8 - Major Cybersecurity Writers, Publications & Forums |
for best viewing this tab should be set at
a size of 75% |
|
|
|
|
|
|
|
return to main |
|
|
Major Writers &
Journalists |
|
|
Commercial Publications |
|
|
Conferences |
|
|
LinkedIn Subgroups |
|
Writers/Journalists |
|
|
|
|
|
|
|
|
|
Name |
Web Site |
Twitter |
Handle |
LinkedIn |
RSS Feed |
|
|
|
|
Krebs, Brian |
https://krebsonsecurity.com/ |
https://twitter.com/briankrebs |
|
http://krebsonsecurity.com/feed/ |
|
|
Schneier, Bruce |
https://www.schneier.com/ |
https://twitter.com/schneierblog |
|
|
https://www.schneier.com/blog/atom.xml |
|
|
Zetter, Kim |
https://www.wired.com/author/kim-zetter/ |
https://twitter.com/KimZetter |
|
https://www.linkedin.com/in/kim-zetter-20421b/ |
|
|
Cluley, Graham |
https://grahamcluley.com/ |
|
@gcluley |
|
|
Greenberg, Andy |
https://www.wired.com/author/andy-greenberg/ |
https://twitter.com/a_greenberg |
|
|
Palmer, Danny |
https://www.zdnet.com/meet-the-team/uk/dannypalmerzdnet/ |
|
|
|
Nakashima, Ellen |
https://www.washingtonpost.com/people/ellen-nakashima/ |
|
|
|
Hawkins, Derek |
https://www.washingtonpost.com/people/derek-hawkins/ |
|
|
|
Bejtlich, Richard |
https://taosecurity.blogspot.com/ |
https://twitter.com/taosecurity |
|
|
Zeltser, Lenny |
https://zeltser.com/ |
https://twitter.com/lennyzeltser |
|
|
Lewis, Dave |
https://www.liquidmatrix.org/blog/ |
|
|
|
|
Brewster, Thomas |
https://www.forbes.com/sites/thomasbrewster/ |
|
|
|
|
Paganini, Pierluigi |
https://securityaffairs.co/wordpress/ |
https://twitter.com/securityaffairs |
|
|
Cybersecurity
Sites / General Publications |
|
|
|
|
|
BleepingComputer |
https://www.bleepingcomputer.com/ |
|
@bleepincomputer |
|
|
Chief Security Officer Online |
https://www.csoonline.com/ |
|
|
|
Dark Reading |
https://www.darkreading.com/ |
|
|
https://www.darkreading.com/rss/all.xml |
|
|
Gartner |
https://www.gartner.com/en/information-technology/insights/cybersecurity |
|
|
Google Online Security |
https://security.googleblog.com/ |
|
|
http://feeds.feedburner.com/GoogleOnlineSecurityBlog |
|
Infosecurity Magazine |
https://www.infosecurity-magazine.com/ |
|
|
|
OWASP |
https://www.owasp.org/index.php/Main_Page |
|
|
|
SANS Reading Room |
https://www.sans.org |
|
@sans_isc |
|
|
The Hacker News |
https://thehackernews.com/ |
|
|
|
Threatpost |
https://threatpost.com/ |
|
|
https://threatpost.com/feed/ |
|
|
Tripwire |
https://www.tripwire.com/state-of-security/ |
|
|
|
Wired |
https://www.wired.com/category/security/ |
|
|
Conference
Proceedings |
|
|
|
|
International Conference on Information Security and Cyber
Forensics |
https://ieeexplore.ieee.org/xpl/conhome/1810684/all-proceedings |
|
|
|
|
|
|
LinkedIn Groups |
|
1 |
Advanced
Persistent Threats (APT) |
https://www.linkedin.com/groups/4906738/ |
|
1 |
|
2 |
Advanced
Persistent Threats (APT) & Cyber Security |
https://www.linkedin.com/groups/4906738/ |
|
2 |
|
3 |
All
Things Data Breach |
|
3 |
|
4 |
Aurora
Cybercrime & Cyberconflict Research Group |
|
4 |
|
5 |
Bank
Security Managers |
|
5 |
|
6 |
Banking
IT Security Professionals – BISP |
|
6 |
|
7 |
Business Continuity, Information Security Assurance
and Compliance Management |
|
7 |
|
8 |
Business
of InfoSec |
|
8 |
|
9 |
Certified
Information Systems Security Professional |
|
9 |
|
10 |
Chaos
Computer Club (CCC) fans |
|
10 |
|
11 |
Cisco
Networking Academy |
|
11 |
|
12 |
CISO
Security Information Group (CSIG) – Information Security for Managers. |
|
12 |
|
13 |
CISO:
Meaningful Metrics |
|
13 |
|
14 |
Cloud
Access Security Broker (CASB) Group |
|
14 |
|
15 |
Cloud
