{"id":4434,"date":"2014-12-17T20:31:57","date_gmt":"2014-12-17T20:31:57","guid":{"rendered":"https:\/\/multiacademstg.wpengine.com\/27001academy\/blog\/014\/12\/17\/top-10-information-security-bloggers-in-2014\/"},"modified":"2025-09-19T09:58:28","modified_gmt":"2025-09-19T09:58:28","slug":"top-10-information-security-bloggers-in-2014","status":"publish","type":"post","link":"https:\/\/advisera.com\/27001academy\/blog\/2014\/12\/17\/top-10-information-security-bloggers-in-2014\/","title":{"rendered":"Top 10 information security bloggers in 2014"},"content":{"rendered":"<p>If you want to stay on top of cybersecurity \/ information security news and insights, here are the blogs that I found the most useful.<\/p>\n<p>I listed here only the blogs written by independent authors (blogs that were not edited by an editorial team), and I listed them in alphabetical order. Enjoy the reading!<\/p>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-14433\" style=\"padding-right: 15px; padding-top: 10px;\" src=\"\/wp-content\/uploads\/2014\/12\/Matthew-Green1.jpg\" alt=\"-\" width=\"80\" height=\"107\"><\/p>\n<h2><a href=\"https:\/\/blog.cryptographyengineering.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>A Few Thoughts on Cryptographic Engineering<\/strong><\/a>\u00a0by Matthew Green<\/h2>\n<p>This is a very narrowly focused blog on cryptography; however, Matthew has written a surprisingly large number of articles on this topic. Although very technical and very in-depth, he writes in such a way that someone with moderate knowledge of IT security can understand it.<\/p>\n<p>One of his most popular posts in 2014 was\u00a0<a href=\"https:\/\/blog.cryptographyengineering.com\/2014\/08\/whats-matter-with-pgp.html\" target=\"_blank\" rel=\"noopener noreferrer\">What&#8217;s the matter with PGP?<\/a>\u00a0\u2013 more than 70 comments.<\/p>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-14415\" style=\"padding-right: 15px; padding-top: 10px;\" src=\"\/wp-content\/uploads\/2014\/12\/GaryWarner.Fall2011.small-1.jpg\" alt=\"-\" width=\"80\" height=\"107\"><\/p>\n<h2><strong><a href=\"https:\/\/garwarner.blogspot.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">CyberCrime &amp; Doing Time<\/a><\/strong>\u00a0by Gary Warner<\/h2>\n<p>As the name suggests, Gary\u2019s blog focuses on cybercrime and related legal issues \u2013 what\u2019s good about his blog is that he takes examples of real attacks and analyzes how they have been performed and what to do about them.<\/p>\n<p>One of his most popular posts in 2014 was on\u00a0<a href=\"https:\/\/garwarner.blogspot.ro\/2014\/02\/gameover-zeus-now-uses-encryption-to.html\" target=\"_blank\" rel=\"noopener noreferrer\">how GameOver Zeus uses encryption to bypass perimeter security<\/a>.<br \/>\n<div id=\"middle-banner\" class=\"banner-shortcode\"><\/div><script>loadMiddleBanner();<\/script><br \/>\n<div id=\"side-banner-trigger\" class=\"banner-shortcode\"><\/div><br \/>\n<img decoding=\"async\" class=\"alignleft size-full wp-image-14478\" style=\"padding-right: 15px; padding-top: 10px;\" src=\"\/wp-content\/uploads\/2014\/12\/cluley-portrait-1702.jpeg\" alt=\"-\" width=\"80\" height=\"107\"><\/p>\n<h2><strong><a href=\"https:\/\/grahamcluley.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Graham Cluley<\/a><\/strong>\u00a0by Graham Cluley<\/h2>\n<p>Graham writes about various security issues, ranging from industry news, reviews, and alerts all the way to hacking, malware, spam, threats, etc. He is very prolific \u2013 at least one article per day, and targets currently hot security topics; this is very good blog for someone who wants to get an overall picture of what\u2019s going on.<\/p>\n<p>One of his most popular posts in 2014 was about a\u00a0<a href=\"https:\/\/grahamcluley.com\/2014\/01\/giant-snake-swallows-zookeeper-video-scam-spreads-facebook\/\" target=\"_blank\" rel=\"noopener noreferrer\">video scam that has spread on Facebook<\/a>\u00a0\u2013 more than 5,000 Facebook shares.<\/p>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-14424\" style=\"padding-right: 15px; padding-top: 10px;\" src=\"\/wp-content\/uploads\/2014\/12\/header-krebs1.jpg\" alt=\"-\" width=\"80\" height=\"107\"><\/p>\n<h2><a href=\"https:\/\/krebsonsecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Krebs on Security<\/strong><\/a>\u00a0by Brian Krebs<\/h2>\n<p>Definitely one of the most popular infosec blogs, it focuses on online crime investigations, latest threats, security updates, data breaches, and cyber justice. I like it because it is very well written \u2013 you can see that Brian is a professional journalist (he was working for The Washington Post) \u2013 all the topics are very well researched and explained.