# A Child's Garden of Cybersecurity Source URL: https://www.darkreading.com/edge-slideshows/a-child-s-garden-of-cybersecurity Date: 20230126T2202 Parsing with Readability failed. Original content: ![][1]![informa][2]![informa][3] [][4] [The Edge][5] [DR Tech][6] Sections Close Back Sections Featured Sections [The Edge][5] [Dark Reading Technology][7] [Attacks / Breaches][8] [Cloud][9] [ICS/OT][10] [Remote Workforce][11] [Perimeter][12] [Analytics][13] [Security Monitoring][14] [Security Monitoring][14] [App Sec][15] [Database Security][16] [Database Security][16] [Risk][17] [Compliance][18] [Compliance][18] [Threat Intelligence][19] [Endpoint][20] [Authentication][21][Mobile Security][22][Privacy][23] [Authentication][21][Mobile Security][22][Privacy][23] [Vulnerabilities / Threats][24] [Advanced Threats][25][Insider Threats][26][Vulnerability Management][27] [Advanced Threats][25][Insider Threats][26][Vulnerability Management][27] [Operations][28] [Identity & Access Management][29][Careers & People][30] [Identity & Access Management][29][Careers & People][30] [Physical Security][31] [IoT][32] [Black Hat news][33] [Omdia Research][34] [Security Now][35] Events Close Back Events [Events][36] * [Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event][37] * [Black Hat USA - August 5-10 - Learn More][38] [Webinars][39] * [A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype][40] Feb 01, 2023 * [Every DDoS Resilience and Response Playbook Should Include These Things][41] Feb 02, 2023 Resources Close Back Resources [Reports >][42] [Slideshows >][43] [Tech Library >][44] [Webinars >][39] [White Papers >][45] [Partner Perspectives: Microsoft][46] [Partner Perspectives: Zscaler][47] [Newsletter][48] [][4] [The Edge][5] [DR Tech][6] Sections Close Back Sections Featured Sections [The Edge][5] [Dark Reading Technology][7] [Attacks / Breaches][8] [Cloud][9] [ICS/OT][10] [Remote Workforce][11] [Perimeter][12] [Analytics][13] [Security Monitoring][14] [Security Monitoring][14] [App Sec][15] [Database Security][16] [Database Security][16] [Risk][17] [Compliance][18] [Compliance][18] [Threat Intelligence][19] [Endpoint][20] [Authentication][21][Mobile Security][22][Privacy][23] [Authentication][21][Mobile Security][22][Privacy][23] [Vulnerabilities / Threats][24] [Advanced Threats][25][Insider Threats][26][Vulnerability Management][27] [Advanced Threats][25][Insider Threats][26][Vulnerability Management][27] [Operations][28] [Identity & Access Management][29][Careers & People][30] [Identity & Access Management][29][Careers & People][30] [Physical Security][31] [IoT][32] [Black Hat news][33] [Omdia Research][34] [Security Now][35] Events Close Back Events [Events][36] * [Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event][37] * [Black Hat USA - August 5-10 - Learn More][38] [Webinars][39] * [A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype][40] Feb 01, 2023 * [Every DDoS Resilience and Response Playbook Should Include These Things][41] Feb 02, 2023 Resources Close Back Resources [Reports >][42] [Slideshows >][43] [Tech Library >][44] [Webinars >][39] [White Papers >][45] [Partner Perspectives: Microsoft][46] [Partner Perspectives: Zscaler][47] [The Edge][5] [DR Tech][6] Sections Close Back Sections Featured Sections [The Edge][5] [Dark Reading Technology][7] [Attacks / Breaches][8] [Cloud][9] [ICS/OT][10] [Remote Workforce][11] [Perimeter][12] [Analytics][13] [Security Monitoring][14] [Security Monitoring][14] [App Sec][15] [Database Security][16] [Database Security][16] [Risk][17] [Compliance][18] [Compliance][18] [Threat Intelligence][19] [Endpoint][20] [Authentication][21][Mobile Security][22][Privacy][23] [Authentication][21][Mobile Security][22][Privacy][23] [Vulnerabilities / Threats][24] [Advanced Threats][25][Insider Threats][26][Vulnerability Management][27] [Advanced Threats][25][Insider