SlideShare uma empresa Scribd logo
1 de 3
Anton Chuvakinhttp://feeds.feedburner.com/AntonChuvakinPersonalBlog

BankInfoSecurityhttp://feeds.feedburner.com/BankinfosecuritycomRssMain

Cisco Cyber Risk Report http://tools.cisco.com/security/center/cyberRiskReport_10.xml

Cisco Security Advisories http://newsroom.cisco.com/data/syndication/rss1/SecurityAdvisories_20.xml

CNet News Security http://feeds.feedburner.com/CNETNewsSecurity

CSO Online http://www.csoonline.com/feed/articles/cso

Cybercrime & Doing Time http://garwarner.blogspot.com/feeds/posts/default

DanchoDanchevhttp://feeds.feedburner.com/DanchoDanchevOnSecurityAndNewMedia

FAS Secrecy News http://www.fas.org/blog/secrecy/feed

FireEye Labs http://blog.fireeye.com/research/atom.xml

F-Secure Antivirus Research Weblog http://www.f-secure.com/weblog/weblog.rdf

GovInfoSecurity.com Articles RSS Feed http://feeds.feedburner.com/GovinfosecuritycomRssArticles

GovInfoSecurity.com Blogs RSS Feed http://feeds.feedburner.com/GovinfosecuritycomRssBlogs

Graham Cluley Blog (Sophos) http://feeds.sophos.com/en/rss2_0-sophos-graham-cluley.xml

Hack in the Box (HiTB) http://www.hackinthebox.org/backend.php

HelpNet Security Vulnerabilities http://www.net-security.org/dl/bck/vuln.rss

Honeybloghttp://honeyblog.org/feeds/index.rss2

Information Warfare Monitor http://www.infowar-monitor.net/?feed=rss2

Infosec Daily Podcast http://www.isdpodcast.com/feed/

Infosec Ramblings http://feeds.feedburner.com/InfosecRamblings

Infowar.com http://feeds.feedburner.com/Infowar-com

InfoWorld Security Central http://www.infoworld.com/taxonomy/term/2535/feed

Jart Armin http://www.jartarmin.com/index.php?format=feed&type=rss

Jeremiah Grossman http://feeds.feedburner.com/JeremiahGrossman

Kaspersky News http://www.kaspersky.com/rss/news
Krebs on Security http://krebsonsecurity.com/feed/

Malware Intelligence Blog http://malwareint.blogspot.com/feeds/posts/default

McAfee Avert Blogs http://feeds.feedburner.com/McafeeAvertLabsBlog

McAfee Security Insights Blog » George Kurtz http://siblog.mcafee.com/author/georgekurtz/feed/

Metasploit http://feeds.feedburner.com/metasploit/blog

Microsoft Security Bulletins http://www.microsoft.com/technet/security/bulletin/secrss.aspx

MoreOver Computer Security News http://p.moreover.com/cgi-
local/page?c=Computer%20security%20news&o=rss

Most Popular White Papers and WebcastsSecurity Research
http://www.bitpipe.com/data/bpXchange?b=blat_security&d=31&f=rss&u=rss

NetworkWorld Security http://www.networkworld.com/rss/security.xml

NIST IT Security News http://www.nist.org/nist_plugins/rss_menu/rss.php?1.3.

Pandalabs Blog http://pandalabs.pandasecurity.com/feed/

PentestIThttp://feeds.feedburner.com/PenTestIT/

RBNExploithttp://rbnexploit.blogspot.com/feeds/posts/default

RootSecurehttp://www.rootsecure.net/?p=rss_xml_feed&t=secnews&i=15

SANS Forensics http://feeds.feedburner.com/SANSForensics?format=xml

SANS Information Security Reading Room http://feeds.feedburner.com/SansInstituteRRLast25

SANS Internet Storm Center http://iscxml.sans.org/rssfeed_full.xml

Schneier on Security http://www.schneier.com/blog/index.rdf

SearchSecurity: Network Security Tactics
http://feeds.pheedo.com/techtarget/searchsecurity/networksecurity

SearchSecurity: Security Wire Daily News
http://feeds.pheedo.com/techtarget/Searchsecurity/SecurityWire

SearchSecurity: Threat Monitor http://feeds.pheedo.com/SearchsecurityThreatMonitor