Computing Best Practices |
|
15 |
|
16 |
Computer
Security Institute |
|
16 |
|
17 |
Council
of Registered Ethical Security Testers |
|
17 |
|
18 |
CRIF
– Cyber Risk & Insurance Forum |
|
18 |
|
19 |
CSFI-LPD
(LAW AND POLICY DIVISION) |
|
19 |
|
20 |
CSORoundtable |
|
20 |
|
21 |
Cyber
counterintelligence |
|
21 |
|
22 |
Cyber
Crime & Terrorism |
|
22 |
|
23 |
Cyber
Defence Forum [www.DefenceIQ.com] |
|
23 |
|
24 |
Cyber
Intelligence Network |
https://www.linkedin.com/groups/1765567 |
|
24 |
|
25 |
Cyber
Law & Information Security |
|
25 |
|
26 |
Cyber
Privacy Risks Advisors |
|
26 |
|
27 |
Cyber
Privacy Security Commercial Insurance |
|
27 |
|
28 |
Cyber
risk and data breach insurance |
|
28 |
|
29 |
Cyber
Security |
|
29 |
|
30 |
Cyber
Security & The Insider Threat |
|
30 |
|
31 |
Cyber
Security Alliance |
|
31 |
|
32 |
Cyber
Security Awareness |
|
32 |
|
33 |
Cyber
Security Community |
|
33 |
|
34 |
Cyber
Security Europe (Cyber Security News) |
|
34 |
|
35 |
Cyber
Security For Small Business |
|
35 |
|
36 |
CYBER
SECURITY Forum Initiative – CSFI |
|
36 |
|
37 |
Cyber
Security in Real-Time Systems |
|
37 |
|
38 |
Cyber
Security Insurance / Cyber Liability Risk Insurance Group |
|
38 |
|
39 |
Cyber
Security Intelligence Network |
|
39 |
|
40 |
Cyber
Security Marketing Professionals |
|
40 |
|
41 |
Cyber
Security Middle-East and Africa (Cyber Security News) |
|
41 |
|
42 |
Cyber
Security Situational Awareness |
|
42 |
|
43 |
Cyber
Warfare |
|
43 |
|
44 |
CyberCrime Investigators Network |
|
44 |
|
45 |
CYBERPOL
(www.cyberpol.info) |
|
45 |
|
46 |
CyberSecurity
Community |
|
46 |
|
47 |
Cybersecurity
Forum for Business and Government |
|
47 |
|
48 |
CyberSecurity
Law, Policy, and Technology |
|
48 |
|
49 |
Cybersecurity
Vendor Platform Italy |
|
49 |
|
50 |
CyberSleuths |
|
50 |
|
51 |
Cyberwar
& Cybercrime | Intelligence group |
|
51 |
|
52 |
DC9723 |
|
52 |
|
53 |
DDoS
Mitigation Professionals |
|
53 |
|
54 |
DDOS
Protection |
|
54 |
|
55 |
Education
Privacy and Data Security |
|
55 |
|
56 |
Exploit
Developers |
|
56 |
|
57 |
Financial
Crime Risk, Fraud and Security |
|
57 |
|
58 |
FISMA
– Federal Information Security Management Act |
|
58 |
|
59 |
Fraud,
Phishing and Financial Misdeeds |
|
59 |
|
60 |
Gartner
Security & Risk Management XChange |
|
60 |
|
61 |
Global
Corporate Fraud and Compliance Professionals |
|
61 |
|
62 |
Global
ICS and SCADA Cyber Security (GISCS) |
|
62 |
|
63 |
Global
OWASP Foundation |
|
63 |
|
64 |
Governance,
Risk and Compliance (GRC) |
|
64 |
|
65 |
Governance,
Risk and Compliance Management (GRC) |
|
65 |
|
66 |
Government
Cybersecurity |
|
66 |
|
67 |
Hacked
Again |
|
67 |
|
68 |
Hackers
Association of Israel |
|
68 |
|
69 |
HAKIN9
Magazine |
|
69 |
|
70 |
ICS-ISAC |
|
70 |
|
71 |
ICTTF
– International Cyber Threat Task Force |
|
71 |
|
72 |
InfoRiskToday
Forum |
|
72 |
|
73 |
Information
and Cyber Security Jobs in Israel |
|
73 |
|
74 |
Information
Assurance |
|
74 |
|
75 |
Information
Security – Learning | Training | Improving |
|
75 |
|
76 |
Information Security – Risk Management – Compliance
Jobs |
|
76 |
|
77 |
Information
Security and Privacy Law |
|
77 |
|
78 |
Information
Security Community |
|
78 |
|
79 |
Information
security in Israel |
|
79 |
|
80 |
Information
Security Network |
|
80 |
|
81 |
Information
Security Standards |
|
81 |
|
82 |
Information
Systems Security Association (ISSA) Discussion Forum |
|
82 |
|
83 |
Information
Systems Security Enthusiast & Professionals |
|
83 |
|
84 |
Information
Technology (Homeland & National Security) |
|
84 |
|
85 |
Information Technology Audit and Governance Group
