# A Child's Garden of Cybersecurity
Source URL:     https://www.darkreading.com/edge-slideshows/a-child-s-garden-of-cybersecurity
Date:           20230126T2202

Parsing with Readability failed. Original content:

![][1]![informa][2]![informa][3]

[][4]

[The Edge][5]

[DR Tech][6]

Sections

Close

Back

Sections

Featured Sections

[The Edge][5]

[Dark Reading Technology][7]

[Attacks / Breaches][8]

[Cloud][9]

[ICS/OT][10]

[Remote Workforce][11]

[Perimeter][12]

[Analytics][13]

[Security Monitoring][14]

[Security Monitoring][14]

[App Sec][15]

[Database Security][16]

[Database Security][16]

[Risk][17]

[Compliance][18]

[Compliance][18]

[Threat Intelligence][19]

[Endpoint][20]

[Authentication][21][Mobile Security][22][Privacy][23]

[Authentication][21][Mobile Security][22][Privacy][23]

[Vulnerabilities / Threats][24]

[Advanced Threats][25][Insider Threats][26][Vulnerability
Management][27]

[Advanced Threats][25][Insider Threats][26][Vulnerability
Management][27]

[Operations][28]

[Identity & Access Management][29][Careers & People][30]

[Identity & Access Management][29][Careers & People][30]

[Physical Security][31]

[IoT][32]

[Black Hat news][33]

[Omdia Research][34]

[Security Now][35]

Events

Close

Back

Events

[Events][36]

 * [Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event][37]

 * [Black Hat USA - August 5-10 - Learn More][38]

[Webinars][39]

 * [A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype][40]

Feb 01, 2023

 * [Every DDoS Resilience and Response Playbook Should Include These Things][41]

Feb 02, 2023

Resources

Close

Back

Resources

[Reports >][42]

[Slideshows >][43]

[Tech Library >][44]

[Webinars >][39]

[White Papers >][45]

[Partner Perspectives: Microsoft][46]

[Partner Perspectives: Zscaler][47]

[Newsletter][48]

[][4]

[The Edge][5]

[DR Tech][6]

Sections

Close

Back

Sections

Featured Sections

[The Edge][5]

[Dark Reading Technology][7]

[Attacks / Breaches][8]

[Cloud][9]

[ICS/OT][10]

[Remote Workforce][11]

[Perimeter][12]

[Analytics][13]

[Security Monitoring][14]

[Security Monitoring][14]

[App Sec][15]

[Database Security][16]

[Database Security][16]

[Risk][17]

[Compliance][18]

[Compliance][18]

[Threat Intelligence][19]

[Endpoint][20]

[Authentication][21][Mobile Security][22][Privacy][23]

[Authentication][21][Mobile Security][22][Privacy][23]

[Vulnerabilities / Threats][24]

[Advanced Threats][25][Insider Threats][26][Vulnerability
Management][27]

[Advanced Threats][25][Insider Threats][26][Vulnerability
Management][27]

[Operations][28]

[Identity & Access Management][29][Careers & People][30]

[Identity & Access Management][29][Careers & People][30]

[Physical Security][31]

[IoT][32]

[Black Hat news][33]

[Omdia Research][34]

[Security Now][35]

Events

Close

Back

Events

[Events][36]

 * [Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event][37]

 * [Black Hat USA - August 5-10 - Learn More][38]

[Webinars][39]

 * [A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype][40]

Feb 01, 2023

 * [Every DDoS Resilience and Response Playbook Should Include These Things][41]

Feb 02, 2023

Resources

Close

Back

Resources

[Reports >][42]

[Slideshows >][43]

[Tech Library >][44]

[Webinars >][39]

[White Papers >][45]

[Partner Perspectives: Microsoft][46]

[Partner Perspectives: Zscaler][47]

[The Edge][5]

[DR Tech][6]

Sections

Close

Back

Sections

Featured Sections

[The Edge][5]

[Dark Reading Technology][7]

[Attacks / Breaches][8]

[Cloud][9]

[ICS/OT][10]

[Remote Workforce][11]

[Perimeter][12]

[Analytics][13]

[Security Monitoring][14]

[Security Monitoring][14]

[App Sec][15]

[Database Security][16]

[Database Security][16]

[Risk][17]

[Compliance][18]

[Compliance][18]

[Threat Intelligence][19]

[Endpoint][20]

[Authentication][21][Mobile Security][22][Privacy][23]

[Authentication][21][Mobile Security][22][Privacy][23]