Threats][26][Vulnerability Management][27] [Operations][28] [Identity & Access Management][29][Careers & People][30] [Identity & Access Management][29][Careers & People][30] [Physical Security][31] [IoT][32] [Black Hat news][33] [Omdia Research][34] [Security Now][35] Events Close Back Events [Events][36] * [Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event][37] * [Black Hat USA - August 5-10 - Learn More][38] [Webinars][39] * [A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype][40] Feb 01, 2023 * [Every DDoS Resilience and Response Playbook Should Include These Things][41] Feb 02, 2023 Resources Close Back Resources [Reports >][42] [Slideshows >][43] [Tech Library >][44] [Webinars >][39] [White Papers >][45] [Partner Perspectives: Microsoft][46] [Partner Perspectives: Zscaler][47] * * * [Newsletter][48] SEARCH A minimum of 3 characters are required to be typed in the search bar in order to perform a search. Announcements 1. 2. 3. [Event][49] [Emerging Cybersecurity Technologies: What You Need to Know - A Dark Reading March 23 Virtual Event | ][49] [Event][50] [The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them | Jan 24 Webinar | ][50] [Report][51] [Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | ][51] PreviousNext [][52] Cybersecurity In-Depth [Edge Slideshows][53] 9 MIN READ slideshow # A Child's Garden of Cybersecurity Whether you dream of your child becoming a CISO or just want them to improve their security hygiene, consider this roundup of literary geekery. [][54] [Karen Spiegelman][54] [Features Editor][54] January 26, 2023 PDF ![A smiling boy wearing a black hoodie is reading a book at his bedroom desk][55] ![Illustration of a cyborg-like costumed figure standing in a glowing rift, wielding two swords][56] ![Illustration of a determined-looking Black girl wearing glasses and holding a laptop next to a battlebot][57] ![Illustration of three friends gathered around a white girl with glasses and brown pigtails holding a tablet wrapped in a bow][58] ![Illustration of a red-haired man with glasses gesturing at a world map to an astonished blond boy][59] ![Illustration of a freckled child dressed up in black hoodie and pants, carrying a sack of money and up to no good][60] ![Illustration of hero girl wielding a sword while a dragon crawls on the rune-covered rock behind her][61] ![Illustration of two young Black boys sitting together in an otherwise empty computer lab][62] ![Photo of Parisa Tabriz, a smiling Iranian-American woman with shoulder-length brown hair and wearing a cardigan][63] ![Stock image style illustration of a glowing lock superimposed on rings of data, with What Is Cybersecurity? written over it][64] 1/10 Next slide [Edge][65][![][66]Edge Articles][67] Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. [Subscribe][68] More Insights White Papers * [How Machine Learning, AI & Deep Learning Improve Cybersecurity][69] * [State of Email Security][70] [More White Papers][45] Webinars * [A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype][40] * [Every DDoS Resilience and Response Playbook Should Include These Things][41] [More Webinars][39] Reports * [The Promise and Reality of Cloud Security][71] * [10 Hot Talks From Black Hat USA 2022][72] [More Reports][42] More Insights White Papers * [How Machine Learning, AI & Deep Learning Improve Cybersecurity][69] * [State of Email Security][70] [More White Papers][45] Webinars * [A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype][40] * [Every DDoS Resilience and Response Playbook Should Include These Things][41] [More Webinars][39] Reports * [The Promise and Reality of Cloud Security][71] * [10 Hot Talks From Black Hat USA 2022][72] [More Reports][42] #### Discover More From Informa Tech * [Interop][73] * [InformationWeek][74] * [Network Computing][75] * [ITPro Today][76] * [Data Center Knowledge][77] * [Black Hat][78] * [Omdia][79] #### Working With Us * [About Us][80] * [Advertise][81] * [Reprints][82] #### Follow Dark Reading On Social * [][83] * [][84] * [][85] * [][86] * [][87] * [Home][88] * [Cookies][89] * [Privacy][90] * [Terms][91] ![Logo][92] Copyright (C) 2023 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG. [1]: [2]: data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7 [3]: /_next/image?url=https%3A%2F%2Fbeta.darkreading.com%2F_next%2Fstatic%2Fmedia%2Firibbon-logo.fed34d59.png&w=256&q=75 [4]: https://www.darkreading.com/ (DR Logo New) [5]: https://www.darkreading.com/edge (The Edge) [6]: https://www.darkreading.com/dr-tech (DR Tech) [7]: https://www.darkreading.com/dr-tech (Dr Tech) [8]: https://www.darkreading.com/attacks-breaches (Attacks / Breaches) [9]: https://www.darkreading.com/cloud (Cloud) [10]: https://www.darkreading.com/ics-ot (ICS/OT) [11]: https://www.darkreading.com/remote-workforce (Remote Workforce) [12]: https://www.darkreading.com/perimeter (Perimeter) [13]: https://www.darkreading.com/analytics (Analytics) [14]: https://www.darkreading.com/security-monitoring (Security Monitoring) [15]: https://www.darkreading.com/application-security (App Sec) [16]: https://www.darkreading.com/database-security (Database Security) [17]: https://www.darkreading.com/risk (Risk) [18]: https://www.darkreading.com/compliance (Compliance) [19]: https://www.darkreading.com/threat-intelligence (Threat Intelligence) [20]: https://www.darkreading.com/endpoint (Endpoint) [21]: https://www.darkreading.com/authentication (Authentication) [22]: https://www.darkreading.com/mobile (Mobile Security) [23]: https://www.darkreading.com/privacy (Privacy) [24]: https://www.darkreading.com/vulnerabilities-threats (Vulnerabilities / Threats) [25]: https://www.darkreading.com/advanced-threats (Advanced Threats) [26]: https://www.darkreading.com/insider-threats (Insider Threats) [27]: https://www.darkreading.com/vulnerability-management (Vulnerability Management) [28]: https://www.darkreading.com/operations (Operations) [29]: https://www.darkreading.com/identity-and-access-management (Identity & Access Management) [30]: https://www.darkreading.com/careers-and-people (Careers & People) [31]: https://www.darkreading.com/physical-security (Physical Security) [32]: https://www.darkreading.com/iot (IoT) [33]: https://www.darkreading.com/black-hat (Black Hat news) [34]: https://www.darkreading.com/omdia (Omdia Research) [35]: https://www.darkreading.com/security-now.asp (Security Now) [36]: https://www.darkreading.com/upcoming-events [37]: https://vts.informaengage.com/dark-reading-emerging-cybersecurity-technologies-what-you-need-to-know/?kcode=sbx&cid=smartbox_techweb_session_16.500289&_mc=smartbox_techweb_session_16.500289 [38]: https://www.blackhat.com?cid=smartbox_techweb_session_16.500287&_mc=smartbox_techweb_session_16.500287 [39]: https://www.darkreading.com/upcoming-webinars [40]: https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa3553&ch=sbx&cid=smartbox_techweb_upcoming_webinars_8.500001245&_mc=smartbox_techweb_upcoming_webinars_8.500001245 [41]: https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa3634&ch=sbx&cid=smartbox_techweb_upcoming_webinars_8.500001253&_mc=smartbox_techweb_upcoming_webinars_8.500001253 [42]: https://www.darkreading.com/must-reads [43]: https://www.darkreading.com/latest/slideshow [44]: https://www.informationweek.com/whitepaper [45]: https://www.informationweek.com/whitepaper/Security [46]: https://www.darkreading.com/microsoft [47]: https://www.darkreading.com/zscaler [48]: https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa3135&ch=dr_header [49]: https://vts.informaengage.com/dark-reading-emerging-cybersecurity-technologies-what-you-need-to-know/?kcode=drsitebell (Get Your Pass) [50]: https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&pc=w_defa3575&ch=drsitebell (Register Today) [51]: https://messages.blackhat.com/2022-attendee-report-2022?kcode=drsite (<>) [52]: https://www.darkreading.com/edge [53]: https://www.darkreading.com/edge-slideshows [54]: /author/karen-spiegelman [55]: https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt3cd5d145d1e89cba/63d1de47f08be34c92b69831/hoodieboy-Westend61_GmbH-alamy.jpg?quality=80&format=jpg&width=640 [56]: https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt0a0278bdf64acd3c/63d1df8f750470662bb93b31/cynja-cover-amazon.jpg?quality=80&format=jpg&width=640 [57]: https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt49f8c0650c12b60b/63d1e0d570e769743ff37122/jada-cover-amazon.jpg?quality=80&format=jpg&width=640 [58]: https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt1adc5182122fac45/63d1e18dda01a5667fceef5e/alicia-cover-amazon.jpg?quality=80&format=jpg&width=640 [59]: https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt270545f4c235b659/63d1e290e6f7256f3f52645d/threatandme-cover-amazon.jpg?quality=80&format=jpg&width=640 [60]: https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt62f1581cc6f0efbc/63d1e345424861714c0fc2b1/littlecyber-cover-amazon.jpg?quality=80&format=jpg&width=640 [61]: https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltb71b9f973f75622a/63d1e406a904536704daaec3/mightywarrior-cover-amazon.jpg?quality=80&format=jpg&width=640 [62]: https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt56add2fc8f47b80f/63d1e4ccd6e4804dd0961691/cybersecurityexplorers-cover-amazon.jpg?quality=80&format=jpg&width=640 [63]: https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt852d2847bbc3d999/63d1e58515375f67d88728ef/tabriz-cover-amazon.jpg?quality=80&format=jpg&width=640 [64]: https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt47d4efb3fec632b7/63d1e65cf08be34c92b69835/whatis-cover-amazon.jpg?quality=80&format=jpg&width=640 [65]: /edge [66]: https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltf050bd5685cd6a94/60e47c8244e9812aec444767/edge-article-icon.svg [67]: /edge-articles [68]: https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa3135&ch=dr_eoa (Subscribe) [69]: https://www.informationweek.com/whitepaper/cybersecurity/cloud-security/how-machine-learning,-ai-and-deep-learning-improve-cybersecurity/442433?keycode=sbx&cid=smartbox_techweb_whitepaper_14.500005229&_mc=smartbox_techweb_whitepaper_14.500005229 [70]: https://www.informationweek.com/whitepaper/cybersecurity/security/state-of-email-security/442233?keycode=sbx&cid=smartbox_techweb_whitepaper_14.500005228&_mc=smartbox_techweb_whitepaper_14.500005228 [71]: https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&pc=w_darl08&ch=sbx&cid=smartbox_techweb_analytics_7.300005973&_mc=smartbox_techweb_analytics_7.300005973 [72]: https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&pc=w_defa3521&ch=sbx&cid=smartbox_techweb_analytics_7.300005970&_mc=smartbox_techweb_analytics_7.300005970 [73]: https://www.interop.com/ [74]: https://www.informationweek.com/ [75]: https://www.networkcomputing.com/ [76]: https://www.itprotoday.com/ [77]: https://www.datacenterknowledge.com/ [78]: https://www.blackhat.com/ [79]: http://www.omdia.com/ [80]: https://www.darkreading.com/about-us [81]: https://www.darkreading.com/advertise [82]: https://info.wrightsmedia.com/informa-licensing-reprints-request [83]: https://www.darkreading.com/rss.xml [84]: https://twitter.com/DarkReading [85]: https://www.linkedin.com/company/dark-reading/ [86]: https://www.facebook.com/darkreadingcom [87]: https://news.google.com/publications/CAAqBwgKMKmknwswtq63Aw?ceid=US:en&oc=3 [88]: https://tech.informa.com/ [89]: https://tech.informa.com/cookie-policy [90]: https://tech.informa.com/privacy-policy [91]: https://tech.informa.com/terms-and-conditions [92]: https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt3edeb23396a4b5dc/60b1ea7a9afdef577986633e/Whitelogo_1.png