(IT, Security, Audit, and GRC) |
|
85 |
|
86 |
InfoSec
Management Professionals |
|
86 |
|
87 |
InfoSec
Media |
|
87 |
|
88 |
Infosec
Products and Tools – No Jobs |
|
88 |
|
89 |
InfoSec
World |
|
89 |
|
90 |
Infosecurity
Europe Professionals |
|
90 |
|
91 |
Infosecurity
magazine – information security community |
|
91 |
|
92 |
Insider
Threat Interest Group |
|
92 |
|
93 |
Insider
Threat Management |
|
93 |
|
94 |
Intelligence
Analysts |
|
94 |
|
95 |
Intelligence
Based Cyber Security |
|
95 |
|
96 |
IoT
Security |
x |
|
96 |
|
97 |
IoT
Security Experts |
x |
|
97 |
|
98 |
IoT Security Forum | A Collaborative Community for
IoT Industry Professionals |
x |
|
98 |
|
99 |
ISACA –
IT Governance Professionals |
|
99 |
|
100 |
ISACA
(Official) |
|
100 |
|
101 |
ISACA
Israel Chapter |
|
101 |
|
102 |
iSecurity |
|
102 |
|
103 |
ISF –
Information Security Forum |
|
103 |
|
104 |
ISO27000
for information security management |
|
104 |
|
105 |
Israel
CyberSecurity Forum |
|
105 |
|
106 |
ISTT
– Information Security Think Tank |
|
106 |
|
107 |
IT
Governance, Risk & Compliance |
|
107 |
|
108 |
IT
security analyst & CISO Forum |
|
108 |
|
109 |
IT
Security and Compliance |
|
109 |
|
110 |
IT
SECURITY EXPERT |
|
110 |
|
111 |
IT
Security Sales People |
|
111 |
|
112 |
IT
Specialist Network |
|
112 |
|
113 |
IVC
Network: Israel High-Tech and Venture Capital |
|
113 |
|
114 |
Malware
Analysis |
|
|
114 |
|
115 |
Malware
Virus and Exploits |
|
115 |
|
116 |
MalwareIntelligence
:: Cybercrime Intelligence and Research |
|
116 |
|
117 |
Mobile
Device Management and Security Professionals |
|
117 |
|
118 |
Mobile
Security Trends |
|
118 |
|
119 |
National
Information Security Group |
|
119 |
|
120 |
NERC
Cyber Security Professionals |
|
120 |
|
121 |
Pentesting |
|
121 |
|
122 |
Privacy
and Data Security |
|
122 |
|
123 |
Privacy
Professionals |
|
123 |
|
124 |
Risk
Management Executives & Professionals |
|
124 |
|
125 |
Risk,
Regulation & Rpeporting |
|
125 |
|
126 |
Russian
Cybercrime, Hacking and Information Warfare |
|
126 |
|
127 |
SaaS
& Cloud Security Experts (4000+ Members) |
|
127 |
|
128 |
SC
Magazine UK (Information Security) |
|
128 |
|
129 |
Security
Bloggers Network |
|
129 |
|
130 |
Security
Breaches |
|
130 |
|
131 |
Security
Community Middle East |
|
131 |
|
132 |
Security
in business & privacy |
|
132 |
|
133 |
Security
Industry Group |
|
133 |
|
134 |
Security
Leaders Group |
|
134 |
|
135 |
Security
Management Resources (SMR Group) |
|
135 |
|
136 |
Security
Podcasts |
|
136 |
|
137 |
Security
Regulation |
|
137 |
|
138 |
Security
Specialists |
|
138 |
|
139 |
Security
through Obscurity |
|
139 |
|
140 |
SecurityMetrics |
|
140 |
|
141 |
SIEM Use-Cases |
|
141 |
|
142 |
SISA
Information Security Community |
|
142 |
|
143 |
SMB
Cyber Risks |
|
143 |
|
144 |
Software
& Technology |
|
144 |
|
145 |
The
Data Breach Prevention Network |
|
145 |
|
146 |
The
European Information Security Network – Business Technology |
|
146 |
|
147 |
The
Penetration Testing Execution Standard (PTES) |
|
147 |
|
148 |
The
State of Security |
|
148 |
|
149 |
THIBER,
the cybersecurity think tank |
|
149 |
|
150 |
Threatpost |
|
150 |
|
151 |
Top
Threats to Cloud |
|
151 |
|
152 |
UK
Cyber Security Network |
|
152 |
|
153 |
Vulnerability
Researchers |
|
153 |
|
154 |
Web
Fraud Prevention |
|
154 |
|
155 |
Women
in Cybersecurity – Information Security |
|
155 |
|
156 |
Women
in Security group |
|
156 |
|
157 |
www.SecurityResellers.Com |
|
157 |
|
158 |
ZONE
SE7EN | Information Technology Insight |
|
158 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|