<\/p>\n<p>One of his most popular blog posts in 2014 was about a\u00a0<a href=\"https:\/\/krebsonsecurity.com\/2014\/09\/banks-credit-card-breach-at-home-depot\/\" target=\"_blank\" rel=\"noopener noreferrer\">credit card breach at Home Depot<\/a>\u00a0\u2013 more than 300 comments.<\/p>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-14469\" style=\"padding-right: 15px; padding-top: 10px;\" src=\"\/wp-content\/uploads\/2014\/12\/zeltser1.jpg\" alt=\"-\" width=\"80\" height=\"107\"><\/p>\n<h2><a href=\"https:\/\/blog.zeltser.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Lenny Zeltser on Information Security<\/strong><\/a>\u00a0by Lenny Zeltser<\/h2>\n<p>This is a very interesting blog on incident response, malicious software, risk management, and security technology. What\u2019s good about it is that Lenny provides deep explanation on various security subjects so that you can learn quite a lot when reading his articles.<\/p>\n<p>One of his most popular posts was about the\u00a0<a href=\"https:\/\/blog.zeltser.com\/post\/86508269224\/remnux-v5-release-for-malware-analysts\" target=\"_blank\" rel=\"noopener noreferrer\">new release of REMnux Linux Distro for malware analysis<\/a>\u00a0\u2013 150 Facebook likes.<\/p>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-14397\" style=\"padding-right: 15px; padding-top: 10px;\" src=\"\/wp-content\/uploads\/2014\/12\/bruce-scheier1.jpg\" alt=\"-\" width=\"80\" height=\"107\"><\/p>\n<h2><a href=\"https:\/\/www.schneier.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Schneier on Security<\/strong><\/a>\u00a0by Bruce Schneier<\/h2>\n<p>One of those security blogs you cannot afford to avoid, it focuses on wide range of subjects, and one of the most common topics in 2014 was the NSA and Edward Snowden affair. I like this blog because Bruce doesn\u2019t publish only his articles: he also comments on various other security news and publications, so you can use it as a kind of a portal to a wider picture of the security world.<\/p>\n<p>One of his most popular post was on the\u00a0<a href=\"https:\/\/www.schneier.com\/blog\/archives\/2014\/04\/heartbleed.html\" target=\"_blank\" rel=\"noopener noreferrer\">Heartbleed bug<\/a>\u00a0\u2013 almost 300 comments there.<\/p>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-14442\" style=\"padding-right: 15px; padding-top: 10px;\" src=\"\/wp-content\/uploads\/2014\/12\/paganini1.jpg\" alt=\"-\" width=\"80\" height=\"107\"><\/p>\n<h2><a href=\"https:\/\/securityaffairs.co\/wordpress\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Security Affairs<\/strong><\/a>\u00a0by Pierluigi Paganini<\/h2>\n<p>Probably the most productive information security blogger, Pierluigi publishes at least one, and sometimes even two or three articles per day, and covers a wide range of security topics including cyber warfare, cybercrime, and hacking. If you want to get security news on a daily level, this blog is a very good choice.<\/p>\n<p>One of his most popular posts in 2014 was on\u00a0<a href=\"https:\/\/securityaffairs.co\/wordpress\/25616\/hacking\/2-14-year-old-hacked-atm.html\" target=\"_blank\" rel=\"noopener noreferrer\">two 14-year-old students who hacked an ATM<\/a>\u00a0\u2013 almost 600 Facebook likes.<\/p>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-14451\" style=\"padding-right: 15px; padding-top: 10px;\" src=\"\/wp-content\/uploads\/2014\/12\/tao1.jpg\" alt=\"-\" width=\"80\" height=\"107\"><\/p>\n<h2><a href=\"https:\/\/taosecurity.blogspot.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>TaoSecurity<\/strong><\/a>\u00a0by Richard Bejtlich<\/h2>\n<p>Unlike other security bloggers, Richard offers a more conversational style in his writing \u2013 he covers different security topics, with focus on incident detection, response for targeted threats, digital security, etc. You\u2019ll notice that Richard always provides his personal view on the topic he covers, so his articles are really enjoyable to read.<\/p>\n<p>One of his most popular posts in 2014 was about\u00a0<a href=\"https:\/\/taosecurity.blogspot.com\/2014\/02\/more-russian-information-warfare.html\" target=\"_blank\" rel=\"noopener noreferrer\">Russian information warfare<\/a>.