


Book cover of Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

George Finney Why did I love this book?

This isn’t just the story of the first cyberweapon ever launched by one country against another; it’s actually two detective stories woven together.

I loved how Zetter blends the stories of the cybersecurity companies trying to figure out how it was discovered and what the cyberweapon did, together with the efforts of the International Atomic Energy Agency to track down the weird anomalies popping up in Iran’s nuclear program.

This book is a lot like The Godfather in terms of storytelling. You don’t need to know what a “Zero Day” is to get something out of it.

By Kim Zetter,

Why should I read it?

1 author picked Countdown to Zero Day as one of their favorite books, and they share why you should read it.

What is this book about?

A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. 

“Immensely enjoyable . . . Zetter turns a complicated and technical cyber story into an engrossing whodunit.”—The Washington Post
 
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm…


Ad

Book cover of Everything We Had: A Novel of the Pacific Air War November-December 1941

Everything We Had by Tom Burkhalter,

War is coming to the Pacific. The Japanese will come south within days, seeking to seize the oil- and mineral-rich islands of the Dutch East Indies. Directly astride their path to conquest lie the Philippines, at that time an American protectorate. 

Two brothers, Jack and Charlie Davis, are part of…

Book cover of The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win

George Finney Why did I love this book?

This book was one of the biggest inspirations for me when I wrote my book.

Running a team of technology experts is really hard, so instead of writing a reference manual or an inspirational leadership memoir, Kim tells the story of a group of people who work together to learn the same best practices that have been in use for decades in the manufacturing and project management industries.

This hits close to home since I can recognize myself and many of my colleagues in each of the vivid characters.

By Gene Kim, Kevin Behr, George Spafford

Why should I read it?

2 authors picked The Phoenix Project as one of their favorite books, and they share why you should read it.

What is this book about?

***Over a half-million sold! And available now, the Wall Street Journal Bestselling sequel The Unicorn Project***

"Every person involved in a failed IT project should be forced to read this book."-TIM O'REILLY, Founder & CEO of O'Reilly Media

"The Phoenix Project is a must read for business and IT executives who are struggling with the growing complexity of IT."-JIM WHITEHURST, President and CEO, Red Hat, Inc.

Five years after this sleeper hit took on the world of IT and flipped it on it's head, the 5th Anniversary Edition of The Phoenix Project continues to guide IT in the DevOps revolution.…


Book cover of Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers

George Finney Why did I love this book?

Ever wondered what Russian hackers have been up to over the last few years? I found this a really sobering read, but at the same time, I loved hearing the stories of the people who work so hard to keep us safe.

Hackers are usually pretty big nerds, so it’s not really surprising that the title of this book comes from how cybercriminals embedded references to Frank Herbert’s book Dune into the code they used to carry out cyberattacks against Ukraine and other countries.

By Andy Greenberg,

Why should I read it?

2 authors picked Sandworm as one of their favorite books, and they share why you should read it.

What is this book about?

"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of Democracy

The true story of the most devastating act of cyberwarfare in history and the desperate hunt to identify and track the elite Russian agents behind it: "[A] chilling account of a Kremlin-led cyberattack, a new front in global conflict" (Financial Times).

In 2014, the world witnessed the start of a…


Ad

Book cover of Gunner Hobbs: WWII in the Pacific! Tulagi! Tarawa! Saipan!

Gunner Hobbs by Herb Marlow,

A WWII novel about a young Gunner's Mate - Max Hobbs - serving on a troop transport in the Pacific Theater.

Hobbs is a man with exceptional eye sight who earns a snipers designation in Gunner's Mate school. When he graduates he is assigned to an APA in San Diego,…

Book cover of Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World

George Finney Why did I love this book?

I loved this one because there are so many really influential people in the world today who started out as hackers. Former Texas Legislator and presidential candidate Beto O’Rourke was a member of one of the first hacker groups, The Cult of the Dead Cow.

What really makes this one stand out for me was how Menn was able to illustrate how our culture of cybersecurity today, things like responsible disclosure of security vulnerabilities, was shaped by the hacker ethos as a response to mega corporations actively trying to ignore the problem or even suing researchers to prevent them from talking rather than to fix the issues.

By Joseph Menn,

Why should I read it?

1 author picked Cult of the Dead Cow as one of their favorite books, and they share why you should read it.

What is this book about?

Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was for years the best technique for controlling computers from afar, forcing giant companies to work harder to protect customers. They contributed to the development of Tor, the most important privacy tool on the net, and helped build cyberweapons that advanced US security without injuring anyone. With its origins in the earliest…


Explore my book 😀

Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

By George Finney,

Book cover of Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

What is my book about?

This book is the most successful strategy for protecting yourself or your company from a cybersecurity incident. Everyone needs to understand zero trust, not just the security nerds, so this book uses a case study of a fictional company that experiences a breach and must implement zero trust to protect itself.

Everyone in IT must play a role in your zero trust journey, and this book provides a repeatable methodology for securing your data, no matter what type of technology you use. This book shows how everyone, from network engineers to system administrators, cloud architects, identity analysts, technical trainers, or help desk staff, can contribute to protecting an organization.

Book cover of The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Book cover of Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Book cover of The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win

Share your top 3 reads of 2024!

And get a beautiful page showing off your 3 favorite reads.

1,889

readers submitted
so far, will you?

Ad

📚 You might also like…

Book cover of Unwritten: The Thought Leader's Guide to Not Overthinking Your Business Book

Unwritten by Emily Crookston,

UNWRITTEN: The Thought Leader’s Guide to Not Overthinking Your Business Book is a business book about how to write a business book. Written by a business owner (a ghostwriter) for other business owners, it shows you the easiest way to fit writing a book into running your business. And most…

Book cover of An Italian Feast: The Celebrated Provincial Cuisines of Italy from Como to Palermo

An Italian Feast by Clifford A. Wright,

An Italian Feast celebrates the cuisines of the Italian provinces from Como to Palermo. A culinary guide and book of ready reference meant to be the most comprehensive book on Italian cuisine, and it includes over 800 recipes from the 109 provinces of Italy's 20 regions.

An Italian Feast is…

5 book lists we think you will like!

Interested in computer security, hackers, and espionage?

Hackers 16 books
Espionage 646 books