8 - Major Cybersecurity Writers, Publications & Forums for best viewing this tab should be set at a size of 75%
return to main
Major Writers & Journalists
Commercial Publications
Conferences
LinkedIn Subgroups
Writers/Journalists
Name Web Site Twitter Handle LinkedIn RSS Feed
Krebs, Brian https://krebsonsecurity.com/ https://twitter.com/briankrebs http://krebsonsecurity.com/feed/
Schneier, Bruce https://www.schneier.com/ https://twitter.com/schneierblog https://www.schneier.com/blog/atom.xml
Zetter, Kim  https://www.wired.com/author/kim-zetter/ https://twitter.com/KimZetter https://www.linkedin.com/in/kim-zetter-20421b/
Cluley, Graham https://grahamcluley.com/ @gcluley
Greenberg, Andy https://www.wired.com/author/andy-greenberg/ https://twitter.com/a_greenberg
Palmer, Danny https://www.zdnet.com/meet-the-team/uk/dannypalmerzdnet/
Nakashima, Ellen https://www.washingtonpost.com/people/ellen-nakashima/
Hawkins, Derek  https://www.washingtonpost.com/people/derek-hawkins/
Bejtlich, Richard https://taosecurity.blogspot.com/  https://twitter.com/taosecurity
Zeltser, Lenny https://zeltser.com/ https://twitter.com/lennyzeltser
Lewis, Dave  https://www.liquidmatrix.org/blog/
Brewster, Thomas  https://www.forbes.com/sites/thomasbrewster/
Paganini, Pierluigi  https://securityaffairs.co/wordpress/  https://twitter.com/securityaffairs
Cybersecurity Sites / General Publications
BleepingComputer https://www.bleepingcomputer.com/  @bleepincomputer
Chief Security Officer Online https://www.csoonline.com/ 
Dark Reading https://www.darkreading.com/  https://www.darkreading.com/rss/all.xml
Gartner https://www.gartner.com/en/information-technology/insights/cybersecurity
Google Online Security https://security.googleblog.com/  http://feeds.feedburner.com/GoogleOnlineSecurityBlog
Infosecurity Magazine https://www.infosecurity-magazine.com/
OWASP https://www.owasp.org/index.php/Main_Page
SANS Reading Room https://www.sans.org @sans_isc
The Hacker News https://thehackernews.com/
Threatpost https://threatpost.com/   https://threatpost.com/feed/
Tripwire https://www.tripwire.com/state-of-security/
Wired https://www.wired.com/category/security/
Conference Proceedings
International Conference on Information Security and Cyber Forensics https://ieeexplore.ieee.org/xpl/conhome/1810684/all-proceedings
LinkedIn Groups
1 Advanced Persistent Threats (APT) https://www.linkedin.com/groups/4906738/ 1
2 Advanced Persistent Threats (APT) & Cyber Security https://www.linkedin.com/groups/4906738/ 2
3 All Things Data Breach 3
4 Aurora Cybercrime & Cyberconflict Research Group 4
5 Bank Security Managers 5
6 Banking IT Security Professionals – BISP 6
7 Business Continuity, Information Security Assurance and Compliance Management 7
8 Business of InfoSec 8
9 Certified Information Systems Security Professional 9
10 Chaos Computer Club (CCC) fans 10
11 Cisco Networking Academy 11
12 CISO Security Information Group (CSIG) – Information Security for Managers. 12
13 CISO: Meaningful Metrics 13
14 Cloud Access Security Broker (CASB) Group 14
15 Cloud Computing Best Practices 15
16 Computer Security Institute 16
17 Council of Registered Ethical Security Testers 17
18 CRIF – Cyber Risk & Insurance Forum 18
19 CSFI-LPD (LAW AND POLICY DIVISION) 19
20 CSORoundtable 20
21 Cyber counterintelligence 21
22 Cyber Crime & Terrorism  22
23 Cyber Defence Forum [www.DefenceIQ.com] 23
24 Cyber Intelligence Network https://www.linkedin.com/groups/1765567 24
25 Cyber Law & Information Security 25
26 Cyber Privacy Risks Advisors 26
27 Cyber Privacy Security Commercial Insurance 27
28 Cyber risk and data breach insurance 28
29 Cyber Security 29
30 Cyber Security & The Insider Threat 30
31 Cyber Security Alliance 31
32 Cyber Security Awareness 32
33 Cyber Security Community 33
34 Cyber Security Europe (Cyber Security News) 34
35 Cyber Security For Small Business 35
36 CYBER SECURITY Forum Initiative – CSFI 36
37 Cyber Security in Real-Time Systems 37
38 Cyber Security Insurance / Cyber Liability Risk Insurance Group 38
39 Cyber Security Intelligence Network 39
40 Cyber Security Marketing Professionals 40
41 Cyber Security Middle-East and Africa (Cyber Security News) 41
42 Cyber Security Situational Awareness 42
43 Cyber Warfare 43
44 CyberCrime Investigators Network 44
45 CYBERPOL (www.cyberpol.info) 45
46 CyberSecurity Community 46
47 Cybersecurity Forum for Business and Government 47
