Cyber Briefs
contact us at
World's Only Cyber Security News Aggregate
Index of Cyber Security Perceived Risk
Cyber Security Investment Index

United States News

Suggestions for Political Campaigns Using the Latest Digital Tools

The Quest to Rescue Security Research From the Ivory Tower

Vubiz Elearning Launches New Cyber Security Courses

Cybersecurity Standards Apply to Thee, Not Me

Obama’s Cyber Security Failure Creates a Greater Threat than ISIS - See more at:

How Cyber Attack on US Personnel Office Erodes Public Confidence

Students learn about cybersecurity at Cyber Sciences Summer Academy

VIR-SEC® Announces Kickstarter Campaign, Bringing Cyber-Security to Market Read more:

Watchdog: Evidence destroyed during probe of IRS targeting

Exclusive: Wave Systems CEO Discusses The Latest Trends In Cybersecurity Read more:

NIST tackles cybersecurity in the Smart City

All industries fail cybersecurity, govt the worst

UBS Says to Buy Only These 2 Stocks for Cybersecurity Read more: UBS Cybersecurity Stock Picks: Fortinet (NASDAQ: FTNT), Palo Alto Networks (NASDAQ:

U.S. Morning Links: Investors Lock In Cyber-Security Investments

'Fast Money' Recap: What to Buy After the Fed Announcement? Cyber Security Stocks

U.S. cyber hack unsettles, frustrates U.S. defense industry

US visa system won't be back online until at least next week

Pentagon seeks to hold its IT users more accountable for cyber missteps

Paramount Defenses Shares Advanced Cyber Security Insight for U.S. Government and Organizations Worldwide

Power management: Meter with cybersecurity protection upgrades for utilities, end-users


U.S. Department of Homeland Security

The White House

Department of Defense

United States Computer Emergency Readiness Team

Center for Internet Security

National Cyber Security Alliance

Cybersecurity -

Cybersecurity -

Cybersecurity -

The MITRE Corporation - Cybersecurity

Cybersecurity -

Cyber Security Awareness - NASCIO

Inside Cybersecurity

Information Systems Security Association

Cybersecurity for Small Business

FBI - Cyber Crime

Cybersecurity Framework

Cybersecurity -


Cyber Security Resources - NCUA

Cybersecurity -

Cyber Security Summit


The Wire - Cybersecurity

Cybersecurity -

Cybersecurity -

Cybersecurity Law Institute

Cybersecurity -

Federal Cybersecurity R&D

Cybersecurity -


Cybersecurity and Cyberwar: What Everyone Needs to Know

Cybersecurity Leadership: Powering the Modern Organization

Hacking: The Art of Exploitation, 2nd Edition

The Basics of Hacking and Penetration Testing, Second Edition: Ethical Hacking and Penetration Testing Made Easy

Rtfm: Red Team Field Manual

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Cyber War: The Next Threat to National Security and What to Do About It

Protecting Our Future: Educating a Cybersecurity Workforce

Cyberpower and National Security

Basic Security Testing with Kali Linux

Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World

Inside Cyber Warfare: Mapping the Cyber Underworld

The Devil Inside the Beltway: The Shocking Expose of the US Government's Surveillance and Overreach Into Cybersecurity, Medicine and Small Business

Network Security Bible

Behold a Pale Farce: Cyberwar, Threat Inflation, & the Malware Industrial Complex

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

Computer Security Fundamentals

Information Insecurity: A Survival Guide to the Uncharted Territories of Cyber-threats And Cyber-security

Permissionless Innovation: The Continuing Case for Comprehensive Technological Freedom

Using Social Media for Global Security

World News

India has to combat the ‘bloodless war” on cyber security: PM Modi

Cyber hacking on the rise for mining executives

A U.S. – China Cyber Détente?

