Online security is becoming an increasingly vital concern for both individuals and businesses. Keeping up-to-date with the latest online security news, updates, tips, and hacking cases is pivotal to ensuring you keep your personal and company data safe.
Whether you’re just looking to catch up to speed for yourself, or you’re after some online security solutions for your company, there are countless resources on the web for you to peruse.
Below, we’ve selected 11 online security blogs which are excellent sources of information on everything you should learn about online security.
Got a favorite online security blog that we missed? Send an email to email@example.com – and we’ll add to the list with reader favorites!
The Register is a UK-based website with a cheeky tagline: “Biting the hand that feeds IT.” Their Security section is the place you’ll want to head if you want to read exposés of big companies and governments acting unscrupulously when it comes to cyber security.
Three posts we like from The Register:
- No way, RSA! Security conference’s mobile app embarrassingly insecure
- Oh, baby! Newborn-care website leaves database of medics wide open
- Chinese web giant finds Windows zero-day, stays schtum on specifics
Want a simple way to keep up with the latest news on online hacking scandals and cases? The Hacker News is your one-stop shop for all the news you need to know, as soon as it breaks.
Three posts we like from The Hacker News:
- Flaw in LinkedIn AutoFill Plugin Lets Third-Party Sites Steal Your Data
- Over 20 Million Users Installed Malicious Ad Blockers From Chrome Store
- ‘iTunes Wi-Fi Sync’ Feature Could Let Attackers Hijack Your iPhone, iPad Remotely
You may already read CIO for their business insights, but did you know they have a fantastic security blog section which features, “Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands”? If you haven’t already, bookmark it today.
Three posts we like from CIO:
- Shed light on your dark data before GDPR comes into force
- 5 must-ask questions for complying with GDPR’s ‘Right to be Forgotten’
- Digital exhaust royalty: will it solve some of Facebook and Google’s personal data usage travails?
Describing itself as an “Industry leading DLP plus data-centric Endpoint Detection and Response (EDR) all from a single cloud-delivered, big-data analytics service,” Digital Guardian is as well-versed as they come in online security matters. We highly recommend checking out their blog, which is updated daily with informative and compelling cyber security articles.
Three posts we like from Digital Guardian:
- What is a Data Repository?
- 35 of the Best Information Security Podcasts to Follow
- Don’t Get Hooked: How to Recognize and Avoid Phishing Attacks (Infographic)
ScienceSoft’s Information Security Blog is a great source for trusted and up-to-date news and articles on Information Security. ScienceSoft is an IBM Gold Business Partner with 15+ years of experience in Information Security, so they have plenty of expertise in Information Security. We recommend reading through some of their other blog categories as well, such as the CIO Blog.
Three posts we like from ScienceSoft’s Information Security Blog:
- A Step-by-Step Guide to Secure Software Development
- The Threats Artificial Intelligence Poses to Cybersecurity
- Information security breaches? – Security event sources to blame
We’re guessing that a good portion of people haven’t ever heard of Google’s Security Blog – let alone read it. As the giant of the search engine world, Google’s Security Blog is Google’s means of keeping users updated about its latest efforts to keep browsing sessions and Google services secured.
Three posts we like from Google’s Security Blog:
- Leveraging AI to protect our users and the web
- DNS over TLS support in Android P Developer Preview
- Android Security 2017 Year in Review
As a tech lover’s bible, PCMag is well-known for covering all things tech including games, gadgets, and computers. But for those wanting to get straight to business and purchase online security software, check out their security software reviews, which run through the latest and most popular new products on the market.
Three posts we like from PCMag:
As a cloud security company, ThreatStack is an ideal company to turn to when you’re looking for expert insights about how to enhance security when using cloud services. You’ll learn everything from SecOps best practices, to evaluating how secure your cloud operations really are.
Three posts we like from ThreatStack:
- Understanding Shared Responsibility For a SaaS Environment
- The Threat Stack Cloud SecOps Program: Why We Built It & How It Can Help Your Organization Become More Secure
- How to Make SecOps Work in the Real World
Security Affairs will likely become a blog you keep coming back to because it’s incredibly well curated. Winner of 2016 Best European Personal Security Blog award, it’s the perfect mixture of investigative journalism and advice.
Three posts we like from Security Affairs:
- Take These Steps to Secure Your WordPress Website Before It’s Too Late
- Experts spotted spam campaigns delivering XTRAT and DUNIHI backdoors bundled with the Adwind RAT
- CVE-2018-0229 flaw in SAML implementation threatens Firepower, AnyConnect and ASA products
This is one blog that will stop and make you think. In fact, it will stop and make you rethink your behavior online, and make you see all of the little and big mistakes you’ve unknowingly made which compromise your online security. An eye-opening read to say the least.
Three posts we like from Krebs on Security:
- Adobe, Microsoft Push Critical Security Fixes
- Don’t Give Away Historic Details About Yourself
- Deleted Facebook Cybercrime Groups Had 300,000 Members
Without a doubt, The Last Watchdog is one of the most original online security blogs out there. Created and run by Pulitzer-winning journalist Byron V. Acohido, The Last Watchdog is a hugely fascinating read for those who are after meticulously researched cybersecurity blog posts that will encourage you to reconsider your approach (and that of others!).
Three posts we like from the Last Watchdog:
- Q&A: How to prepare for Spectre, Meltdown exploits — and next-gen ‘microcode’ attacks
- MY TAKE: Why Google’s move to label non-HTTPS sites ‘not secure’ is a good thing
- Why companies need a strategy to manage compliance, now more than ever