[Vulnerabilities / Threats][24]

[Advanced Threats][25][Insider Threats][26][Vulnerability
Management][27]

[Advanced Threats][25][Insider Threats][26][Vulnerability
Management][27]

[Operations][28]

[Identity & Access Management][29][Careers & People][30]

[Identity & Access Management][29][Careers & People][30]

[Physical Security][31]

[IoT][32]

[Black Hat news][33]

[Omdia Research][34]

[Security Now][35]

Events

Close

Back

Events

[Events][36]

 * [Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event][37]

 * [Black Hat USA - August 5-10 - Learn More][38]

[Webinars][39]

 * [A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype][40]

Feb 01, 2023

 * [Every DDoS Resilience and Response Playbook Should Include These Things][41]

Feb 02, 2023

Resources

Close

Back

Resources

[Reports >][42]

[Slideshows >][43]

[Tech Library >][44]

[Webinars >][39]

[White Papers >][45]

[Partner Perspectives: Microsoft][46]

[Partner Perspectives: Zscaler][47]

* * *

[Newsletter][48]

SEARCH

A minimum of 3 characters are required to be typed in the search bar in
order to perform a search.

Announcements

 1.   2.   3.

[Event][49]

[Emerging Cybersecurity Technologies: What You Need to Know - A Dark
Reading March 23 Virtual Event | <GET YOUR PASS>][49]

[Event][50]

[The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them |
Jan 24 Webinar | <REGISTER NOW>][50]

[Report][51]

[Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security
Risks Are Top of Mind | <READ IT NOW>][51]

PreviousNext

[][52]

Cybersecurity In-Depth

[Edge Slideshows][53]

9 MIN READ

slideshow

# A Child's Garden of Cybersecurity

Whether you dream of your child becoming a CISO or just want them to
improve their security hygiene, consider this roundup of literary
geekery.

[][54]

[Karen Spiegelman][54]

[Features Editor][54]

January 26, 2023

PDF

![A smiling boy wearing a black hoodie is reading a book at his bedroom
desk][55]

![Illustration of a cyborg-like costumed figure standing in a glowing
rift, wielding two swords][56]

![Illustration of a determined-looking Black girl wearing glasses and
holding a laptop next to a battlebot][57]

![Illustration of three friends gathered around a white girl with
glasses and brown pigtails holding a tablet wrapped in a bow][58]

![Illustration of a red-haired man with glasses gesturing at a world map
to an astonished blond boy][59]

![Illustration of a freckled child dressed up in black hoodie and pants,
carrying a sack of money and up to no good][60]

![Illustration of hero girl wielding a sword while a dragon crawls on
the rune-covered rock behind her][61]

![Illustration of two young Black boys sitting together in an otherwise
empty computer lab][62]

![Photo of Parisa Tabriz, a smiling Iranian-American woman with
shoulder-length brown hair and wearing a cardigan][63]

![Stock image style illustration of a glowing lock superimposed on rings
of data, with What Is Cybersecurity? written over it][64]

1/10



Next slide

[Edge][65][![][66]Edge Articles][67]

Keep up with the latest cybersecurity threats, newly-discovered
vulnerabilities, data breach information, and emerging trends. Delivered
daily or weekly right to your email inbox.

[Subscribe][68]

More Insights

White Papers

 * [How Machine Learning, AI & Deep Learning Improve Cybersecurity][69]
 * [State of Email Security][70]

[More White Papers][45]

Webinars

 * [A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype][40]
 * [Every DDoS Resilience and Response Playbook Should Include These Things][41]

[More Webinars][39]

Reports

 * [The Promise and Reality of Cloud Security][71]
 * [10 Hot Talks From Black Hat USA 2022][72]

[More Reports][42]

More Insights

White Papers

 * [How Machine Learning, AI & Deep Learning Improve Cybersecurity][69]
 * [State of Email Security][70]

[More White Papers][45]

Webinars

 * [A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype][40]
 * [Every DDoS Resilience and Response Playbook Should Include These Things][41]

[More Webinars][39]

Reports

 * [The Promise and Reality of Cloud Security][71]
 * [10 Hot Talks From Black Hat USA 2022][72]

[More Reports][42]

#### Discover More From Informa Tech

 * [Interop][73]
 * [InformationWeek][74]
 * [Network Computing][75]
 * [ITPro Today][76]

 * [Data Center Knowledge][77]
 * [Black Hat][78]
 * [Omdia][79]

#### Working With Us

 * [About Us][80]
 * [Advertise][81]
 * [Reprints][82]

#### Follow Dark Reading On Social

 * [][83]
 * [][84]
 * [][85]
 * [][86]
 * [][87]

 * [Home][88]
 * [Cookies][89]
 * [Privacy][90]
 * [Terms][91]

![Logo][92]

Copyright (C) 2023 Informa PLC Informa UK Limited is a company
registered in England and Wales with company number 1072954 whose
registered office is 5 Howick Place, London, SW1P 1WG.

