Center for Information Security Research and Education
1. SiteLock Blog – The blog features a continuously growing collection of articles that discuss malware, web security and other cybersecurity best practices. Our content can help general web users, web students and small businesses owners. Popular blog content includes Phishing Attacks and How to Counter Them, Types of Cybersecurity Threats and Breaking Into Website Security as a Career.
2. Naked Security – Naked Security is Sophos' award winning blog. Authors include Lisa Vaas, Paul Ducklin, Lee Munson – who will be featured again later on – and John Zorabedian. This is one of the biggest blogs in this list with around 1.5 million pageviews per month. Recent posts cover: '5 excuses for doing nothing about computer security!', 'Microsoft pulls Patch Tuesday Kernel update – MS14-045-can cause Blue Screen of Death' and 'Do Not Track – the privacy standard that's melting away'.
3. Graham Cluley – Graham Cluley has been working in the security industry since the early 1990s and has been employed by companies including Sophos and McAfee. His blog has won numerous awards such as 'Best IT Security Blog', 'Most Educational Blog' and 'Best Corporate Security Blog'. Recent posts have included: 'Chrome web browser toughens up, blocking "deceptive" downloads', 'Secret app takes mere minutes to hack, revealing anyone's secret via simple vulnerability' and 'Online gaming data breach affects millions in South Korea'.
4. ShackF00 – Dave Shackleford is Founder of Voodoo Security, and a self described security geek. Dave's interests lie in Malware, Virtualization security, intrusion detection, and penetration testing and vulnerability Assessment. His recent posts have included: 'Infosec Monogamy', 'A Hacker Looks at 40.', and '"Back to Basics": What does this mean?'.
5. Matt Suiche – Matt Suiche is the Founder & Managing Director of MoonSols Ltd and is also Microsoft's Most Valuable Professional (MVP) for Enterprise Security since 2009. Matt's blog covers topics like: 'U.S. / France cyber-security budget', 'La French Tech : Cyber-Security – Where is the money?' and 'Hives & Trust issues'.
6. IT Security Expert Blog – Dave Whitelegg's blog provides his views on Cyber, Information & IT Security with a focus on Hacking, DDoS, Botnets, Malware, Identity Theft, Data Protection (DPA) and regulatory compliance. Recent posts have looked at: 'Xbox One & PS4 Gamer Security', 'Forget Windows XP, Does Unsupported Java pose a Greater Risk to the Enterprise?' and 'A developer's guide to complying with PCI DSS 3.0 Requirement 6'.
7. A Few Thoughts on Cryptographic Engineering – Matthew Green is a cryptographer and research professor at Johns Hopkins University. While his blog covers cryptography, his recent posts have looked at: 'What's the matter with PGP?', 'Attack of the Week: Triple Handshakes (3Shake)' and' Noodling about IM protocols'.
8. troyhunt.com – Troy Hunt is a Software Architect and Microsoft MVP who writes about security concepts and process improvement in software delivery within his blog. His recent posts have included: 'InfoSec Insanity: Sharing the crazy for the betterment of online security', 'Migrating from Subversion to Git with svn2git on Windows (the tricky bits explained)' and 'Moving from GoDaddy to DNSimple – an illustrated journey'.
9. Threatpost – Threatpost is Kaspersky Lab's independently run security news service. Its award-winning editorial team produces content including security news and feature reports. Threatpost's global editorial activities are driven by veteran security journalist Dennis Fisher who has a decade of experience reporting on security industry news and issues. He is assisted by Christopher Brook and Brian Donohue. Recent posts include: '50 Security Flaws Fixed in Google Chrome', 'Bitcoin Phishing Campaign Targets 400 Organizations' and 'Adobe Patches Reader Zero Day Used in Targeted Attacks'.
10. ImperialViolet – Adam Langley is a senior software engineer at Google. Some of the recent posts on his blog have included 'HSTS For New TLDs', 'Encrypting Streams' and 'BoringSSL'.
11. Kroll Call Blog – Kroll's blog is authored by the Kroll team and covers a diverse array of industry content. Recent posts have included: 'Ransomware Removal: 6 Tips to Get Your Data Back', 'Effective cybercrime prevention: Don't meet your troubles half-way' and 'Cyber Extortion: Consider How Your Cyber Insurance Policy Can Help You Respond'.
12. Errata Security – The Errata security blog is run by Robert Graham who is a well known security researcher or 'white-hat' hacker. Recent posts have looked at: 'Cliché: open-source is secure', 'Masscan does STARTTLS' and 'That Apache 0day was troll'.
13. Shell is Only The Beginning – Carlos Perez or 'Darkoperator' is a Director of Reverse Engineering for a security vendor. He has previously worked for the likes of Compaq, HP and Microsoft. His main area of interest is post exploitation, which explains the name of his blog. Recent posts have looked at: 'PowerShell Tip: Validating IP Address as a Parameter', 'Sysinternals New Tool Sysmon (System Monitor)' and 'PowerShell Tip: Working with Systme.Enum'.
14. TrustedSec – TrustedSec was founded by Dave Kennedy who is considered a thought leader in the security field. The TrustedSec blog covers topics like: 'The eBay Breach – Woa! What response?', 'Microsoft to fix two major attack methods for hackers' and 'CHS Hacked via Heartbleed Vulnerability'.
15. BH Consulting's Security Watch Blog – Lee Munson – who we mentioned earlier—is in charge of BH Consulting's blog. While Lee is self educated, he has gained a unique insight into security through his work and research. The Security Watch Blog is one of the most regularly updated blogs on this list with a new post published every couple of days. Recent posts on this blog have included 'The Data Breach – It's More When Rather Than If', 'Convenience Trumps Security For The Average Consumer' and 'Trading Privacy For Security In the Job Market'.
16. Security-FAQs – Lee Also has his own blog, where he has published posts including 'Infosec and Diversity', 'SSL – Should Your Website Use It?' and 'Heartbleed Research Show Top Companies Are Slow to Mitigate'.
17. Securosis Blog – The Securosis blog is authored by Rich Mogull, Mike Rothman and Adrian Lane, all of whom have around 20 years of experience within the security sector. Rich specialises in data security, application security, emerging security technologies, and security management. Mike specialises in protecting networks and endpoints, security management, and compliance. Adrian specialises in database security, data security, and software development.
Recent posts have included 'Shipping Decent Breach Notification', 'Security Trolling Mass Media', and 'Cloud File Storage and Collaboration: Additional Security Features'.
18. Schneier on Security – Bruce Schneier is an internationally recognised Security Guru and Author of 12 books on security. He has been writing about security issues on his blog since 2004. Recent posts have included: 'NSA/GCHQ/CSEC Infecting Innocent Computers Worldwide', 'Over a Billion Passwords Stolen?' and 'The Security of al Qaeda Encryption Software'.
19. KrebsonSecurity – Brian Krebs doesn't come from a traditional security background. Much of his knowledge comes from having cultivated regular and direct access to some of the key players within the security industry. Brian spent over 14 years as a reporter for the Washington post and has produced over 1,300 blog posts for the Security Fix blog. His recent posts cover: 'Adobe, Microsoft Push Critical Security Fixes', 'Q&A on the Reported Theft of 1.2B Email Accounts', and 'DQ Breach? HQ Says No, But Would it Know?'
20. An Analytical Approach – Josh is an experienced cyber security analyst with over a decade of experience building, operating, and running Security Operations Centers. He currently serves as the Chief Security Strategist at FireEye. Recent posts on Josh's blog have included 'Not All Intrusions Involve Malware', 'Optimizing Security Operations for the Big Data Crush' and 'Is Security An Unsolvable Problem?'.
21. Andrew Hay – Andrew Hay is the Senior Security Research Lead & Evangelist at OpenDNS. He is a veteran strategist with more than a decade of experience in deep packet inspection (DPI); security analytics; vulnerability management; penetration testing; intrusion detection and prevention (IDS/IPS); firewalls; threat intelligence; application whitelisting and network and host forensics. Recent posts on his blog have included: 'New Git Repositories That I'm Following', 'Gameover ZeuS Switches From P2P to DGA' and 'Quick fix for Ruby after Xcode 5.1 update'.
22. Application & Cyber Security Blog – The Application & Cyber Security Blog covers software engineering, cybersecurity, and risk management. It's authored by Edward Adams, Jason Taylor, William Whyte, Joe Basirico, Tom Bain and John Kirkwood. Recent posts have included 'Want2Hack Open Sourced!', 'The Importance of Vulnerability Disclosure Programs and Bug Bounties' and 'Reviewing C/C++ Code for Security Vulnerabilities'.
