{"id":5018,"date":"2017-04-03T09:11:50","date_gmt":"2017-04-03T14:11:50","guid":{"rendered":"http:\/\/stgwww.capella.edu\/blogs\/cublog\/?p=5018"},"modified":"2017-04-03T09:53:38","modified_gmt":"2017-04-03T14:53:38","slug":"top-blogs-for-infosec-professionals","status":"publish","type":"post","link":"https:\/\/stgwww.capella.edu\/blogs\/cublog\/top-blogs-for-infosec-professionals\/","title":{"rendered":"7 Must-Read Blogs for Information Security Professionals [update]"},"content":{"rendered":"<p>Data breaches. Cybersecurity. Malware. As a professional in the information security space, you likely come across these topics on a regular basis. There\u2019s no better way to stay current on the latest information, trends, and resources in your field than to add these seven information security blogs to your must-read list.<\/p>\n<p>&nbsp;<\/p>\n<h4><em>1.\u00a0<a href=\"http:\/\/krebsonsecurity.com\/\">Krebs on Security<\/a><\/em><\/h4>\n<p>Brian Krebs is a former investigative journalist who breaks stories on all of the major cybersecurity breaches. From 1995 to 2009, Krebs was a <em>Washington Post<\/em> reporter who covered tech policy, privacy, and computer security, and authored the Security Fix\u00a0blog.<\/p>\n<p>His current blog,\u00a0Krebs on Security,\u00a0has made several of the top security blogs-to-read lists and is among the most well-known and respected in the space. Krebs is credited with <a href=\"mailto:http:\/\/www.zdnet.com\/article\/anatomy-of-the-target-data-breach-missed-opportunities-and-lessons-learned\/\">discovering the Target data breach<\/a> in 2015 and being the first to <a href=\"https:\/\/www.wired.com\/2011\/07\/how-digital-detectives-deciphered-stuxnet\/\">report on the Stuxnet worm<\/a> in 2010.<em>\u00a0<\/em><\/p>\n<p><strong>Featured post: <\/strong><a href=\"http:\/\/krebsonsecurity.com\/2016\/07\/cybercrime-overtakes-traditional-crime-in-uk\/\"><em>Cybercrime Overtakes Traditional Crime in UK<\/em><\/a><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h4><em>2.\u00a0<a href=\"https:\/\/nakedsecurity.sophos.com\/\">Naked Security Blog<\/a><\/em><\/h4>\n<p>Security hardware and software company <a href=\"https:\/\/www.sophos.com\/en-us.aspx\">Sophos<\/a> hosts the Naked Security blog. It is a \u201cthreat newsroom\u201d featuring computer security news, opinion pieces, advice, and research, as well as topics ranging from mobile security threats and operating systems to malware and company profiles.<\/p>\n<p>Naked Security is updated multiple times a day and receives around 1.5 million page views per month. It has won numerous awards dubbing it the\u00a0<a href=\"https:\/\/nakedsecurity.sophos.com\/about\/\">best current security blog<\/a>\u00a0on the web.<\/p>\n<p><strong>Featured post: <\/strong><a href=\"https:\/\/nakedsecurity.sophos.com\/2016\/07\/15\/microsoft-wins-email-privacy-battle-against-us-government\/\"><em>Microsoft Wins Email Privacy Battle Against US Government<\/em><\/a><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h4><em>3.\u00a0<a href=\"https:\/\/threatpost.com\/\">Threatpost<\/a><\/em><\/h4>\n<p>Threatpost is an independent news site for IT and business security. The editorial team frequently breaks important stories, aggregates relevant security news from other sources, and engages with readers to discuss the importance of emerging events.<\/p>\n<p>Threatpost offers articles, podcasts, and videos on topics like malware, mobile security, vulnerabilities, privacy, and much more.<\/p>\n<p>Threatpost has been highlighted by\u00a0<em>The New York Times<\/em>, <em>The Wall Street Journal<\/em>, MSNBC, <em>USA Today<\/em>, and\u00a0NPR\u00a0as a go-to source for security news.<\/p>\n<p><strong>Featured post: <\/strong><a href=\"https:\/\/threatpost.com\/academics-build-early-warning-ransomware-detection-system\/119288\/\"><em>Academics Build Early Warning Ransomware Detection System<\/em><\/a><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h4>4.\u00a0<a style=\"font-style: italic\" href=\"http:\/\/www.darkreading.com\/\">Dark Reading<\/a><\/h4>\n<p>Dark Reading is a widely-read cybersecurity site that brings together IT professionals, security researchers, and technology specialists. The blog features 10 main subject areas that drill deep into enterprise security challenges, such as Vulnerabilities &amp; Threats and Application Security.<\/p>\n<p>Dark Reading provides a wealth of timely, well-researched, and informative articles that encourage lively discussion.<\/p>\n<p><strong>Featured post: <\/strong><a href=\"http:\/\/www.darkreading.com\/threat-intelligence\/-profiles-of-the-top-7-bug-hunters-from-around-the-globe\/d\/d-id\/1326213\"><em>Profiles Of The Top 7 Bug Hunters From Around the Globe<\/em><\/a><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h4>5.\u00a0<a style=\"font-style: italic\" href=\"https:\/\/dankaminsky.com\/\">Dan Kaminsky\u2019s Blog<\/a><\/h4>\n<p>Dan Kaminsky\u00a0is a security researcher and chief scientist of White Ops, a firm specializing in detecting malware activity via\u00a0JavaScript. For more than a decade, Kaminsky has been a sought-after security researcher and has advised Fortune 500 companies like Cisco, Avaya, and Microsoft. \u00a0His blog features in-depth posts with insight on pressing security issues.<\/p>\n<p><strong>Featured post: <\/strong><a href=\"https:\/\/dankaminsky.com\/2016\/05\/03\/the-cryptographically-provable-con-man\/\"><em>The Cryptographically Provable Con Man<\/em><\/a><\/p>\n<p>&nbsp;<\/p>\n<h4><em>6. <a href=\"https:\/\/www.wired.com\/category\/security\/threatlevel\/\">Wired\u2019s Threat Level<\/a><\/em><\/h4>\n<p><a href=\"https:\/\/www.wired.com\/\">Wired<\/a> is a monthly magazine and online blog that focuses on how emerging technologies are shaping culture, business, politics and the economy. <em>Threat Level<\/em> discusses privacy and security issues.<\/p>\n<p><strong>Featured post: <\/strong><a href=\"https:\/\/www.wired.com\/2017\/01\/get-even-easier-hide-dark-web\/\"><em>It\u2019s About to Get Even Easier to Hide On the Dark Web<\/em><\/a><\/p>\n<p><em>\u00a0<\/em><\/p>\n<h4><em>\u00a07.\u00a0<\/em><a href=\"http:\/\/www.itsecurityguru.org\/\"><em>IT Security Guru<\/em><\/a><\/h4>\n<p>The <em>IT Security Guru<\/em> provides breaking IT and security news first thing in the morning, highlighting the top 10 IT stories from around the web. They also provide news from the editor, feature top \u201cgurus,\u201d and allow readers to contribute with opinion articles.<\/p>\n<p><strong>Featured post: <\/strong><a href=\"http:\/\/www.itsecurityguru.org\/2017\/01\/25\/survey-finds-quarter-enterprises-experienced-breach-past-year\/\"><em>Survey Finds a Quarter of Enterprises Experienced a Breach in the Past Year<\/em><\/a><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><em>Blogs are a great way to keep current on information security news and information. If you want to take your skills and knowledge to the next level, learn more about Capella University\u2019s information security programs:<\/em><\/p>\n<ul>\n<li><a href=\"http:\/\/www.capella.edu\/online-degrees\/bachelors-information-assurance-security\/\"><em>Bachelor\u2019s in Information Assurance and Security<\/em><\/a><\/li>\n<li><a href=\"http:\/\/www.capella.edu\/online-degrees\/certificate-information-assurance-security\/\"><em>Graduate Certificate in Information Assurance and Security<\/em><\/a><\/li>\n<li><a href=\"https:\/\/www.capella.edu\/online-degrees\/certificate-digital-forensics\/\"><em>Graduate Certificate in Digital Forensics<\/em><\/a><\/li>\n<li><a href=\"https:\/\/www.capella.edu\/online-degrees\/certificate-network-defense\/\"><em>Graduate Certificate in Network Defense<\/em><\/a><\/li>\n<li><a href=\"http:\/\/www.capella.edu\/online-degrees\/masters-digital-forensics\/\"><em>Master\u2019s in Digital Forensics<\/em><\/a><\/li>\n<li><a href=\"http:\/\/www.capella.edu\/online-degrees\/masters-network-defense\/\"><em>Master\u2019s in Network Defense<\/em><\/a><\/li>\n<\/ul>\n<p><em>\u00a0<\/em><\/p>\n<h6><a href=\"http:\/\/capellaresults.org\/outcomes.asp\"><em>Important information<\/em><\/a><em> about the educational debt, earnings, and completion rates of students who attended this program.<\/em><\/h6>\n<p><strong>\u00a0<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Are you an information security professional? Keep on top of the latest infosec news with these 7 blogs.<\/p>\n","protected":false},"author":81,"featured_media":5837,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[325],"tags":[40],"_links":{"self":[{"href":"https:\/\/stgwww.capella.edu\/blogs\/cublog\/wp-json\/wp\/v2\/posts\/5018"}],"collection":[{"href":"https:\/\/stgwww.capella.edu\/blogs\/cublog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stgwww.capella.edu\/blogs\/cublog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stgwww.capella.edu\/blogs\/cublog\/wp-json\/wp\/v2\/users\/81"}],"replies":[{"embeddable":true,"href":"https:\/\/stgwww.capella.edu\/blogs\/cublog\/wp-json\/wp\/v2\/comments?post=5018"}],"version-history":[{"count":5,"href":"https:\/\/stgwww.capella.edu\/blogs\/cublog\/wp-json\/wp\/v2\/posts\/5018\/revisions"}],"predecessor-version":[{"id":5842,"href":"https:\/\/stgwww.capella.edu\/blogs\/cublog\/wp-json\/wp\/v2\/posts\/5018\/revisions\/5842"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/stgwww.capella.edu\/blogs\/cublog\/wp-json\/wp\/v2\/media\/5837"}],"wp:attachment":[{"href":"https:\/\/stgwww.capella.edu\/blogs\/cublog\/wp-json\/wp\/v2\/media?parent=5018"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stgwww.capella.edu\/blogs\/cublog\/wp-json\/wp\/v2\/categories?post=5018"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stgwww.capella.edu\/blogs\/cublog\/wp-json\/wp\/v2\/tags?post=5018"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}