  [1]:
  [2]: data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7
  [3]: /_next/image?url=https%3A%2F%2Fbeta.darkreading.com%2F_next%2Fstatic%2Fmedia%2Firibbon-logo.fed34d59.png&w=256&q=75
  [4]: https://www.darkreading.com/ (DR Logo New)
  [5]: https://www.darkreading.com/edge (The Edge)
  [6]: https://www.darkreading.com/dr-tech (DR Tech)
  [7]: https://www.darkreading.com/dr-tech (Dr Tech)
  [8]: https://www.darkreading.com/attacks-breaches (Attacks / Breaches)
  [9]: https://www.darkreading.com/cloud (Cloud)
  [10]: https://www.darkreading.com/ics-ot (ICS/OT)
  [11]: https://www.darkreading.com/remote-workforce (Remote Workforce)
  [12]: https://www.darkreading.com/perimeter (Perimeter)
  [13]: https://www.darkreading.com/analytics (Analytics)
  [14]: https://www.darkreading.com/security-monitoring (Security Monitoring)
  [15]: https://www.darkreading.com/application-security (App Sec)
  [16]: https://www.darkreading.com/database-security (Database Security)
  [17]: https://www.darkreading.com/risk (Risk)
  [18]: https://www.darkreading.com/compliance (Compliance)
  [19]: https://www.darkreading.com/threat-intelligence (Threat Intelligence)
  [20]: https://www.darkreading.com/endpoint (Endpoint)
  [21]: https://www.darkreading.com/authentication (Authentication)
  [22]: https://www.darkreading.com/mobile (Mobile Security)
  [23]: https://www.darkreading.com/privacy (Privacy)
  [24]: https://www.darkreading.com/vulnerabilities-threats (Vulnerabilities / Threats)
  [25]: https://www.darkreading.com/advanced-threats (Advanced Threats)
  [26]: https://www.darkreading.com/insider-threats (Insider Threats)
  [27]: https://www.darkreading.com/vulnerability-management (Vulnerability Management)
  [28]: https://www.darkreading.com/operations (Operations)
  [29]: https://www.darkreading.com/identity-and-access-management (Identity & Access Management)
  [30]: https://www.darkreading.com/careers-and-people (Careers & People)
  [31]: https://www.darkreading.com/physical-security (Physical Security)
  [32]: https://www.darkreading.com/iot (IoT)
  [33]: https://www.darkreading.com/black-hat (Black Hat news)
  [34]: https://www.darkreading.com/omdia (Omdia Research)
  [35]: https://www.darkreading.com/security-now.asp (Security Now)
  [36]: https://www.darkreading.com/upcoming-events
  [37]: https://vts.informaengage.com/dark-reading-emerging-cybersecurity-technologies-what-you-need-to-know/?kcode=sbx&cid=smartbox_techweb_session_16.500289&_mc=smartbox_techweb_session_16.500289
  [38]: https://www.blackhat.com?cid=smartbox_techweb_session_16.500287&_mc=smartbox_techweb_session_16.500287
  [39]: https://www.darkreading.com/upcoming-webinars
  [40]: https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa3553&ch=sbx&cid=smartbox_techweb_upcoming_webinars_8.500001245&_mc=smartbox_techweb_upcoming_webinars_8.500001245
  [41]: https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa3634&ch=sbx&cid=smartbox_techweb_upcoming_webinars_8.500001253&_mc=smartbox_techweb_upcoming_webinars_8.500001253
  [42]: https://www.darkreading.com/must-reads
  [43]: https://www.darkreading.com/latest/slideshow
  [44]: https://www.informationweek.com/whitepaper
  [45]: https://www.informationweek.com/whitepaper/Security
  [46]: https://www.darkreading.com/microsoft
  [47]: https://www.darkreading.com/zscaler
  [48]: https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa3135&ch=dr_header
  [49]: https://vts.informaengage.com/dark-reading-emerging-cybersecurity-technologies-what-you-need-to-know/?kcode=drsitebell (Get Your Pass)
  [50]: https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&pc=w_defa3575&ch=drsitebell (Register Today)
  [51]: https://messages.blackhat.com/2022-attendee-report-2022?kcode=drsite (<<Get The Report>>)
  [52]: https://www.darkreading.com/edge