Cyber security a business issue, CBI conference told

Intralinks®, Inc. becomes member of Cyber Security Council Germany


Chinese Lawmakers Pass New National Security Law Tightening Government's Cybersecurity And Territorial Control

DC Download: New Cybersecurity Labs, Women and Entrepreneurship Study

US Claims Progress in Cybersecurity Concerns with China

Cleaning Up the Federal Cyber Debacle

Report claims the Sony cyberattack was pretty much all Sony’s fault

Irony alert: Password-storing company is hacked

EU agrees on unified data security laws

VCs and startups are now paying attention to a vital thing they used to ignore

Reacting to Chinese hack, the government may not have followed its own cybersecurity rules

Canada government websites taken down in cyber attack

Intelligence hawks try to capitalize on Chinese hack to pass another bad cybersecurity bill

Cyber Security Experts Question Whether North Korea Acted Alone in Sony Hack

Tripwire Study: UK Executives Give Boards ‘A’ in Cyber Literacy

After China hack is discovered to include security files, White House tells agencies to lock down systems

Journals and Magazines

International Journal of Cyber-Security and Digital Forensics (IJCSDF)

National Cybersecurity Institute Journal,

Journal of Information Assurance & Cybersecurity

Journal of National Security Law & Policy

Cyber Security and Information Systems Information Analysis Center

Journal of Conflict & Security Law

Journal of Sensitive Cyber Research and Engineering (JSCoRE)

Harvard Law School National Security Journal

Journal of Cyber Security and Mobility

IT Security Journal

Computers & Security

Security Magazine

Cyber Defense Magazine

US Cyber Security Magazine

SC Magazine

Government Security News

Fed Tech Magazine

Digital Forensics Magazine


Government Security Magazine

Security News Portal

PC Magazine

PC World

Computing Now


Computer Security Basics

Security Managment

The Hacker News Magazine



TechRepublic – Security

Wired Threat Level

Zero Day from ZDNet

CERIAS Security Blog

Dark Reading

Google Online Security Blog

Red Tape Chronicles

InformationWeek Security

Internet Storm Center

Schneier On Security

Securelist Cyber Security Blog

Symantec Weblog

The Guardian’s Information Security Hub

Zone Alarm Cyber Security Blog

BH Consulting’s Security Watch Blog

Contagio Malware Dump

Cyber Crime & Doing Time

David Lacey’s IT Security Blog

Dell Secure Works

F-Secure Safe & Savvy Blog

Fox IT Security Blog

Fortinet Blog

Help Net Security

Infosecurity Magazine

Krebs On Security


McAfee Security Blog

Microsoft Malware Protection Center

Naked Security

Network Computing

SANA Institute AppSec Blog

Search Security

Securing The Human

Security Watch

Stop Badware Blog

Sucuri Blog

Tao Security

Techworld Security

The Honeynet Project


Threat Track Security

Veracode Blog

Unmasked Parasites blog

We Live Security

Xylibox Security Blog


Cyveillance Blog

Forbe's Firewall


Graham Cluley's Security Blog

GRC's Security Now Podcast


Imperva Blog

IT Knowledge Exchange - Security Bytes

Lenny Zeltser On Information Security

Network Security Blog with Martin McKeay

PandaLabs Cyber Security Blog


Privacy & Information Security Law Blog

Rational Survivability

Risky Business

Root Labs RDIST

Seculert Blog

Security Street by Rapid7

Securosis Blog

SilverSky Altitude Blog

SpiberLabs Security Blog

The Security Skeptic

Thought Crime Cyber Security Blog

Troy Hunt's Blog

1 Raindrop

Andrew Hay's Cyber Security Blog

Carnal Ownage

Command Line Kung Fu

Dancho Danchev's Blog


Errata Security

Exotic Liability

Hack Surfer

InfoSec Institute Resources

J4vv4D Security Blog

Liquid Matrix

Malcovery Security Blog

Malware Don't Need Coffee

McGrew Security Blog

Network Security Podcast

New School Security

NoVA Infosec

Packet Pushers Podcast

Security Affairs

Security Bisto

Security Geeks

Security Musings

Click here to take a Cyber Security Online course for FREE


Stock Ticker

Subscribe to our Daily Briefs Email

Subscribe to our DAILY BRIEFS to receive
the latest cyberbriefs news by email

Cyberbriefs Archive

Top Users Clicked

Visits to Cyberbriefs
Low                   High

Friday July 03, 2015

Total number of visitors : 17587
Past 24 hours: 31
Past 31 days: 1237
Past year: 16268

Send Cyber Briefs Suggestions and Tips: