# A Child's Garden of Cybersecurity
Source URL:
https://www.darkreading.com/edge-slideshows/a-child-s-garden-of-cybersecurity
Date: 20230126T2202
Parsing with Readability failed. Original content:
![][1]![informa][2]![informa][3]
[][4]
[The Edge][5]
[DR Tech][6]
Sections
Close
Back
Sections
Featured Sections
[The Edge][5]
[Dark Reading Technology][7]
[Attacks / Breaches][8]
[Cloud][9]
[ICS/OT][10]
[Remote Workforce][11]
[Perimeter][12]
[Analytics][13]
[Security Monitoring][14]
[Security Monitoring][14]
[App Sec][15]
[Database Security][16]
[Database Security][16]
[Risk][17]
[Compliance][18]
[Compliance][18]
[Threat Intelligence][19]
[Endpoint][20]
[Authentication][21][Mobile Security][22][Privacy][23]
[Authentication][21][Mobile Security][22][Privacy][23]
[Vulnerabilities / Threats][24]
[Advanced Threats][25][Insider Threats][26][Vulnerability
Management][27]
[Advanced Threats][25][Insider Threats][26][Vulnerability
Management][27]
[Operations][28]
[Identity & Access Management][29][Careers & People][30]
[Identity & Access Management][29][Careers & People][30]
[Physical Security][31]
[IoT][32]
[Black Hat news][33]
[Omdia Research][34]
[Security Now][35]
Events
Close
Back
Events
[Events][36]
* [Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event][37]
* [Black Hat USA - August 5-10 - Learn More][38]
[Webinars][39]
* [A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype][40]
Feb 01, 2023
* [Every DDoS Resilience and Response Playbook Should Include These Things][41]
Feb 02, 2023
Resources
Close
Back
Resources
[Reports >][42]
[Slideshows >][43]
[Tech Library >][44]
[Webinars >][39]
[White Papers >][45]
[Partner Perspectives: Microsoft][46]
[Partner Perspectives: Zscaler][47]
[Newsletter][48]
[][4]
[The Edge][5]
[DR Tech][6]
Sections
Close
Back
Sections
Featured Sections
[The Edge][5]
[Dark Reading Technology][7]
[Attacks / Breaches][8]
[Cloud][9]
[ICS/OT][10]
[Remote Workforce][11]
[Perimeter][12]
[Analytics][13]
[Security Monitoring][14]
[Security Monitoring][14]
[App Sec][15]
[Database Security][16]
[Database Security][16]
[Risk][17]
[Compliance][18]
[Compliance][18]
[Threat Intelligence][19]
[Endpoint][20]
[Authentication][21][Mobile Security][22][Privacy][23]
[Authentication][21][Mobile Security][22][Privacy][23]
[Vulnerabilities / Threats][24]
[Advanced Threats][25][Insider Threats][26][Vulnerability
Management][27]
[Advanced Threats][25][Insider Threats][26][Vulnerability
Management][27]
[Operations][28]
[Identity & Access Management][29][Careers & People][30]
[Identity & Access Management][29][Careers & People][30]
[Physical Security][31]
[IoT][32]
[Black Hat news][33]
[Omdia Research][34]
[Security Now][35]
Events
Close
Back
Events
[Events][36]
* [Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event][37]
* [Black Hat USA - August 5-10 - Learn More][38]
[Webinars][39]
* [A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype][40]
Feb 01, 2023
* [Every DDoS Resilience and Response Playbook Should Include These Things][41]
Feb 02, 2023
Resources
Close
Back
Resources
[Reports >][42]
[Slideshows >][43]
[Tech Library >][44]
[Webinars >][39]
[White Papers >][45]
[Partner Perspectives: Microsoft][46]
[Partner Perspectives: Zscaler][47]
[The Edge][5]
[DR Tech][6]
Sections
Close
Back
Sections
Featured Sections
[The Edge][5]
[Dark Reading Technology][7]
[Attacks / Breaches][8]
[Cloud][9]
[ICS/OT][10]
[Remote Workforce][11]
[Perimeter][12]
[Analytics][13]
[Security Monitoring][14]
[Security Monitoring][14]
[App Sec][15]
[Database Security][16]
[Database Security][16]
[Risk][17]
[Compliance][18]
[Compliance][18]
[Threat Intelligence][19]
[Endpoint][20]
[Authentication][21][Mobile Security][22][Privacy][23]
[Authentication][21][Mobile Security][22][Privacy][23]
[Vulnerabilities / Threats][24]
[Advanced Threats][25][Insider Threats][26][Vulnerability
Management][27]
[Advanced Threats][25][Insider Threats][26][Vulnerability
Management][27]
[Operations][28]
[Identity & Access Management][29][Careers & People][30]
[Identity & Access Management][29][Careers & People][30]
[Physical Security][31]
[IoT][32]
[Black Hat news][33]
[Omdia Research][34]
[Security Now][35]
Events
Close
Back
Events
[Events][36]
* [Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event][37]
* [Black Hat USA - August 5-10 - Learn More][38]
[Webinars][39]
* [A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype][40]
Feb 01, 2023
* [Every DDoS Resilience and Response Playbook Should Include These Things][41]
Feb 02, 2023
Resources
Close
Back
Resources
[Reports >][42]
[Slideshows >][43]
[Tech Library >][44]
[Webinars >][39]
[White Papers >][45]
[Partner Perspectives: Microsoft][46]
[Partner Perspectives: Zscaler][47]
* * *
[Newsletter][48]
SEARCH
A minimum of 3 characters are required to be typed in the search bar in
order to perform a search.
Announcements
1. 2. 3.
[Event][49]
[Emerging Cybersecurity Technologies: What You Need to Know - A Dark
Reading March 23 Virtual Event | <GET YOUR PASS>][49]
[Event][50]
[The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them |
Jan 24 Webinar | <REGISTER NOW>][50]
[Report][51]
[Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security
Risks Are Top of Mind | <READ IT NOW>][51]
PreviousNext
[][52]
Cybersecurity In-Depth
[Edge Slideshows][53]
9 MIN READ
slideshow
# A Child's Garden of Cybersecurity
Whether you dream of your child becoming a CISO or just want them to
improve their security hygiene, consider this roundup of literary
geekery.
[][54]
[Karen Spiegelman][54]
[Features Editor][54]
January 26, 2023
PDF
![A smiling boy wearing a black hoodie is reading a book at his bedroom
desk][55]
![Illustration of a cyborg-like costumed figure standing in a glowing
rift, wielding two swords][56]
![Illustration of a determined-looking Black girl wearing glasses and
holding a laptop next to a battlebot][57]
![Illustration of three friends gathered around a white girl with
glasses and brown pigtails holding a tablet wrapped in a bow][58]
![Illustration of a red-haired man with glasses gesturing at a world map
to an astonished blond boy][59]
![Illustration of a freckled child dressed up in black hoodie and pants,
carrying a sack of money and up to no good][60]
![Illustration of hero girl wielding a sword while a dragon crawls on
the rune-covered rock behind her][61]
![Illustration of two young Black boys sitting together in an otherwise
empty computer lab][62]
![Photo of Parisa Tabriz, a smiling Iranian-American woman with
shoulder-length brown hair and wearing a cardigan][63]
![Stock image style illustration of a glowing lock superimposed on rings
of data, with What Is Cybersecurity? written over it][64]
1/10
Next slide
[Edge][65][![][66]Edge Articles][67]
Keep up with the latest cybersecurity threats, newly-discovered
vulnerabilities, data breach information, and emerging trends. Delivered
daily or weekly right to your email inbox.
[Subscribe][68]
More Insights
White Papers
* [How Machine Learning, AI & Deep Learning Improve Cybersecurity][69]
* [State of Email Security][70]
[More White Papers][45]
Webinars
* [A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype][40]
* [Every DDoS Resilience and Response Playbook Should Include These Things][41]
[More Webinars][39]
Reports
* [The Promise and Reality of Cloud Security][71]
* [10 Hot Talks From Black Hat USA 2022][72]
[More Reports][42]
More Insights
White Papers
* [How Machine Learning, AI & Deep Learning Improve Cybersecurity][69]
* [State of Email Security][70]
[More White Papers][45]
Webinars
* [A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype][40]
* [Every DDoS Resilience and Response Playbook Should Include These Things][41]
[More Webinars][39]
Reports
* [The Promise and Reality of Cloud Security][71]
* [10 Hot Talks From Black Hat USA 2022][72]
[More Reports][42]
#### Discover More From Informa Tech
* [Interop][73]
* [InformationWeek][74]
* [Network Computing][75]
* [ITPro Today][76]
* [Data Center Knowledge][77]
* [Black Hat][78]
* [Omdia][79]
#### Working With Us
* [About Us][80]
* [Advertise][81]
* [Reprints][82]
#### Follow Dark Reading On Social
* [][83]
* [][84]
* [][85]
* [][86]
* [][87]
* [Home][88]
* [Cookies][89]
* [Privacy][90]
* [Terms][91]
![Logo][92]
Copyright (C) 2023 Informa PLC Informa UK Limited is a company
registered in England and Wales with company number 1072954 whose
registered office is 5 Howick Place, London, SW1P 1WG.