SecureListhttp://www.securelist.com/en/rss/weblog

Security Database Tools Watch http://feeds.security-database.com/SecurityDatabaseToolsWatch
SecurityTracker Vulnerability Headlines
http://news.securitytracker.com/server/affiliate?61D319BD39309004

Sophos Latest Viruses http://feeds.sophos.com/en/rss2_0-sophos-latest-viruses.xml

Sophos Podcasts http://feeds.sophos.com/en/rss2_0-sophos-podcasts.xml

SophosLabs Blog http://feeds.sophos.com/en/rss2_0-sophos-sophoslabs-blog.xml

Sunbelt Blog http://feeds.feedburner.com/SunbeltBlog

Symantec Risks RSS Feed http://www.symantec.com/xml/rss/listings.jsp?lid=mixedsecurityrisks

Symantec Security Response Blog http://www.symantec.com/connect/feeds/srblog-external-en

Symantec Security Response Podcasts http://www.symantec.com/content/en/us/global/rss/sr/sr.xml

Symantec Threats RSS Feed http://www.symantec.com/xml/rss/listings.jsp?lid=latestthreats30days

Symantec Vulnerabilities RSS Feed http://www.symantec.com/xml/rss/listings.jsp?lid=advisories

TaoSecurityhttp://taosecurity.blogspot.com/atom.xml

Team Cymruhttp://www.team-cymru.org/News/secnews.rss

Tenable Security http://blog.tenablesecurity.com/atom.xml

The Dark Visitor http://www.thedarkvisitor.com/feed

TrendLabs Malware Blog http://feeds.trendmicro.com/Anti-MalwareBlog

US-CERT Current Activity http://www.us-cert.gov/current/index.atom

US-CERT Cyber Security Alerts and Tips http://www.us-cert.gov/channels/userdocs.rdf

US-CERT Cyber Security Tips http://www.us-cert.gov/channels/tips.rdf

US-CERT National Cyber Alert System http://www.us-cert.gov/channels/cas.rdf

US-CERT Technical Alerts and Bulletins http://www.us-cert.gov/channels/techdocs.rdf

WebSense Security Labs http://securitylabs.websense.com/content/alertsRSS.xml

Wired Threat Level http://www.wired.com/threatlevel/feed/

ZDNet Security http://feeds.feedburner.com/zdnetuk/news/security

Zone-H http://www.zone-h.org/rss/news

Mais conteúdo relacionado

Semelhante a Niels G's security websites list

NetVU Tech-4290/4390
NetVU Tech-4290/4390NetVU Tech-4290/4390
NetVU Tech-4290/4390jreverri
 
Innovating Together: the UX of Discovery
Innovating Together: the UX of DiscoveryInnovating Together: the UX of Discovery
Innovating Together: the UX of DiscoveryBohyun Kim
 
Список коротких ссылок на решения Cisco по безопасности
Список коротких ссылок на решения Cisco по безопасностиСписок коротких ссылок на решения Cisco по безопасности
Список коротких ссылок на решения Cisco по безопасностиCisco Russia
 
Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Nilesh Sapariya
 
Recent Trends in Cyber Security
Recent Trends in Cyber SecurityRecent Trends in Cyber Security
Recent Trends in Cyber SecurityAyoma Wijethunga
 
Maximo Application Suite 8.4 & 8.5 Learning & Resources Guide.PPTX
Maximo Application Suite 8.4 & 8.5 Learning & Resources Guide.PPTXMaximo Application Suite 8.4 & 8.5 Learning & Resources Guide.PPTX
Maximo Application Suite 8.4 & 8.5 Learning & Resources Guide.PPTXRajKumar813803
 
White Hats 1st Meeting
White Hats 1st MeetingWhite Hats 1st Meeting
White Hats 1st Meetingsophto92
 
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...PROIDEA
 
January Patch Tuesday 2019
January Patch Tuesday 2019January Patch Tuesday 2019
January Patch Tuesday 2019Ivanti
 
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...Casey Ellis
 
Mengenal Fitur Keamanan Dasar pada Windows 7
Mengenal Fitur Keamanan Dasar pada Windows 7Mengenal Fitur Keamanan Dasar pada Windows 7
Mengenal Fitur Keamanan Dasar pada Windows 7Aris Lesmana
 
