g33k247 / my-information-assurance

Automatically exported from code.google.com/p/my-information-assurance

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

ARS Technica Security http://arstechnica.com/security/

Attack and Threat Maps: CTF365 https://ctf365.com/pages/map

Digital DDOS Attacks http://www.digitalattackmap.com/#anim=1&color=0&country=ALL&time=16245&view=map

Deutsch Telekom http://www.sicherheitstacho.eu/

ESET Virus Map http://www.virus-radar.com/

Fire Eye Attack Map https://www.fireeye.com/cyber-map/threat-map.html

Fortintet Threat Map http://threatmap.fortiguard.com/?ref=producthunt

IBM X-Force https://exchange.xforce.ibmcloud.com/

Kapersky 3D http://cybermap.kaspersky.com/

Malware Global http://globe.cyberfeed.net/

Norse Attack Map http://map.norsecorp.com/

Carnal0wnage & Attack Research Blog http://carnal0wnage.blogspot.com/

Center for Internet Security http://www.cisecurity.org/

CERIAS/Spaf http://www.cerias.purdue.edu/site/blog/author/spaf

Contagio Malware Dump http://contagiodump.blogspot.com/

Controls:

20 Critical Security Controls https://www.sans.org/critical-security-controls/

STIG Viewer NIST http://www.stigviewer.com/controls/800-53

CSO Online http://www.csoonline.com/

Cyber Crime & Doing Time http://garwarner.blogspot.com/

Cyber Security Canon https://www.paloaltonetworks.com/threat-research/cybercanon.html

The Cyber Wire http://www.thecyberwire.com/index.html

Cyber War Zone http://cyberwarzone.com/

Cyveillance Blog https://blog.cyveillance.com/

Dark Reading http://www.darkreading.com/

DFIR http://www.digitalforensicsmagazine.com/

DHS:

Daily Report http://dhs-daily-report.blogspot.com/

DHS Portal http://www.dhs.gov/topic/cybersecurity?utm_source=frequent_page&utm_medium=web&utm_campaign=dhs_frp

DSL Reports http://www.dslreports.com/forum/security,1

ESET Threat Blog http://blog.eset.com/

F-Secure Blog http://www.f-secure.com/weblog/

Fire Eye Malware Intel Lab http://blog.fireeye.com/research/

Fortinet Blog http://blog.fortinet.com/

Guardian Online http://www.theguardian.com/media-network/information-security

Google:

Google Safety Center https://www.google.com/safetycenter/everyone/start/

Google Security Blog http://googleonlinesecurity.blogspot.com/

Gov Security http://www.govinfosecurity.com/

The Hacker News http://thehackernews.com/

Help Net Security http://www.net-security.org/

HP Security Research http://www8.hp.com/us/en/software-solutions/security-research/

(ISC)2 http://blog.isc2.org/isc2_blog/

Info Sec Island http://www.infosecisland.com/

Krebs on Security http://krebsonsecurity.com/

Malcovery Security http://www.malcovery.com/blog/

Malware Domain List Forum http://www.malwaredomainlist.com/forums/index.php?PHPSESSID=1629054e913cb2ca8f0c59ffa27e9e94&board=13.0

Malware Don't Need Coffee http://malware.dontneedcoffee.com/

Microsoft Malware Protection Center http://blogs.technet.com/mmpc/default.aspx

Naked Security (Sophos) https://nakedsecurity.sophos.com/

NIST:

NIST Publications http://csrc.nist.gov/publications/index.html

NVD https://nvd.nist.gov/

Penetration Testing:

Pen Test Tools https://pentest-tools.com/blog/

Phishing:

Know B 4 http://www.knowbe4.com/

Phish Tank http://www.phishtank.com/

RAND on Cyber Warfare http://www.rand.org/topics/cyber-warfare.html

Reddit Netsec http://www.reddit.com/r/netsec/

SANS:

SANS Portal http://portal.sans.org/

Infosec Handlers Diary https://isc.sans.edu//diary.html

Internet Storm Center http://isc.sans.org/

Reading Room https://www.sans.org/reading-room/

Securing the Human http://www.securingthehuman.org/blog

SC Magazine http://www.scmagazine.com/

SCADA Hacker https://scadahacker.com/

Schneier on Security http://www.schneier.com/blog/

SecureWorks? http://www.secureworks.com/resources/blog/research/

Security Tube http://www.securitytube.net/

Security Week http://www.securityweek.com/

Securosis http://securosis.com/blog

SIGNAL Magazine Cyber http://www.afcea.org/content/?q=taxonomy/term/5361

Spamtitan Blog http://solutions.webtitan.com/

Steve Gibson/Security Now https://www.grc.com/securitynow.htm

Stop Badware http://blog.stopbadware.org/

Symantec Response Blog http://www.symantec.com/business/security_response/weblog/

System Forensics http://www.sysforensics.org/

Tao Security http://taosecurity.blogspot.com/

Tech Target http://searchsecurity.techtarget.com/

Tenable Security http://www.tenable.com/blog

Tools:

Online Domain Tools http://online-domain-tools.com/

Trend Micro Blog http://blog.trendmicro.com/

Trip Wire http://www.tripwire.com/state-of-security/topics/latest-security-news/

UMUC Cyber Program http://www.umuc.edu/cybersecurity/index.cfm

US-CERT https://www.us-cert.gov/

Vulnerabilities:

CVE http://cve.mitre.org/cve/index.html

OSVDB http://www.osvdb.org/

Like what you've seen so far? There's more at: Top 100 Cyber Resources http://ddosattackprotection.org/blog/cyber-security-blogs/

About

Automatically exported from code.google.com/p/my-information-assurance