Top Information Security Blogs You Should Be Reading

This is our collection of important and informative information security blogs from the industry’s top leaders.

We’re in the digital age, where information processes faster than we can analyze it. If you’re not reading the latest industry updates, you’re behind your peers.

These days, information can be accessed from your computer, phone and even your watch. Information is almost instantaneous, and we crave the feeling of connectivity to the world and our industry. With countless information security blogs on the internet, it’s hard to sort through the best respectful thought leaders, the opinion makers and the highly reckonable blogs.

Here’s a list of the best #informationsecurity blogs in the industry. #tech Click To Tweet

We’ve done the hard work for you and searched the internet for the best InfoSec blogs in the industry. In this article, we chose to focus on blogs from industry experts, influencers and reputable groups. We believe this is a good collection of non-bias and non-product driven websites to fuel your intellectual security growth.

Also read our comprehensive list of information security influencers on twitter.

These blogs provide a respectable plunge into the industry’s leading information security topics.

1. DARKReading

Three posts we like from DarkReading:

  1. 8 Most Overlooked Security Threats
  2. 82% of Databases Left Unencrypted in Public Cloud
  3. Don’t Forget Basic Security Measure, Experts Say

2. ThreatPost

Three posts we like from ThreatPost:

  1. Twitter Flow Could Have Allowed Attacker to Tweet From Any Account
  2. Staples Looking into Potential Payment Card Breach
  3. Boeing Notifies 36,000 Employees Following Breach

3. Dan Kaminsky’s Blog

Three posts we like from Dan Kaminsky’s Blog:

  1. I Might Be Afraid of This Ghost
  2. A Skeleton Key of Unknown Strength
  3. You Set The Rules

4. LiquidMatrix

Three posts we like from LiquidMatrix:

  1. Data Breach Victims or Enablers
  2. 5 Things a Revere, MA Upbringing Taught Me About InfoSec
  3. Summer of Breach 2012

5. Schneier on Security

Three posts we like from Schneier on Security

  1. The Value of Encryption
  2. In Praise of Security Theater
  3. How the NSA Threatens National Security

6. Graham Cluley

Three posts we like from Graham Cluley:

  1. How to Remove All Your Cookies, Cached Data, and Browsing History from Safari
  2. Judy Malware Campaign Victimized Android Users
  3. Android’ Design Shortcomings Allow For Cloak And Dagger Attacks

7. Security Bloggers Network

Three posts we like from Security Bloggers Network:

  1. Cosmetic Surgery Hacked
  2. How to Avoid Becoming a Victim of the Next Global Cyber Attack
  3. How to Recognize Phishing Emails

8. Hacking Articles

Check out this post from Hacking Articles:

  1. How to Detect Sniffer in your Network using shARP

9. Krebs on Security

Three posts we like from Krebs on Security:

  1. MolinaHealthcare.com Exposes Patient Records
  2. Online Cheating Website AshleyMadison Hacked
  3. Should Saas Companies Publish Customer Lists?

10. Teramind CEO Isaac Kohen Article Hub

Three posts we like from Isaac Kohen’s blog:

  1. Detecting + Deterring Insider Threats: How easy can it be?
  2. Crack the Human, Crack the Network
  3. The Human Factor in Cyber Security: Part 1

11. Daniel Miessler’s Information Security Blog

Three posts we like from Daniel Miessler’s blog:

1. A List of Machine Learning (ab)Use Cases
2. Learn the Difference Between Real and Fake Machine Learning
3. Predicting Human Behavior by Combining Public Sensor Data with Machine Learning

12. TaoSecurity

Three posts we like from TaoSecurity:

  1. Insider Threat Study
  2. Gartner Survey Ranks Threats
  3. Remembering When APT Became Public

13. Troy Hunt’s Blog

Three posts we like from Hunt’s Blog.

  1. Data breach disclosure 101: How to succeed after you’ve failed
  2. Here’s how I verify data breaches
  3. When a nation is hacked: Understanding the ginormous Philippines data breach

If you’re looking to dive deep into the information security realm, these information security blogs will give you effective insight into becoming an industry expert.

This article was originally published on IT Security Central.

VP of R&D for Teramind, a leading, global provider of employee monitoring, insider threat detection, and data loss prevention (DLP) solutions.