  [53]: https://www.darkreading.com/edge-slideshows
  [54]: /author/karen-spiegelman
  [55]: https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt3cd5d145d1e89cba/63d1de47f08be34c92b69831/hoodieboy-Westend61_GmbH-alamy.jpg?quality=80&format=jpg&width=640
  [56]: https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt0a0278bdf64acd3c/63d1df8f750470662bb93b31/cynja-cover-amazon.jpg?quality=80&format=jpg&width=640
  [57]: https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt49f8c0650c12b60b/63d1e0d570e769743ff37122/jada-cover-amazon.jpg?quality=80&format=jpg&width=640
  [58]: https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt1adc5182122fac45/63d1e18dda01a5667fceef5e/alicia-cover-amazon.jpg?quality=80&format=jpg&width=640
  [59]: https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt270545f4c235b659/63d1e290e6f7256f3f52645d/threatandme-cover-amazon.jpg?quality=80&format=jpg&width=640
  [60]: https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt62f1581cc6f0efbc/63d1e345424861714c0fc2b1/littlecyber-cover-amazon.jpg?quality=80&format=jpg&width=640
  [61]: https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltb71b9f973f75622a/63d1e406a904536704daaec3/mightywarrior-cover-amazon.jpg?quality=80&format=jpg&width=640
  [62]: https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt56add2fc8f47b80f/63d1e4ccd6e4804dd0961691/cybersecurityexplorers-cover-amazon.jpg?quality=80&format=jpg&width=640
  [63]: https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt852d2847bbc3d999/63d1e58515375f67d88728ef/tabriz-cover-amazon.jpg?quality=80&format=jpg&width=640
  [64]: https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt47d4efb3fec632b7/63d1e65cf08be34c92b69835/whatis-cover-amazon.jpg?quality=80&format=jpg&width=640
  [65]: /edge
  [66]: https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltf050bd5685cd6a94/60e47c8244e9812aec444767/edge-article-icon.svg
  [67]: /edge-articles
  [68]: https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa3135&ch=dr_eoa (Subscribe)
  [69]: https://www.informationweek.com/whitepaper/cybersecurity/cloud-security/how-machine-learning,-ai-and-deep-learning-improve-cybersecurity/442433?keycode=sbx&cid=smartbox_techweb_whitepaper_14.500005229&_mc=smartbox_techweb_whitepaper_14.500005229
  [70]: https://www.informationweek.com/whitepaper/cybersecurity/security/state-of-email-security/442233?keycode=sbx&cid=smartbox_techweb_whitepaper_14.500005228&_mc=smartbox_techweb_whitepaper_14.500005228
  [71]: https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&pc=w_darl08&ch=sbx&cid=smartbox_techweb_analytics_7.300005973&_mc=smartbox_techweb_analytics_7.300005973
  [72]: https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&pc=w_defa3521&ch=sbx&cid=smartbox_techweb_analytics_7.300005970&_mc=smartbox_techweb_analytics_7.300005970
  [73]: https://www.interop.com/
  [74]: https://www.informationweek.com/
  [75]: https://www.networkcomputing.com/
  [76]: https://www.itprotoday.com/
  [77]: https://www.datacenterknowledge.com/
  [78]: https://www.blackhat.com/
  [79]: http://www.omdia.com/
  [80]: https://www.darkreading.com/about-us
  [81]: https://www.darkreading.com/advertise
  [82]: https://info.wrightsmedia.com/informa-licensing-reprints-request
  [83]: https://www.darkreading.com/rss.xml
  [84]: https://twitter.com/DarkReading
  [85]: https://www.linkedin.com/company/dark-reading/
  [86]: https://www.facebook.com/darkreadingcom
  [87]: https://news.google.com/publications/CAAqBwgKMKmknwswtq63Aw?ceid=US:en&oc=3
  [88]: https://tech.informa.com/
  [89]: https://tech.informa.com/cookie-policy
  [90]: https://tech.informa.com/privacy-policy
  [91]: https://tech.informa.com/terms-and-conditions
  [92]: https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt3edeb23396a4b5dc/60b1ea7a9afdef577986633e/Whitelogo_1.png