23. Tom Olzak on Security – Tom Olzak is an independent security researcher with over 38 years of experience in programming, network engineering and security. He is also the author of 3 books: 'Just Enough Security', 'Microsoft Virtualization', and 'Enterprise Security: A Practitioner's Guide'. Recent posts include: 'Your apps are never safe enough', 'Respond to actual risk, not the threat alone' and 'Many organizations still don't get infosec basics'.
24. …AND YOU WILL KNOW US BY THE TRAIL OF BITS – Trail of Bits was founded by Dan Guido and Alexander Sotirov, who have over a decade of experience between them. Dan specialises in application security and vulnerability analysis while Alexander specialises in reverse engineering and exploitation techniques. Both of them contribute to the Trail of Bits blog.
Recent posts have included: 'ReMASTering Applications by Obfuscating during Compilation', 'A Preview of McSema' and 'Education Initiative Spotlight: THREADS Call for Papers'.
Xavier Mertens is an information security consultant by day, security blogger and hacker at night. Recent posts on his blog have looked at: 'Password – (noun) A Reminder for Your Dog's Name', 'Offline Malware Analysis with Host-Only VirtualBox Networks' and 'Infosec VS. Airplane Security'.
26. Bromium Blog
The Bromium blog is authored by Dan Wolff, Bill Gardner, Rahul Kashyap, Gaurav Banga, Clinton Karr and Simon Crosby. Recent posts include 'The Rise and Fall of Enterprise Security', 'In praise of seamless, small-footprint, light-weight, transparent endpoint security' and 'Microvisor + Hypervisor Makes Your VMs Secure by Design'.
27. Clerkendweller.uk – Colin Watson is a chartered information technology professional who works as principal consultant at web security specialist consultancy Watson Hall Ltd. His blog focuses on web security, usability and design. Recent posts include '2014 Information Security Breaches', 'Application Security Verification Standard 2.0' and 'Cybercrime – A Growth Industry'.
28. Microsoft Security Blog – Tim Rains is the man in charge of the Microsoft Security Blog. Tim has over 20 years of experience in the technology industry. His specialities include incident response (engineering and communications), threat intelligence/malware protection and security strategy.
Recent posts on the blog include: 'What will cybersecurity look like in 2025?, 'Part 3: How Microsoft is shaping the future of cybersecurity', 'How Vulnerabilities are Exploited: the Root Causes of Exploited Remote Code Execution CVEs' and 'Who Exploits Vulnerabilities: the Path from Disclosure to Mass Market Exploitation'.
29. CYREN Security Blog – The main contributor to Cyren's Security Blog is Cyren's Director of Threat Research: Avi Turiel. Recent posts include: 'What You See Isn't Necessarily What You Get', ' 419 Scam Uses Ebola Virus Tragedy' and 'Trust In The Cloud: Security-as-a-service'.
30. Webroot Threat Blog – The Webroot Threat blog is authored by Grayson Milbourne, Tyler Moffitt, Marcus Moreno, Brenden Vaughan and Adam McNeil. Recent posts have included 'Cryptolocker is not dead', 'New Study Reveals Disparities Between Corporate Mobile Security Policies and BYOD Practice' and 'AV Isn't Dead. It's Evolving.'
31. FireEye Blog – The FireEye Blog provides information and insight on today's advanced threats. Recent posts have included: 'Android SSL Vulnerabilities: Lessons for CISOs', 'Your Locker of Information for CryptoLocker Decryption' and 'Pacific Ring of Fire: PlugX / Kaba'.
32. Front Line Sentinel – Matthew Pascucci is a freelance writer and information security practitioner. His recent posts have included 'Onward Through the Cloud', 'Creating a Secure Guest Network' and 'Integrating Threat Intelligence Into Your Security Program'.
33. HolisticInfoSec – Russ McRee's blog is: Director, Threat Intelligence & Engineering at Microsoft. His blog is dedicated to sharing information security content and resources. Recent posts have included 'toolsmith – Threats & Indicators: A Security Intelligence Lifecycle', 'toolsmith: Microsoft Threat Modeling Tool 2014 – Identify & Mitigate' and 'toolsmith: ThreadFix – You Found It, Now Fix It'.
