Top 10 Cyber Security Blogs
According to the annual Cost of a Data Breach Report published by IBM Security, the average cost of a cyberattack on businesses in Europe and North America in 2020 was US$3.8m. That’s enough to sink many small and medium-sized organizations. However, forewarned is forearmed and a strong digital defense is possible if you have the right information. Knowing what’s happening now and what’s coming next is vital in the battle against cyber criminals. Stay on top of current and emerging threats with news and advice from the 10 best blogs in the business.
April C. Wright. Location: USA. ArchitectSecurity
Proud to call herself a ‘hacker for the greater good’, April C. Wright is a professional technologist, author, teacher and community leader. With a focus on information protection, security awareness and personal privacy, her blog is suitable for both corporate and individual audiences as it aims to educate, implement and proactively increase our defence against the expanding universe of cyber threats. Typical posts look at subjects such as the best ways to physically destroy unwanted data, how your social media photos can make you vulnerable and the personal data you may inadvertently give to law enforcement if you join a protest.
Brian Krebs. Location: USA. KrebsonSecurity
A former Washington Post investigative reporter, Brian Krebs delivers a blog that is highly informative, but also easily digestible and enjoyable to read. Credited with being the first journalist to publicise the existence of the infamous Stuxnet virus, his reports often break tech news and in some cases, have led to the dismantling of entire networks of cyber thieves and hackers. Recent posts have exposed ATM skimming gangs, DDoS for hire syndicates and massive data breaches.
Bruce Schneier. Location: USA. Schneier.com
Described by The Economist as a ‘Security Guru’ but preferring the term ‘public-interest technologist’, Bruce Schneier is an internationally renowned security professional, cryptologist and author. His blog rests at the intersection of security, technology and people and is strong on corporate cyber problems that impact the public. Corporate malfeasance, data breaches and business failures to protect proprietary personal information are themes he returns to repeatedly.
Byron V. Acohido. Location: USA. Lastwatchdog
Founder, contributor and executive editor of the forward-thinking Last Watchdog webzine, Byron V. Acohido is a Pulitzer-winning journalist and web producer. Visit Last Watchdog to view videos, surf cyber news, gain informative analysis and read guest essays from leading lights in the cybersecurity community. Expect content that is always accurate and fair, with recent posts exploring the monitoring of complex modern networks, telecom data breaches that expose vast numbers of mobile users, efforts to make software products safer and ransomware attacks on global supply chains.
Cyber Security Hub. Location: Global www.cshub.com
Of course our own blog should be included into this list, as the Cyber Security Hub team provide weekly updates regarding breaches and attacks as part of ‘Incident of the Week’. The weekly incident update details attacks on businesses while offering thought leadership to avoid the attacks in the first place.
Graham Cluley. Location: UK. Grahamcluley.com
Member of the European InfoSecurity Hall of Fame and co-host of the weekly podcast Smashing Security, veteran antivirus expert Graham Cluley worked for Sophos and McAfee before launching his journalistic career in 2013. Since then, he has consulted for governments, advised the world’s largest companies and worked with law enforcement agencies to hunt down international cyber criminals. His self-named site delivers tech news, analysis and expert advice to keep your precious data safe.
Pierluigi Paganini. Location: Italy. Securityaffairs
Producing a prolific blog that was recently named as a Top National Security Resource by the US, Pierluigi Paganini is a member of the European Union Agency for Network and Information Security, the Threat Landscape Stakeholder Group and the Cyber G7 Group. With more than 20 years’ experience in the field, his writing covers everything from the deep web and hacktivism to the internet of things, malware, mobile security and more.
Sucuri Inc is a globally-recognized company that offers website security software and services to business of all sizes around the world. This comprehensive blog is curated by an experienced team of security professionals and it demonstrates a laser focus on the planting of malicious malware on standalone systems and whole networks. Recent posts have covered the dangers for the world’s growing army of remote workers, an acceleration in the use of cryptocurrency mining malware, the five types of hacker and why they hack and phishing scams that target major banks.
Threatpost. Location: USA. Threatpost.com
As the name suggests, Threatpost concentrates on current and emerging cyber dangers. This informative site offers news and real-time analysis of malware and technology vulnerabilities. Learn what’s happening now as well as what may be coming down the road tomorrow. Find out what you can do to ensure your systems remain safe from malicious attack. Learn how to get them back online if the threat has already manifested. Recent posts look at the ways modern malware never gives up being dangerous, building a solid defence before it’s too late and how thousands of cryptocurrency investors were robbed.
Webroot Blog. Location: USA. Webroot.com
Webroot is a US technology security company that harnesses the cloud and artificial intelligence to prevent zero-day threats in real time. Authored by Grayson Milbourne, Tyler Moffitt, Marcus Moreno, Brenden Vaughan and Adam McNeil, the Webroot Blog explains the multiple ways that cyber criminals infiltrate information systems and how the reader can defend against them. Written in plain English that is enjoyable to read, their posts provide insights and opinion on topics as varied as the role of ransomware insurance in expanding ransomware attacks, the importance of back-ups and layered protection in the cloud and can we ever really fix IoT security?
Graham Cluley: https://archive.is/20130729081108/http://www.infosec.co.uk/en/Education-Programme/fame/Irish-sales-team1/