<\/p>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-14379\" style=\"padding-right: 15px; padding-top: 10px;\" src=\"\/wp-content\/uploads\/2014\/12\/TerryZink.jpg\" alt=\"-\" width=\"80\" height=\"107\"><\/p>\n<h2><a href=\"https:\/\/blogs.msdn.com\/b\/tzink\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Terry Zink: Security Talk<\/strong><\/a>\u00a0by Terry Zink<\/h2>\n<p>Terry covers IT security topics like spam, hacking, malware, botnets, etc., but he also interviews prominent people from the security world so that readers can gain insight into other security expert opinions. Since he works at Microsoft on IT security issues, he provides detailed security guidelines that will surely appeal to readers interested in protection of IT systems.<\/p>\n<p>One of his most popular posts in 2014 was about\u00a0<a href=\"https:\/\/blogs.msdn.com\/b\/tzink\/archive\/2014\/09\/12\/why-does-spam-and-phishing-get-through-office-365-and-what-can-be-done-about-it.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">why spam and phishing get through Office 365<\/a>.<\/p>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-14460\" style=\"padding-right: 15px; padding-top: 10px;\" src=\"\/wp-content\/uploads\/2014\/12\/troyhunt1.jpg\" alt=\"-\" width=\"80\" height=\"107\"><\/p>\n<h2><a href=\"https:\/\/www.troyhunt.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>troyhunt.com<\/strong><\/a>\u00a0by Troy Hunt<\/h2>\n<p>Troy focuses on one segment of the security arena that is probably growing the most: web security and cloud security. What\u2019s good about his blog is that he speaks about real-life security problems and very often provides very detailed explanation through videos and images on how to resolve them.<\/p>\n<p>One of his most popular posts in 2014 was\u00a0<a href=\"https:\/\/www.troyhunt.com\/2014\/09\/everything-you-need-to-know-about.html\" target=\"_blank\" rel=\"noopener noreferrer\">Everything you need to know about the Shellshock Bash bug<\/a>\u00a0\u2013 more than 9,000 Facebook likes and 200 comments.<\/p>\n<p>\u2013 \u00a0\u2013 \u00a0\u2013<\/p>\n<p>And this is it \u2013 hope you\u2019ll find this list useful. I know there are also some other good information security blogs on the Internet, but I tried to focus only on those that regularly post new articles.<\/p>\n<p>Now you have something to read on your holidays \ud83d\ude42<\/p>\n<p><span class=\"notion-enable-hover\" data-token-index=\"0\"><em>For a better understanding of how to comply with ISO 27001,<\/em>\u00a0<\/span><a class=\"notion-link-token notion-focusable-token notion-enable-hover\" tabindex=\"0\" href=\"https:\/\/advisera.com\/conformio\/\" target=\"_blank\" rel=\"noopener\" data-token-index=\"1\"><span class=\"link-annotation-unknown-block-id-1092142182\">sign up for a free trial<\/span><\/a>\u00a0<em><span class=\"notion-enable-hover\" data-token-index=\"3\">of Conformio, the leading ISO 27001 compliance software.<\/span><\/em><!-- notionvc: 1c9ab526-ff5e-4762-88ec-57f1eb73d9b8 --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you want to stay on top of cybersecurity \/ information security news and insights, here are the blogs that I found the most useful. I listed here only the blogs written by independent authors (blogs that were not edited by an editorial team), and I listed them in alphabetical order. Enjoy the reading! A &#8230;<\/p>\n","protected":false},"author":26,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[379,559,771,1516],"class_list":["post-4434","post","type-post","status-publish","format-standard","hentry","category-blog","tag-information-security","tag-cybersecurity","tag-it-security","tag-security-blogs"],"acf":[],"_links":{"self":[{"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/posts\/4434","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/comments?post=4434"}],"version-history":[{"count":2,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/posts\/4434\/revisions"}],"predecessor-version":[{"id":104584,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/posts\/4434\/revisions\/104584"}],"wp:attachment":[{"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/media?parent=4434"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/categories?post=4434"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/tags?post=4434"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}