{"id":4701,"date":"2012-05-07T18:24:58","date_gmt":"2012-05-07T18:24:58","guid":{"rendered":"https:\/\/multiacademstg.wpengine.com\/27001academy\/blog\/012\/05\/07\/top-10-information-security-blogs\/"},"modified":"2024-12-21T16:15:26","modified_gmt":"2024-12-21T16:15:26","slug":"top-10-information-security-blogs","status":"publish","type":"post","link":"https:\/\/advisera.com\/27001academy\/blog\/2012\/05\/07\/top-10-information-security-blogs\/","title":{"rendered":"Top 10 information security blogs"},"content":{"rendered":"<p>There is a huge amount of information about information security on the Internet, so it is really difficult to stay informed about really relevant stuff. This is why I made this list \u2013 I wanted to offer a list of independent, expertly written and up-to-date blogs that will keep you right on track.<\/p>\n<p>The blogs are listed alphabetically:<\/p>\n<h2 style=\"padding-top: 10px; padding-bottom: 10px;\"><a href=\"https:\/\/blogs.gartner.com\/anton-chuvakin\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Information Security Blog<\/a> by Anton Chuvakin<\/h2>\n<p>Security topics including SIEM, log management, compliance, vulnerability management and cloud security.<\/p>\n<h2 style=\"padding-top: 10px; padding-bottom: 10px;\"><a href=\"https:\/\/krebsonsecurity.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Krebs on Security<\/a> by Brian Krebs<\/h2>\n<p>This blog features posts on a number of recurring themes, including online crime investigations, latest threats, security updates, data breaches, and cyber justice.<\/p>\n<h2 style=\"padding-top: 10px; padding-bottom: 10px;\"><a href=\"https:\/\/blog.zeltser.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Lenny Zeltser on Information Security<\/a><\/h2>\n<p>Presents a unique perspective on information security, based on the author&#8217;s broad experience in IT, business and malware combat. The blog presents several infosec topics, including incident response, malicious software and risk management.<br \/>\n<div id=\"middle-banner\" class=\"banner-shortcode\"><\/div><script>loadMiddleBanner();<\/script><br \/>\n<div id=\"side-banner-trigger\" class=\"banner-shortcode\"><\/div><\/p>\n<h2 style=\"padding-top: 10px; padding-bottom: 10px;\"><a href=\"https:\/\/ddanchev.blogspot.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Mind Streams of Information Security Knowledge<\/a> by Dancho Danchev<\/h2>\n<p>This blog covers trends and fads, tactics and strategies, intersecting with third-party research, speculations and real-time CYBERINT assessments, all packed with sarcastic attitude. The blog offers access to timely, insightful and independent open-source intelligence (OSINT) analyses for maintaining the necessary situational awareness to stay on top of emerging security threats.<\/p>\n<h2 style=\"padding-top: 10px; padding-bottom: 10px;\"><a href=\"https:\/\/www.huntonprivacyblog.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Privacy and Information Security Law Blog<\/a><\/h2>\n<p>This blog covers important aspects of information security rarely covered in other blogs \u2013 privacy and information security law updates and analysis.<\/p>\n<h2 style=\"padding-top: 10px; padding-bottom: 10px;\"><a href=\"https:\/\/www.schneier.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Schneier on Security<\/a> by Bruce Schneier<\/h2>\n<p>A blog covering security and security technology \u2013 the author explains, debunks, and draws lessons from security stories that make the news.<\/p>\n<h2 style=\"padding-top: 10px; padding-bottom: 10px;\"><a href=\"https:\/\/securityaffairs.co\/wordpress\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Security Affairs<\/a> by Pierluigi Paganini<\/h2>\n<p>This daily updated blog is focused on all the areas in the security sphere. Its target is to make security a theme accessible to professionals and laymen alike, with an objective judgment on the main security events with specific attention to the subjects of cyber warfare, cyber crime and hacking.<\/p>\n<h2 style=\"padding-top: 10px; padding-bottom: 10px;\"><a href=\"https:\/\/taosecurity.blogspot.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">TaoSecurity<\/a> by Richard Bejtlich<\/h2>\n<p>TaoSecurity blog is one of the original security blogs \u2013 it will soon be ten years old. It focuses on incident detection and response for targeted threats, with emphasis on Chinese intruders.<\/p>\n<p>And by the way, <a href=\"https:\/\/www.securitybloggersnetwork.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Security Bloggers Network<\/a> offers links to over 100 various information security blogs.<\/p>\n<p><span class=\"notion-enable-hover\" data-token-index=\"0\"><em>To get step-by-step guidance and templates for all ISO 27001 required documents, try out<\/em>\u00a0<\/span><a class=\"notion-link-token notion-focusable-token notion-enable-hover\" tabindex=\"0\" href=\"https:\/\/advisera.com\/conformio\/\" target=\"_blank\" rel=\"noopener\" data-token-index=\"1\"><span class=\"link-annotation-unknown-block-id-1092142182\">Conformio<\/span><\/a><em><span class=\"notion-enable-hover\" data-token-index=\"2\">, ISO 27001 compliance software, for free.<\/span><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There is a huge amount of information about information security on the Internet, so it is really difficult to stay informed about really relevant stuff. This is why I made this list \u2013 I wanted to offer a list of independent, expertly written and up-to-date blogs that will keep you right on track. The blogs &#8230;<\/p>\n","protected":false},"author":26,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[379,1516],"class_list":["post-4701","post","type-post","status-publish","format-standard","hentry","category-blog","tag-information-security","tag-security-blogs"],"acf":[],"_links":{"self":[{"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/posts\/4701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/comments?post=4701"}],"version-history":[{"count":1,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/posts\/4701\/revisions"}],"predecessor-version":[{"id":103329,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/posts\/4701\/revisions\/103329"}],"wp:attachment":[{"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/media?parent=4701"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/categories?post=4701"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/tags?post=4701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}