48 CyberSecurity Law, Policy, and Technology 48
49 Cybersecurity Vendor Platform Italy 49
50 CyberSleuths 50
51 Cyberwar & Cybercrime | Intelligence group 51
52 DC9723 52
53 DDoS Mitigation Professionals 53
54 DDOS Protection 54
55 Education Privacy and Data Security 55
56 Exploit Developers 56
57 Financial Crime Risk, Fraud and Security 57
58 FISMA – Federal Information Security Management Act 58
59 Fraud, Phishing and Financial Misdeeds 59
60 Gartner Security & Risk Management XChange 60
61 Global Corporate Fraud and Compliance Professionals 61
62 Global ICS and SCADA Cyber Security (GISCS) 62
63 Global OWASP Foundation 63
64 Governance, Risk and Compliance (GRC) 64
65 Governance, Risk and Compliance Management (GRC) 65
66 Government Cybersecurity 66
67 Hacked Again 67
68 Hackers Association of Israel 68
69 HAKIN9 Magazine 69
70 ICS-ISAC 70
71 ICTTF – International Cyber Threat Task Force 71
72 InfoRiskToday Forum 72
73 Information and Cyber Security Jobs in Israel 73
74 Information Assurance 74
75 Information Security – Learning | Training | Improving 75
76 Information Security – Risk Management – Compliance Jobs  76
77 Information Security and Privacy Law 77
78 Information Security Community 78
79 Information security in Israel 79
80 Information Security Network 80
81 Information Security Standards 81
82 Information Systems Security Association (ISSA) Discussion Forum 82
83 Information Systems Security Enthusiast & Professionals 83
84 Information Technology (Homeland & National Security) 84
85 Information Technology Audit and Governance Group (IT, Security, Audit, and GRC) 85
86 InfoSec Management Professionals 86
87 InfoSec Media 87
88 Infosec Products and Tools – No Jobs 88
89 InfoSec World 89
90 Infosecurity Europe Professionals 90
91 Infosecurity magazine – information security community 91
92 Insider Threat Interest Group 92
93 Insider Threat Management 93
94 Intelligence Analysts 94
95 Intelligence Based Cyber Security 95
96 IoT Security x 96
97 IoT Security Experts x 97
98 IoT Security Forum | A Collaborative Community for IoT Industry Professionals x 98
99 ISACA – IT Governance Professionals 99
100 ISACA (Official) 100
101 ISACA Israel Chapter 101
102 iSecurity 102
103 ISF – Information Security Forum 103
104 ISO27000 for information security management 104
105 Israel CyberSecurity Forum 105
106 ISTT – Information Security Think Tank 106
107 IT Governance, Risk & Compliance 107
108 IT security analyst & CISO Forum 108
109 IT Security and Compliance 109
110 IT SECURITY EXPERT 110
111 IT Security Sales People 111
112 IT Specialist Network 112
113 IVC Network: Israel High-Tech and Venture Capital 113
114 Malware Analysis 114
115 Malware Virus and Exploits 115
116 MalwareIntelligence :: Cybercrime Intelligence and Research 116
117 Mobile Device Management and Security Professionals 117
118 Mobile Security Trends 118
119 National Information Security Group 119
120 NERC Cyber Security Professionals 120
121 Pentesting 121
122 Privacy and Data Security 122
123 Privacy Professionals 123
124 Risk Management Executives & Professionals 124
125 Risk, Regulation & Rpeporting 125
126 Russian Cybercrime, Hacking and Information Warfare 126
127 SaaS & Cloud Security Experts (4000+ Members) 127
128 SC Magazine UK (Information Security) 128
129 Security Bloggers Network 129
130 Security Breaches 130
131 Security Community Middle East 131
132 Security in business & privacy 132
133 Security Industry Group 133
134 Security Leaders Group 134
135 Security Management Resources (SMR Group) 135
136 Security Podcasts 136
137 Security Regulation 137
138 Security Specialists 138
139 Security through Obscurity 139
140 SecurityMetrics 140
141 SIEM Use-Cases 141
142 SISA Information Security Community 142
143 SMB Cyber Risks 143
144 Software & Technology 144
145 The Data Breach Prevention Network 145
146 The European Information Security Network – Business Technology 146
147 The Penetration Testing Execution Standard (PTES) 147
148 The State of Security 148
149 THIBER, the cybersecurity think tank 149
150 Threatpost 150
151 Top Threats to Cloud 151
152 UK Cyber Security Network 152
153 Vulnerability Researchers 153
154 Web Fraud Prevention 154
155 Women in Cybersecurity – Information Security 155
156 Women in Security group 156
157 www.SecurityResellers.Com 157
158 ZONE SE7EN | Information Technology Insight 158