Why am I passionate about this?

I have worked in cybersecurity for over 20 years and think it’s one of the most important topics in our modern world. Everyone needs to be secure–from young kids to elderly people avoiding online scams. As a practicing Chief Security Officer, I work with security technology and people every day, and I’m getting to live my childhood dream of being a writer helping people understand these complex challenges. Security is a part of the foundation of Maslow’s Hierarchy of Needs and allows everyone to live up to their full potential as humans. People are the most important part of security, and you don’t need a degree in computer science to be cyber secure.


I wrote

Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

By George Finney,

Book cover of Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

What is my book about?

This book is the most successful strategy for protecting yourself or your company from a cybersecurity incident. Everyone needs to…

When you buy books, we may earn a commission that helps keep our lights on (or join the rebellion as a member).

The books I picked & why

Book cover of The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage

George Finney Why did I love this book?

The first person to ever catch a hacker wasn’t an FBI or CIA agent. It was an astronomer, and his name was Clifford Stoll. This book is a biographical account of how he took on a German hacker who was selling secrets to the KGB in the 1980s. I love this book because it shows how anyone can play a role in cybersecurity.

As a kid, I watched the TV adaptation of the book for PBS’s NOVA program and went into cybersecurity in large part because of Stoll. Because cybersecurity wasn’t a profession at the time, Stoll created his own innovative techniques, like building the first computer honeypot to help catch the hacker in action. When his book was made into a PBS documentary, as a thank you for putting up with him and all the crazy things he had to do to track the hacker, he had all of his friends and coworkers play themselves in the documentary.

By Clifford Stoll,

Why should I read it?

4 authors picked The Cuckoo's Egg as one of their favorite books, and they share why you should read it.

What is this book about?

Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian).

Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name…


Book cover of Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

George Finney Why did I love this book?

This isn’t just the story of the first cyberweapon ever launched by one country against another; it’s actually two detective stories woven together.

I loved how Zetter blends the stories of the cybersecurity companies trying to figure out how it was discovered and what the cyberweapon did, together with the efforts of the International Atomic Energy Agency to track down the weird anomalies popping up in Iran’s nuclear program.

This book is a lot like The Godfather in terms of storytelling. You don’t need to know what a “Zero Day” is to get something out of it.

By Kim Zetter,

Why should I read it?

1 author picked Countdown to Zero Day as one of their favorite books, and they share why you should read it.

What is this book about?

A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. 

“Immensely enjoyable . . . Zetter turns a complicated and technical cyber story into an engrossing whodunit.”—The Washington Post
 
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm…


Ad

Book cover of Empire in the Sand

Empire in the Sand By Shane Joseph,

Avery Mann, a retired pharmaceuticals executive, is in crisis.

His wife dies of cancer, his son’s marriage is on the rocks, his grandson is having a meltdown, and his good friend is a victim of the robocalls scandal that invades the Canadian federal election. Throw in a reckless fling with…

Book cover of The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win

George Finney Why did I love this book?

This book was one of the biggest inspirations for me when I wrote my book.

Running a team of technology experts is really hard, so instead of writing a reference manual or an inspirational leadership memoir, Kim tells the story of a group of people who work together to learn the same best practices that have been in use for decades in the manufacturing and project management industries.

This hits close to home since I can recognize myself and many of my colleagues in each of the vivid characters.

By Gene Kim, Kevin Behr, George Spafford

Why should I read it?

2 authors picked The Phoenix Project as one of their favorite books, and they share why you should read it.

What is this book about?

***Over a half-million sold! And available now, the Wall Street Journal Bestselling sequel The Unicorn Project***

"Every person involved in a failed IT project should be forced to read this book."-TIM O'REILLY, Founder & CEO of O'Reilly Media

"The Phoenix Project is a must read for business and IT executives who are struggling with the growing complexity of IT."-JIM WHITEHURST, President and CEO, Red Hat, Inc.