34. OpenDNS Security Labs Blog – The Open DNS blog has multiple authors including Andrew Hay – who's already featured on this list— , Frank Denis, Dhia Mahjoub, Thibault Reuille and Vinny Lariza. Recent posts have included: 'Does Your Domain Have Bad Neighbours?', 'Cracking Pushdo and How to Bust Through Most Crypters' and 'Do You Have a Security Blind Spot?'.
35. Offence-in-depth – Offence-in-depth is kept up-to-date by Victor Mata, a Penetration Tester for a security consulting company. He created his blog in order to document his pursuit and life as a penetration tester, security researcher, and security enthusiast.
Recent posts have included: 'External Password Attacks Against Active Directory', 'A Better PSEXEC Module' and 'From Printer to Domain Admin'.
36. Security Bristo – Security Bristo is a blog where security professionals go to talk and share information on the latest cyber threats. Bloggers include: Linda and Brian Musthaler, Stephen Gates, Scott Barvick, Nirav Shah, Anthony M. Freed and Anton Ferreira. Recent posts have included: 'Passwords Are Like Underwear—They Aren't Meant to Be Shared', 'First Line of Defence Against DDoS Attacks in a Hosting Environment' and 'Considering Standards Security'.
37. Simon PG Edwards – Simon is Technical Director of Dennis Technology Labs with an expertise in anti-malware testing. Simon has been an IT journalist since 1995 working for some of the biggest computer magazine titles including Computer Shopper, PC Pro, Computer Active, Web User, Mac User and IT Pro. Recent posts have included 'Aircraft hacking myths busted', 'Mobile phone kill switched' and 'Are Chromebooks insecure travel companions?'
38. Sucuri Blog – The Sucuri Blog is authored by Daniel Cid –Founder and Chief Technology Officer at Sucuri— and the rest of the Sucuri team. Recent posts have included: 'Thoughts on WordPress Security and Vulnerabilities', 'Website Security Analysis: A "simple" piece of malware' and 'Case Study: Complexities of "simple" malware'.
39. The Security Skeptic – Dave Piscitello is a networking and internet veteran who now focuses on security. His blog covers a wide range of internet security topics. Recent posts include: 'Is it a Phish? Common Deceptions in Phishing URL composition', 'Top 5 #InfoSec Reads: August 11-18' and 'Suspended domains: An unprecedented data sharing opportunity'.
40. Veracode Blog – The Veracode Blog is authored by Paul Roberts and the Veracode team. Paul is spent the last decade covering hacking, cyber threats, and information technology security,and is now Founder & Editor-in-Chief of The Security Ledger (another good site to check out). Recent posts have included: '5 Best Practices in Data Breach Incident Response', 'The Rise of Application Security Requirements and What to Do About Them', and 'Applications are Growing Uncontrollably and Insecurely'.
41. IOActive Blog – The IOActive Blog is authored by the Veracode team.
42. Windows Incident Response Blog – The Windows Incident Response Blog is authored by Harlan Carvey. It is dedicated to the myriad information surrounding and inherent to the topics of IR and digital analysis of Windows systems.
43. Hacking Exposed Computer Forensics Blog – The Hacking Exposed Computer Forensics Blog is authored by David Cowen. This blog is dedicated to digital forensics and has weekly challenges every week.
44. Lenny Zeltser Blog – This blog by Lenny Zeltser focuses on information security. Lenny is a business and tech leader with extensive hands-on experience in IT and information security.
45. Paul Asadoorian's Security Weekly Blog – Paul Asadoorian's Security Weekly blog and podcast (The wiki show notes and tech segments are very useful.
46. Security 24/7 Blog
47. Open Security Research Blog – Foundstone – McAfee – Intel people.
48. All things time related Blog – Mostly log2timeline and plaso discussions, tricks, announcements and other such stuff.
49. TaoSecurity Blog – Richard Bejtlich's blog on digital security, strategic thought, and military history..
50. SANS Blogs – A collection of SANS blogs.
51. Dan Kaminsky's Blog – The name says it all – also known as The Blog Formerly Known As DoxPara Research.
52. ACLU Free Future Blog – A blog focused on protecting civil liberties in the digital age. Noteworthy blogs by Chris Soghoian.
53. EFF Blog – Electronic Frontier Foundation, a group of lawyers focused on defending your rights in the digital world. Numerous levels of detail from high level overview to deep analysis available inside.