[1]:
[2]: data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7
[3]: /_next/image?url=https%3A%2F%2Fbeta.darkreading.com%2F_next%2Fstatic%2Fmedia%2Firibbon-logo.fed34d59.png&w=256&q=75
[4]:
https://www.darkreading.com/ (DR Logo New)
[5]:
https://www.darkreading.com/edge (The Edge)
[6]:
https://www.darkreading.com/dr-tech (DR Tech)
[7]:
https://www.darkreading.com/dr-tech (Dr Tech)
[8]:
https://www.darkreading.com/attacks-breaches (Attacks / Breaches)
[9]:
https://www.darkreading.com/cloud (Cloud)
[10]:
https://www.darkreading.com/ics-ot (ICS/OT)
[11]:
https://www.darkreading.com/remote-workforce (Remote Workforce)
[12]:
https://www.darkreading.com/perimeter (Perimeter)
[13]:
https://www.darkreading.com/analytics (Analytics)
[14]:
https://www.darkreading.com/security-monitoring (Security Monitoring)
[15]:
https://www.darkreading.com/application-security (App Sec)
[16]:
https://www.darkreading.com/database-security (Database Security)
[17]:
https://www.darkreading.com/risk (Risk)
[18]:
https://www.darkreading.com/compliance (Compliance)
[19]:
https://www.darkreading.com/threat-intelligence (Threat Intelligence)
[20]:
https://www.darkreading.com/endpoint (Endpoint)
[21]:
https://www.darkreading.com/authentication (Authentication)
[22]:
https://www.darkreading.com/mobile (Mobile Security)
[23]:
https://www.darkreading.com/privacy (Privacy)
[24]:
https://www.darkreading.com/vulnerabilities-threats (Vulnerabilities / Threats)
[25]:
https://www.darkreading.com/advanced-threats (Advanced Threats)
[26]:
https://www.darkreading.com/insider-threats (Insider Threats)
[27]:
https://www.darkreading.com/vulnerability-management (Vulnerability Management)
[28]:
https://www.darkreading.com/operations (Operations)
[29]:
https://www.darkreading.com/identity-and-access-management (Identity & Access Management)
[30]:
https://www.darkreading.com/careers-and-people (Careers & People)
[31]:
https://www.darkreading.com/physical-security (Physical Security)
[32]:
https://www.darkreading.com/iot (IoT)
[33]:
https://www.darkreading.com/black-hat (Black Hat news)
[34]:
https://www.darkreading.com/omdia (Omdia Research)
[35]:
https://www.darkreading.com/security-now.asp (Security Now)
[36]:
https://www.darkreading.com/upcoming-events
[37]:
https://vts.informaengage.com/dark-reading-emerging-cybersecurity-technologies-what-you-need-to-know/?kcode=sbx&cid=smartbox_techweb_session_16.500289&_mc=smartbox_techweb_session_16.500289
[38]:
https://www.blackhat.com?cid=smartbox_techweb_session_16.500287&_mc=smartbox_techweb_session_16.500287
[39]:
https://www.darkreading.com/upcoming-webinars
[40]:
https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa3553&ch=sbx&cid=smartbox_techweb_upcoming_webinars_8.500001245&_mc=smartbox_techweb_upcoming_webinars_8.500001245
[41]:
https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa3634&ch=sbx&cid=smartbox_techweb_upcoming_webinars_8.500001253&_mc=smartbox_techweb_upcoming_webinars_8.500001253
[42]:
https://www.darkreading.com/must-reads
[43]:
https://www.darkreading.com/latest/slideshow
[44]:
https://www.informationweek.com/whitepaper
[45]:
https://www.informationweek.com/whitepaper/Security
[46]:
https://www.darkreading.com/microsoft
[47]:
https://www.darkreading.com/zscaler
[48]:
https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa3135&ch=dr_header
[49]:
https://vts.informaengage.com/dark-reading-emerging-cybersecurity-technologies-what-you-need-to-know/?kcode=drsitebell (Get Your Pass)
[50]:
https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&pc=w_defa3575&ch=drsitebell (Register Today)
[51]:
https://messages.blackhat.com/2022-attendee-report-2022?kcode=drsite (<<Get The Report>>)
[52]:
https://www.darkreading.com/edge
[53]:
https://www.darkreading.com/edge-slideshows
[54]: /author/karen-spiegelman
[55]:
https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt3cd5d145d1e89cba/63d1de47f08be34c92b69831/hoodieboy-Westend61_GmbH-alamy.jpg?quality=80&format=jpg&width=640
[56]:
https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt0a0278bdf64acd3c/63d1df8f750470662bb93b31/cynja-cover-amazon.jpg?quality=80&format=jpg&width=640
[57]:
https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt49f8c0650c12b60b/63d1e0d570e769743ff37122/jada-cover-amazon.jpg?quality=80&format=jpg&width=640
[58]:
https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt1adc5182122fac45/63d1e18dda01a5667fceef5e/alicia-cover-amazon.jpg?quality=80&format=jpg&width=640
[59]:
https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt270545f4c235b659/63d1e290e6f7256f3f52645d/threatandme-cover-amazon.jpg?quality=80&format=jpg&width=640
[60]:
https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt62f1581cc6f0efbc/63d1e345424861714c0fc2b1/littlecyber-cover-amazon.jpg?quality=80&format=jpg&width=640
[61]:
https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltb71b9f973f75622a/63d1e406a904536704daaec3/mightywarrior-cover-amazon.jpg?quality=80&format=jpg&width=640
[62]:
https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt56add2fc8f47b80f/63d1e4ccd6e4804dd0961691/cybersecurityexplorers-cover-amazon.jpg?quality=80&format=jpg&width=640
[63]:
https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt852d2847bbc3d999/63d1e58515375f67d88728ef/tabriz-cover-amazon.jpg?quality=80&format=jpg&width=640
[64]:
https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt47d4efb3fec632b7/63d1e65cf08be34c92b69835/whatis-cover-amazon.jpg?quality=80&format=jpg&width=640
[65]: /edge
[66]:
https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltf050bd5685cd6a94/60e47c8244e9812aec444767/edge-article-icon.svg
[67]: /edge-articles
[68]:
https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa3135&ch=dr_eoa (Subscribe)
[69]:
https://www.informationweek.com/whitepaper/cybersecurity/cloud-security/how-machine-learning,-ai-and-deep-learning-improve-cybersecurity/442433?keycode=sbx&cid=smartbox_techweb_whitepaper_14.500005229&_mc=smartbox_techweb_whitepaper_14.500005229
[70]:
https://www.informationweek.com/whitepaper/cybersecurity/security/state-of-email-security/442233?keycode=sbx&cid=smartbox_techweb_whitepaper_14.500005228&_mc=smartbox_techweb_whitepaper_14.500005228
[71]:
https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&pc=w_darl08&ch=sbx&cid=smartbox_techweb_analytics_7.300005973&_mc=smartbox_techweb_analytics_7.300005973
[72]:
https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&pc=w_defa3521&ch=sbx&cid=smartbox_techweb_analytics_7.300005970&_mc=smartbox_techweb_analytics_7.300005970
[73]:
https://www.interop.com/
[74]:
https://www.informationweek.com/
[75]:
https://www.networkcomputing.com/
[76]:
https://www.itprotoday.com/
[77]:
https://www.datacenterknowledge.com/
[78]:
https://www.blackhat.com/
[79]:
http://www.omdia.com/
[80]:
https://www.darkreading.com/about-us
[81]:
https://www.darkreading.com/advertise
[82]:
https://info.wrightsmedia.com/informa-licensing-reprints-request
[83]:
https://www.darkreading.com/rss.xml
[84]:
https://twitter.com/DarkReading
[85]:
https://www.linkedin.com/company/dark-reading/
[86]:
https://www.facebook.com/darkreadingcom
[87]:
https://news.google.com/publications/CAAqBwgKMKmknwswtq63Aw?ceid=US:en&oc=3
[88]:
https://tech.informa.com/
[89]:
https://tech.informa.com/cookie-policy
[90]:
https://tech.informa.com/privacy-policy
[91]:
https://tech.informa.com/terms-and-conditions
[92]:
https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt3edeb23396a4b5dc/60b1ea7a9afdef577986633e/Whitelogo_1.png