RBI Cyber Security Guidelines- FixNix GRC
RBI Cyber Security Guidelines- FixNix GRCRBI Cyber Security Guidelines- FixNix GRC
RBI Cyber Security Guidelines- FixNix GRCFixNix Inc.,
 
A reading of the IBM Research 5-in-5 2018 Edition
A reading of the IBM Research 5-in-5 2018 EditionA reading of the IBM Research 5-in-5 2018 Edition
A reading of the IBM Research 5-in-5 2018 EditionPietro Leo
 
Francisco Jesús Gómez & Carlos Juan Diaz - Sinfonier: Storm Builder for Secur...
Francisco Jesús Gómez & Carlos Juan Diaz - Sinfonier: Storm Builder for Secur...Francisco Jesús Gómez & Carlos Juan Diaz - Sinfonier: Storm Builder for Secur...
Francisco Jesús Gómez & Carlos Juan Diaz - Sinfonier: Storm Builder for Secur...RootedCON
 
ECONOMIC BlogpostWrite an economic profile of Egypt country , .docx
ECONOMIC BlogpostWrite an economic profile of Egypt country , .docxECONOMIC BlogpostWrite an economic profile of Egypt country , .docx
ECONOMIC BlogpostWrite an economic profile of Egypt country , .docxmadlynplamondon
 
The IoT: Internet of Threats?
The IoT: Internet of Threats?The IoT: Internet of Threats?
The IoT: Internet of Threats?TechWell
 

Semelhante a Niels G's security websites list (20)

Security news 20151119
Security news 20151119Security news 20151119
Security news 20151119
 
NetVU Tech-4290/4390
NetVU Tech-4290/4390NetVU Tech-4290/4390
NetVU Tech-4290/4390
 
Innovating Together: the UX of Discovery
Innovating Together: the UX of DiscoveryInnovating Together: the UX of Discovery
Innovating Together: the UX of Discovery
 
Список коротких ссылок на решения Cisco по безопасности
Список коротких ссылок на решения Cisco по безопасностиСписок коротких ссылок на решения Cisco по безопасности
Список коротких ссылок на решения Cisco по безопасности
 
Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015
 
Recent Trends in Cyber Security
Recent Trends in Cyber SecurityRecent Trends in Cyber Security
Recent Trends in Cyber Security
 
Maximo Application Suite 8.4 & 8.5 Learning & Resources Guide.PPTX
Maximo Application Suite 8.4 & 8.5 Learning & Resources Guide.PPTXMaximo Application Suite 8.4 & 8.5 Learning & Resources Guide.PPTX
Maximo Application Suite 8.4 & 8.5 Learning & Resources Guide.PPTX
 
White Hats 1st Meeting
White Hats 1st MeetingWhite Hats 1st Meeting
White Hats 1st Meeting
 
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
 
Take Down
Take DownTake Down
Take Down
 
January Patch Tuesday 2019
January Patch Tuesday 2019January Patch Tuesday 2019
January Patch Tuesday 2019
 
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
 
How to use shodan more powerful
How to use shodan more powerful How to use shodan more powerful
How to use shodan more powerful
 
Mengenal Fitur Keamanan Dasar pada Windows 7
Mengenal Fitur Keamanan Dasar pada Windows 7Mengenal Fitur Keamanan Dasar pada Windows 7
Mengenal Fitur Keamanan Dasar pada Windows 7
 
RBI Cyber Security Guidelines- FixNix GRC
RBI Cyber Security Guidelines- FixNix GRCRBI Cyber Security Guidelines- FixNix GRC
RBI Cyber Security Guidelines- FixNix GRC
 
A reading of the IBM Research 5-in-5 2018 Edition
A reading of the IBM Research 5-in-5 2018 EditionA reading of the IBM Research 5-in-5 2018 Edition
A reading of the IBM Research 5-in-5 2018 Edition
 
Francisco Jesús Gómez & Carlos Juan Diaz - Sinfonier: Storm Builder for Secur...
Francisco Jesús Gómez & Carlos Juan Diaz - Sinfonier: Storm Builder for Secur...Francisco Jesús Gómez & Carlos Juan Diaz - Sinfonier: Storm Builder for Secur...
Francisco Jesús Gómez & Carlos Juan Diaz - Sinfonier: Storm Builder for Secur...
 
ECONOMIC BlogpostWrite an economic profile of Egypt country , .docx
ECONOMIC BlogpostWrite an economic profile of Egypt country , .docxECONOMIC BlogpostWrite an economic profile of Egypt country , .docx
ECONOMIC BlogpostWrite an economic profile of Egypt country , .docx
 
The IoT: Internet of Threats?
The IoT: Internet of Threats?The IoT: Internet of Threats?
The IoT: Internet of Threats?
 
Threat Hunting with Cyber Kill Chain
Threat Hunting with Cyber Kill ChainThreat Hunting with Cyber Kill Chain
Threat Hunting with Cyber Kill Chain
 

Mais de Bill Hagestad II

Hagestad xmlversion-120110170214-phpapp02
Hagestad xmlversion-120110170214-phpapp02Hagestad xmlversion-120110170214-phpapp02
Hagestad xmlversion-120110170214-phpapp02Bill Hagestad II
 
Future of Chinese Cyber Warfare
Future of Chinese Cyber WarfareFuture of Chinese Cyber Warfare
Future of Chinese Cyber WarfareBill Hagestad II
 
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場 Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場 Bill Hagestad II
 
China's People's Liberation Army force distribution 2015 中国人民解放军陆军
China's People's Liberation Army force distribution 2015  中国人民解放军陆军China's People's Liberation Army force distribution 2015  中国人民解放军陆军
China's People's Liberation Army force distribution 2015 中国人民解放军陆军Bill Hagestad II
 
Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队Bill Hagestad II
 
China’s clandestine services red dragon rising copyright 2015
China’s clandestine services red dragon rising copyright 2015  China’s clandestine services red dragon rising copyright 2015
China’s clandestine services red dragon rising copyright 2015 Bill Hagestad II
 
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructures4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructureBill Hagestad II
 
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...Bill Hagestad II
 
高技术战争 Gaojishu People's Liberation Army high tech war in 2014
高技术战争 Gaojishu People's Liberation Army high tech war in 2014高技术战争 Gaojishu People's Liberation Army high tech war in 2014
高技术战争 Gaojishu People's Liberation Army high tech war in 2014Bill Hagestad II
 
Weaponized malware comparison
Weaponized malware comparisonWeaponized malware comparison
Weaponized malware comparisonBill Hagestad II
 
Cyber Threat Taxonomy Matrix APR 2014
Cyber Threat Taxonomy Matrix APR 2014Cyber Threat Taxonomy Matrix APR 2014
Cyber Threat Taxonomy Matrix APR 2014Bill Hagestad II
 
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014Bill Hagestad II
 
사이버 보안의 이해 Intro to korean cyber security
사이버 보안의 이해 Intro to korean cyber security사이버 보안의 이해 Intro to korean cyber security
사이버 보안의 이해 Intro to korean cyber securityBill Hagestad II
 
Korean information security practices 보안 인식교육
Korean information security practices 보안 인식교육Korean information security practices 보안 인식교육
Korean information security practices 보안 인식교육Bill Hagestad II
 
Chinese hackers how to presentation投影片 1網路安全
Chinese hackers how to presentation投影片 1網路安全Chinese hackers how to presentation投影片 1網路安全
Chinese hackers how to presentation投影片 1網路安全Bill Hagestad II
 
No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502Bill Hagestad II
 
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoSBill Hagestad II
 
Red Dragon's CYBER Security RSS Feed .docx version
Red Dragon's CYBER Security RSS Feed .docx versionRed Dragon's CYBER Security RSS Feed .docx version
Red Dragon's CYBER Security RSS Feed .docx versionBill Hagestad II
 

Mais de Bill Hagestad II (18)

Hagestad xmlversion-120110170214-phpapp02
Hagestad xmlversion-120110170214-phpapp02Hagestad xmlversion-120110170214-phpapp02
Hagestad xmlversion-120110170214-phpapp02
 
Future of Chinese Cyber Warfare
Future of Chinese Cyber WarfareFuture of Chinese Cyber Warfare
Future of Chinese Cyber Warfare
 
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場 Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
 
China's People's Liberation Army force distribution 2015 中国人民解放军陆军
China's People's Liberation Army force distribution 2015  中国人民解放军陆军China's People's Liberation Army force distribution 2015  中国人民解放军陆军
China's People's Liberation Army force distribution 2015 中国人民解放军陆军
 
Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队
 
China’s clandestine services red dragon rising copyright 2015
China’s clandestine services red dragon rising copyright 2015  China’s clandestine services red dragon rising copyright 2015
China’s clandestine services red dragon rising copyright 2015
 
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructures4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
 
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
 
高技术战争 Gaojishu People's Liberation Army high tech war in 2014
高技术战争 Gaojishu People's Liberation Army high tech war in 2014高技术战争 Gaojishu People's Liberation Army high tech war in 2014
高技术战争 Gaojishu People's Liberation Army high tech war in 2014
 
Weaponized malware comparison
Weaponized malware comparisonWeaponized malware comparison
Weaponized malware comparison
 
Cyber Threat Taxonomy Matrix APR 2014
Cyber Threat Taxonomy Matrix APR 2014Cyber Threat Taxonomy Matrix APR 2014
Cyber Threat Taxonomy Matrix APR 2014
 
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
 
사이버 보안의 이해 Intro to korean cyber security
사이버 보안의 이해 Intro to korean cyber security사이버 보안의 이해 Intro to korean cyber security
사이버 보안의 이해 Intro to korean cyber security
 
Korean information security practices 보안 인식교육
Korean information security practices 보안 인식교육Korean information security practices 보안 인식교육
Korean information security practices 보안 인식교육
 
Chinese hackers how to presentation投影片 1網路安全
Chinese hackers how to presentation投影片 1網路安全Chinese hackers how to presentation投影片 1網路安全
Chinese hackers how to presentation投影片 1網路安全
 
No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502
 
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
 
Red Dragon's CYBER Security RSS Feed .docx version
Red Dragon's CYBER Security RSS Feed .docx versionRed Dragon's CYBER Security RSS Feed .docx version
Red Dragon's CYBER Security RSS Feed .docx version
 

Último

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

Niels G's security websites list

  • 1. Anton Chuvakinhttp://feeds.feedburner.com/AntonChuvakinPersonalBlog BankInfoSecurityhttp://feeds.feedburner.com/BankinfosecuritycomRssMain Cisco Cyber Risk Report http://tools.cisco.com/security/center/cyberRiskReport_10.xml Cisco Security Advisories http://newsroom.cisco.com/data/syndication/rss1/SecurityAdvisories_20.xml CNet News Security http://feeds.feedburner.com/CNETNewsSecurity CSO Online http://www.csoonline.com/feed/articles/cso Cybercrime & Doing Time http://garwarner.blogspot.com/feeds/posts/default DanchoDanchevhttp://feeds.feedburner.com/DanchoDanchevOnSecurityAndNewMedia FAS Secrecy News http://www.fas.org/blog/secrecy/feed FireEye Labs http://blog.fireeye.com/research/atom.xml F-Secure Antivirus Research Weblog http://www.f-secure.com/weblog/weblog.rdf GovInfoSecurity.com Articles RSS Feed http://feeds.feedburner.com/GovinfosecuritycomRssArticles GovInfoSecurity.com Blogs RSS Feed http://feeds.feedburner.com/GovinfosecuritycomRssBlogs Graham Cluley Blog (Sophos) http://feeds.sophos.com/en/rss2_0-sophos-graham-cluley.xml Hack in the Box (HiTB) http://www.hackinthebox.org/backend.php HelpNet Security Vulnerabilities http://www.net-security.org/dl/bck/vuln.rss Honeybloghttp://honeyblog.org/feeds/index.rss2 Information Warfare Monitor http://www.infowar-monitor.net/?feed=rss2 Infosec Daily Podcast http://www.isdpodcast.com/feed/ Infosec Ramblings http://feeds.feedburner.com/InfosecRamblings Infowar.com http://feeds.feedburner.com/Infowar-com InfoWorld Security Central http://www.infoworld.com/taxonomy/term/2535/feed Jart Armin http://www.jartarmin.com/index.php?format=feed&type=rss Jeremiah Grossman http://feeds.feedburner.com/JeremiahGrossman Kaspersky News http://www.kaspersky.com/rss/news
  • 2. Krebs on Security http://krebsonsecurity.com/feed/ Malware Intelligence Blog http://malwareint.blogspot.com/feeds/posts/default McAfee Avert Blogs http://feeds.feedburner.com/McafeeAvertLabsBlog McAfee Security Insights Blog » George Kurtz http://siblog.mcafee.com/author/georgekurtz/feed/ Metasploit http://feeds.feedburner.com/metasploit/blog Microsoft Security Bulletins http://www.microsoft.com/technet/security/bulletin/secrss.aspx MoreOver Computer Security News http://p.moreover.com/cgi- local/page?c=Computer%20security%20news&o=rss Most Popular White Papers and WebcastsSecurity Research http://www.bitpipe.com/data/bpXchange?b=blat_security&d=31&f=rss&u=rss NetworkWorld Security http://www.networkworld.com/rss/security.xml NIST IT Security News http://www.nist.org/nist_plugins/rss_menu/rss.php?1.3. Pandalabs Blog http://pandalabs.pandasecurity.com/feed/ PentestIThttp://feeds.feedburner.com/PenTestIT/ RBNExploithttp://rbnexploit.blogspot.com/feeds/posts/default RootSecurehttp://www.rootsecure.net/?p=rss_xml_feed&t=secnews&i=15 SANS Forensics http://feeds.feedburner.com/SANSForensics?format=xml SANS Information Security Reading Room http://feeds.feedburner.com/SansInstituteRRLast25 SANS Internet Storm Center http://iscxml.sans.org/rssfeed_full.xml Schneier on Security http://www.schneier.com/blog/index.rdf SearchSecurity: Network Security Tactics http://feeds.pheedo.com/techtarget/searchsecurity/networksecurity SearchSecurity: Security Wire Daily News http://feeds.pheedo.com/techtarget/Searchsecurity/SecurityWire SearchSecurity: Threat Monitor http://feeds.pheedo.com/SearchsecurityThreatMonitor SecureListhttp://www.securelist.com/en/rss/weblog Security Database Tools Watch http://feeds.security-database.com/SecurityDatabaseToolsWatch
  • 3. SecurityTracker Vulnerability Headlines http://news.securitytracker.com/server/affiliate?61D319BD39309004 Sophos Latest Viruses http://feeds.sophos.com/en/rss2_0-sophos-latest-viruses.xml Sophos Podcasts http://feeds.sophos.com/en/rss2_0-sophos-podcasts.xml SophosLabs Blog http://feeds.sophos.com/en/rss2_0-sophos-sophoslabs-blog.xml Sunbelt Blog http://feeds.feedburner.com/SunbeltBlog Symantec Risks RSS Feed http://www.symantec.com/xml/rss/listings.jsp?lid=mixedsecurityrisks Symantec Security Response Blog http://www.symantec.com/connect/feeds/srblog-external-en Symantec Security Response Podcasts http://www.symantec.com/content/en/us/global/rss/sr/sr.xml Symantec Threats RSS Feed http://www.symantec.com/xml/rss/listings.jsp?lid=latestthreats30days Symantec Vulnerabilities RSS Feed http://www.symantec.com/xml/rss/listings.jsp?lid=advisories TaoSecurityhttp://taosecurity.blogspot.com/atom.xml Team Cymruhttp://www.team-cymru.org/News/secnews.rss Tenable Security http://blog.tenablesecurity.com/atom.xml The Dark Visitor http://www.thedarkvisitor.com/feed TrendLabs Malware Blog http://feeds.trendmicro.com/Anti-MalwareBlog US-CERT Current Activity http://www.us-cert.gov/current/index.atom US-CERT Cyber Security Alerts and Tips http://www.us-cert.gov/channels/userdocs.rdf US-CERT Cyber Security Tips http://www.us-cert.gov/channels/tips.rdf US-CERT National Cyber Alert System http://www.us-cert.gov/channels/cas.rdf US-CERT Technical Alerts and Bulletins http://www.us-cert.gov/channels/techdocs.rdf WebSense Security Labs http://securitylabs.websense.com/content/alertsRSS.xml Wired Threat Level http://www.wired.com/threatlevel/feed/ ZDNet Security http://feeds.feedburner.com/zdnetuk/news/security Zone-H http://www.zone-h.org/rss/news