Five years after this sleeper hit took on the world of IT and flipped it on it's head, the 5th Anniversary Edition of The Phoenix Project continues to guide IT in the DevOps revolution.…


Book cover of Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers

George Finney Why did I love this book?

Ever wondered what Russian hackers have been up to over the last few years? I found this a really sobering read, but at the same time, I loved hearing the stories of the people who work so hard to keep us safe.

Hackers are usually pretty big nerds, so it’s not really surprising that the title of this book comes from how cybercriminals embedded references to Frank Herbert’s book Dune into the code they used to carry out cyberattacks against Ukraine and other countries.

By Andy Greenberg,

Why should I read it?

2 authors picked Sandworm as one of their favorite books, and they share why you should read it.

What is this book about?

"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of Democracy

The true story of the most devastating act of cyberwarfare in history and the desperate hunt to identify and track the elite Russian agents behind it: "[A] chilling account of a Kremlin-led cyberattack, a new front in global conflict" (Financial Times).

In 2014, the world witnessed the start of a…


Ad

Book cover of American Daredevil: Comics, Communism, and the Battles of Lev Gleason

American Daredevil By Brett Dakin,

Meet Lev Gleason, a real-life comics superhero! Gleason was a titan among Golden Age comics publishers who fought back against the censorship campaigns and paranoia of the Red Scare. After dropping out of Harvard to fight in World War I in France, Gleason moved to New York City and eventually…

Book cover of Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World

George Finney Why did I love this book?

I loved this one because there are so many really influential people in the world today who started out as hackers. Former Texas Legislator and presidential candidate Beto O’Rourke was a member of one of the first hacker groups, The Cult of the Dead Cow.

What really makes this one stand out for me was how Menn was able to illustrate how our culture of cybersecurity today, things like responsible disclosure of security vulnerabilities, was shaped by the hacker ethos as a response to mega corporations actively trying to ignore the problem or even suing researchers to prevent them from talking rather than to fix the issues.

By Joseph Menn,

Why should I read it?

1 author picked Cult of the Dead Cow as one of their favorite books, and they share why you should read it.

What is this book about?

Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was for years the best technique for controlling computers from afar, forcing giant companies to work harder to protect customers. They contributed to the development of Tor, the most important privacy tool on the net, and helped build cyberweapons that advanced US security without injuring anyone. With its origins in the earliest…


Explore my book 😀

Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

By George Finney,

Book cover of Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

What is my book about?

This book is the most successful strategy for protecting yourself or your company from a cybersecurity incident. Everyone needs to understand zero trust, not just the security nerds, so this book uses a case study of a fictional company that experiences a breach and must implement zero trust to protect itself.

Everyone in IT must play a role in your zero trust journey, and this book provides a repeatable methodology for securing your data, no matter what type of technology you use. This book shows how everyone, from network engineers to system administrators, cloud architects, identity analysts, technical trainers, or help desk staff, can contribute to protecting an organization.

Book cover of The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Book cover of Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Book cover of The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win

Share your top 3 reads of 2024!

And get a beautiful page showing off your 3 favorite reads.

1,586

readers submitted
so far, will you?

Ad

📚 You might also like…

Book cover of Who Is a Worthy Mother?: An Intimate History of Adoption

Who Is a Worthy Mother? By Rebecca Wellington,

I grew up thinking that being adopted didn’t matter. I was wrong. This book is my journey uncovering the significance and true history of adoption practices in America. Now, in the wake of the U.S. Supreme Court’s overturning of Roe v. Wade, the renewed debate over women’s reproductive rights places…

Book cover of Me and The Times: My wild ride from elevator operator to New York Times editor, columnist, and change agent (1967-97)

Me and The Times By Robert W. Stock,

Me and The Times offers a fresh perspective on those pre-internet days when the Sunday sections of The New York Times shaped the country’s political and cultural conversation. Starting in 1967, Robert Stock edited seven of those sections over 30 years, innovating and troublemaking all the way.

His memoir is…

5 book lists we think you will like!

Interested in computer security, hackers, and espionage?

Hackers 16 books
Espionage 642 books