Most Popular Cybersecurity Blogs from 2023
Lohrman on Security
JANUARY 14, 2024
What were the top government technology and security blogs in 2023? The metrics tell us what cybersecurity and technology infrastructure topics were most popular.
This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Lohrman on Security
JANUARY 14, 2024
What were the top government technology and security blogs in 2023? The metrics tell us what cybersecurity and technology infrastructure topics were most popular.
Lohrman on Security
JANUARY 15, 2023
What were the top government technology and security blogs in 2022? The metrics don’t lie, and they tell us what cybersecurity and technology infrastructure topics were most popular.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Schneier on Security
APRIL 16, 2021
Security Boulevard recently listed the “Top-21 Cybersecurity Experts You Must Follow on Twitter in 2021.” My Twitter feed just mirrors my blog. (If ” I came in at #7. I thought that was pretty good, especially since I never tweet. If you are one of the 134K people who read me from Twitter, “hi.”).
Anton on Security
FEBRUARY 7, 2024
This is my completely informal, uncertified, unreviewed and otherwise completely unofficial blog inspired by my reading of our seventh Threat Horizons Report ( full version ) that we just released ( the official blog for #1 report , my unofficial blogs for #2 , #3 , #4 , #5 , #6 , #7 and #8 ).
The Last Watchdog
NOVEMBER 3, 2021
Last Watchdog’s mission is to foster useful understanding about emerging cybersecurity and privacy exposures. That’s why I’m thrilled to point out that Last Watchdog has been recognized, once again, as a trusted source of information on cybersecurity and privacy topics. We’ve been named one of the Top 10 cybersecurity webzines in 2021.
Anton on Security
OCTOBER 12, 2022
This is my completely informal, uncertified, unreviewed and otherwise completely unofficial blog inspired by my reading of our fourth Threat Horizons Report ( full version ) that we just released ( the official blog for #1 report , my unofficial blog for #2 , my unofficial blog for #3 ).
Anton on Security
JULY 7, 2022
This is my completely informal, uncertified, unreviewed and otherwise completely unofficial blog inspired by my reading of our third Threat Horizons Report ( full version ) that we just released ( the official blog for #1 report , my unofficial blog for #2 ). Google Cybersecurity Action Team Threat Horizons Report #3 Is Out!
Javvad Malik
NOVEMBER 3, 2021
Call this surprise cybersecurity pizza. Sell cybersecurity on the dark web – bad guys on the dark web also need cybersecurity. Give all of your sales people kazoos to make it seem like they are having fun when talking about cybersecurity. .” And then have soft symphonic music playing in the background.
The Last Watchdog
NOVEMBER 27, 2023
In cybersecurity, keeping digital threats at bay is a top priority. Automation matters in cybersecurity. Here are some reasons why the role of automation is crucial in cybersecurity: •Speed and accuracy: Cyber threats happen instantly and automation reacts quickly — much faster than humans. million people in the U.S.
Anton on Security
APRIL 13, 2023
This is my completely informal, uncertified, unreviewed and otherwise completely unofficial blog inspired by my reading of our sixth Threat Horizons Report ( full version ) that we just released ( the official blog for #1 report , my unofficial blogs for #2 , #3 , #4 and #5 ).
The Last Watchdog
MAY 30, 2022
It’s no secret that cybersecurity roles are in high demand. Today there are more than 500,000 open cybersecurity roles in the U.S., These individuals have many transferable skills that would make cybersecurity a prosperous civilian career. This experience can also be helpful when training cybersecurity talent.
The Last Watchdog
FEBRUARY 20, 2024
While AI chatbots have cybersecurity vulnerabilities, adopting proactive measures like secure development practices and regular assessments can effectively mitigate risks. About the essayist: Zac Amos writes about cybersecurity and the tech industry, and he is the Features Editor at ReHack.
The Last Watchdog
JUNE 13, 2022
At the start of this year, analysts identified a number of trends driving the growth of cybersecurity. billion in venture capital poured into cybersecurity companies globally. For a long time, enterprise customers have been dissatisfied with cybersecurity solutions for identity management. Last year saw an unprecedented $21.8
The Last Watchdog
MARCH 25, 2024
The National Institute of Standards and Technology (NIST) has updated their widely used Cybersecurity Framework (CSF) — a free respected landmark guidance document for reducing cybersecurity risk. It seeks to establish and monitor your company’s cybersecurity risk management strategy, expectations, and policy. The CSF 2.0
The Last Watchdog
MAY 8, 2023
There is no doubt there is a constant and growing concern amongst CEO’s, and particularly CISO’s, concerning the hiring of the cybersecurity talent their organizations require to safeguard against cyberattacks. According to Cybersecurity Ventures, by 2025 there will exist a gap of over 3.5 million unfilled cybersecurity positions.
The Last Watchdog
APRIL 26, 2022
In a recent survey of US-based CEOs, talent shortages and cybersecurity were listed as two of the top five business concerns in 2022. The bottom line: organizations with unfilled cybersecurity roles are leaving themselves vulnerable to the growing number of cyber threats. Today, there are more paths into cybersecurity than ever.
Security Boulevard
JULY 22, 2024
Emerging at the forefront of technological innovation, Generative AI is reshaping the landscape of cybersecurity defense with groundbreaking advancements. This blog delves into 5 Ways Generative AI is Revolutionizing Cybersecurity Defense and how we protect digital assets.
Krebs on Security
JULY 1, 2020
We’ve seen an ugly trend recently of tech news stories and cybersecurity firms trumpeting claims of ransomware attacks on companies large and small, apparently based on little more than the say-so of the ransomware gangs themselves. Such coverage is potentially quite harmful and plays deftly into the hands of organized crime.
The Last Watchdog
SEPTEMBER 25, 2023
If you’re a small business looking for the secret sauce to cybersecurity, the secret is out: start with a cybersecurity policy and make the commitment to security a business-wide priority. The average cost of a cybersecurity breach was $4.45 The average cost of a cybersecurity breach was $4.45 Stay proactive.
The Last Watchdog
JANUARY 24, 2022
The second area has to do with the cybersecurity talent shortage. AI digital assistants can help alleviate cybersecurity practitioners’ burnout and positively impact skill shortage and retention issues. AI helps avoid that by providing timely, relevant information and marketing prescriptions.
The Last Watchdog
MAY 2, 2023
The rising complexity and prevalence of cybersecurity threats are making experts anxious. Automation could alleviate the burden on IT teams and cybersecurity professionals by shouldering some monotonous, time-consuming tasks. These feelings are a side effect of cybersecurity burnout.
The Last Watchdog
MARCH 27, 2023
Organizations with strong cybersecurity cultures experience fewer cyberattacks and recover faster than others. For most organizations, building a cybersecurity culture is a necessary evil rather than a cherished goal. For most organizations, building a cybersecurity culture is a necessary evil rather than a cherished goal.
The Last Watchdog
APRIL 17, 2023
No organization is immune to cybersecurity threats. Related: Why timely training is a must-have That’s why businesses of all sizes need to understand the biggest cybersecurity weaknesses and take steps to mitigate them. Here are a few of the top security weaknesses that threaten organizations today: Poor risk management.
Schneier on Security
APRIL 27, 2023
Jim Dempsey, one of the workshop organizers, wrote a blog post on the report: As a first step, our report recommends the inclusion of AI security concerns within the cybersecurity programs of developers and users. The understanding of how to secure AI systems, we concluded, lags far behind their widespread adoption.
The Last Watchdog
DECEMBER 8, 2022
This overconfidence is cause for concern for many cybersecurity professionals as humans are the number one reason for breaches (how many of your passwords are qwerty or 1234five?). About the essayist: Mark Guntrip is senior director of cybersecurity strategy at Menlo Security , a Mountain View, Calif.-based Confidence gap.
The Last Watchdog
SEPTEMBER 21, 2022
This explains the rise and popularity of Zero Trust as a framework for securing networks in these new realities as an effective tool to drive cybersecurity initiatives within the entire enterprise. Looking to the future, the adoption of cybersecurity initiatives will remain high and continue to grow.
The Last Watchdog
JUNE 26, 2023
As the threat of cybercrime grows with each passing year, cybersecurity must begin utilizing artificial intelligence tools to better combat digital threats. However, the truth is that automated AI tools work best in the hands of cybersecurity professionals instead of replacing them.
NSTIC
OCTOBER 9, 2024
This blog is part of a larger NIST series during the month of October for Cybersecurity Awareness Month , called 'Staff Stories Spotlight.' This year’s Cybersecurity Awareness Month theme is ‘Secure our World.’ How does this theme resonate with you, as someone working in cybersecurity?
Jane Frankland
MAY 8, 2024
So where does AI stand in the realm of cybersecurity, and how can we leverage it for protection rather than harm? This is what I’ll be delving into in this blog, where I’ll be exploring how these two fields are intersecting and what that means for our digital landscape. This is where AI comes in as a potential game-changer.
NSTIC
OCTOBER 17, 2024
This blog is part of a larger NIST series during the month of October for Cybersecurity Awareness Month , called 'Staff Stories Spotlight.' This year’s Cybersecurity Awareness Month theme is ‘Secure our World.’ How does this theme resonate with you, as someone working in cybersecurity?
The Last Watchdog
APRIL 13, 2022
Cybersecurity and Infrastructure Security Agency (CISA) has started a campaign to increase awareness of these risks to U.S. Although there’s no one magic solution to eliminating cyberattacks and cybercrime risks, there are steps you can take to reduce the chances of becoming a victim. businesses called #ShieldsUp. The efficacy of hygiene.
NSTIC
OCTOBER 23, 2024
This blog is part of a larger NIST series during the month of October for Cybersecurity Awareness Month , called 'Staff Stories Spotlight.' This year’s Cybersecurity Awareness Month theme is ‘Secure our World.’ How does this theme resonate with you, as someone working in cybersecurity?
Schneier on Security
JANUARY 7, 2021
From a blog post : We generated a total of 600,000 samples by querying GPT-2 with three different sampling strategies. The rest of the blog post discusses the types of data they found. For example, we find that larger models are more vulnerable than smaller models. Each sample contains 256 tokens, or roughly 200 words on average.
NSTIC
OCTOBER 28, 2024
This blog is part of a larger NIST series during the month of October for Cybersecurity Awareness Month , called 'Staff Stories Spotlight.' This year’s Cybersecurity Awareness Month theme is ‘Secure our World.’ How does this theme resonate with you, as someone working in cybersecurity?
Heimadal Security
OCTOBER 25, 2024
A new version of the Qilin ransomware was discovered by cybersecurity researchers. Furthermore, encryption keys are protected using RSA-4096 with OAEP […] The post New Qilin Ransomware Variant Spotted by Cybersecurity Researchers appeared first on Heimdal Security Blog. The new variant is being tracked as Qilin.B
Schneier on Security
OCTOBER 17, 2023
Switzerland “solves” the problem of malicious insiders in their printing office by officially declaring that they won’t consider that threat model in their cybersecurity assessment. He explains it all in his blog post. To demonstrate this, I built a proof-of-concept demonstration.
Troy Hunt
FEBRUARY 4, 2021
But I digress; this week's update consists of some brief discussion around data breaches and yesterday's blog post on how I like to meet, followed by a lot of audience engagement on the topic of IoT. I really enjoyed that and it went on a lot longer than planned, I hope you get something out of it too.
The Last Watchdog
OCTOBER 24, 2022
In addition, educating employees about cybersecurity issues can help to reinforce the security-minded culture of the organization and change employee behaviour. Without it, a business is vulnerable to a variety of risks, including financial loss, damage to intellectual property, and brand reputation.
The Last Watchdog
JANUARY 8, 2023
About the essayist: Chris Reffkin is chief information security officer at cybersecurity software and services provider Fortra. He has deep experience implementing and overseeing security strategy for a myriad of top-tier organizations.
The Last Watchdog
JANUARY 3, 2023
Malicious online actors grow ever more sophisticated, making cybersecurity as big a concern for everyday consumers as it ever has been. At the start of 2023, consumers remain out in the cold when it comes to online protection. Related: Leveraging employees as human sensors.
Security Boulevard
AUGUST 6, 2024
On July 10th, the White House released Memorandum M24-14, giving administrative agencies guidance for cybersecurity priorities when building FY26 budgets. The […] The post White House Memo Pushes Federal Agencies on Cybersecurity appeared first on Security Boulevard.
Security Boulevard
JUNE 29, 2024
Reading Time: 5 min Third-party cookies on your Mac can track your browsing and expose you to cybersecurity threats. The post What Are the Cybersecurity Threats When Allowing Third-Party Cookies on Mac? Learn the risks and how to browse safely! appeared first on Security Boulevard.
Krebs on Security
APRIL 18, 2022
Cybersecurity & Infrastructure Security Agency (CISA), Zloader had a special relationship with Ryuk/Conti, acting as a preferred distribution platform for deploying Ryuk/Conti ransomware. Conti shames victims who refuse to pay a ransom by posting their internal data on their darkweb blog.
Security Boulevard
AUGUST 9, 2024
Every day, I dive into the complex world of cybersecurity, uncovering the hidden threats that hide in our digital lives. In this blog post, I want to share some standard techniques I use in my day-to-day job. The post Exploring the dynamic landscape of cybersecurity threats appeared first on Security Boulevard.
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content