Index of Cyber Security Perceived Risk
Cyber Security Investment Index
 

United States News

Princeton University Releases First Draft of Book on Cryptocurrency Technologies

Cyber security and mining in the age of automation

Obama signs two executive orders on cybersecurity

Hackers publish contact info of 20,000 FBI employees

Ex-CEO On How His Silicon Valley Cybersecurity Firm Crashed

Will amended Cybersecurity Information Sharing Act leave Americans' personal data vulnerable?

DOJ Breach Overshadows Cybersecurity Budget Plan

NSA merging anti-hacker team that fixes security holes with one that uses them

Clinton Calls Cybersecurity ‘One of the Most Important Challenges’ for the Next President

Cybersecurity experts urge automakers to take steps to stop hackers

Building a Cyber Security Hub in Colorado Springs

NSA shake-up to unite spying, cybersecurity

Costly government cybersecurity system needs major changes

Age of the megabreach: How corporations are working towards cyber security & struggling

5 Blind Spots That Are Crippling Credit Union Cybersecurity Strategies

NASA probes AnonSec hack claims, denies that one of its drones was hacked

Help Wanted: 1,000 Cybersecurity Jobs At OPM, Post-Hack Hiring Approved By DHS

Mark as favorite Evaluating the Carson cybersecurity plan: Taking a scalpel to the federal bureaucracy?

Federal Government Confirms That It Still Sucks at Cyber Security

Why Dark DDoS Cyber Security Threat Will Grow in 2016


Websites

U.S. Department of Homeland Security

The White House

Department of Defense

United States Computer Emergency Readiness Team

Center for Internet Security

National Cyber Security Alliance

Cybersecurity - Delaware.gov

Cybersecurity - Colorado.gov

Cybersecurity - Michigan.gov

The MITRE Corporation - Cybersecurity

Cybersecurity - California.gov

Cyber Security Awareness - NASCIO

Inside Cybersecurity

Information Systems Security Association

Cybersecurity for Small Business

FBI - Cyber Crime

Cybersecurity Framework

Cybersecurity - Oklahoma.gov

TechNewsWorld

Cyber Security Resources - NCUA

Cybersecurity - Vermont.gov

Cyber Security Summit

CyberWatch

The Wire - Cybersecurity

Cybersecurity - Alabama.gov

Cybersecurity - Missouri.gov

Cybersecurity Law Institute

Cybersecurity - Pennsylvania.gov

Federal Cybersecurity R&D

Cybersecurity - Maryland.gov


Books

Cybersecurity Investments - Decision Support Under Economic

Weapons of Mass Psychological Destruction and the People Who Use Them

Cybersecurity and Cyberwar: What Everyone Needs to Know

Cybersecurity Leadership: Powering the Modern Organization

Hacking: The Art of Exploitation, 2nd Edition

The Basics of Hacking and Penetration Testing, Second Edition: Ethical Hacking and Penetration Testing Made Easy

Rtfm: Red Team Field Manual

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Cyber War: The Next Threat to National Security and What to Do About It

Protecting Our Future: Educating a Cybersecurity Workforce



World News

West Point cadets go online, undercover to fight ISIS

Premier League officials in talks with cyber-security experts to block illegal streaming of matches

Report examines the massive future cybersecurity problem of connected cars

9-Figure Deals Lift Cybersecurity Investments To An All-Time High

Detecting 'Multi-Stage' Cloud Cyber-Attacks from the Start

Top Cybercrime Ring Disrupted as Authorities Raid Moscow Offices

Imperva Falls to Earth as Cybersecurity Growth Comes at a Price

PSG Invests $96M In Skybox Security

Alibaba's Taobao Attacked by Hackers

India in talks with US on cyber security

Why You Really Need to Worry About Cyber Security

Contest introduces teens to booming field of cybersecurity

Error 53: This could completely shut down your iPhone, without warning

An inside look at what's driving the hacking economy

What did we learn about cybersecurity in 2015?

Historic New 'Privacy Shield' Agreement to Replace EU-US Safe Harbor

UN panel set to 'rule in Julian Assange's favour'

Cyber security sleuths warn about a new malware circulating in social media

Cybersecurity expert at Springs conference: Secure networks don't exist

Cyber attack on NSW Government department raises security fears


Journals and Magazines

International Journal of Cyber-Security and Digital Forensics (IJCSDF)

National Cybersecurity Institute Journal

Journal of Information Assurance & Cybersecurity

Journal of National Security Law & Policy

Cyber Security and Information Systems Information Analysis Center

Journal of Conflict & Security Law

Journal of Sensitive Cyber Research and Engineering (JSCoRE)

Harvard Law School National Security Journal

Journal of Cyber Security and Mobility


Blogs

CIO

TechRepublic – Security

Wired Threat Level

Zero Day from ZDNet

CERIAS Security Blog

http://www.darkreading.com/

Google Online Security Blog

Red Tape Chronicles

InformationWeek Security

Internet Storm Center

Schneier On Security

Securelist Cyber Security Blog

Symantec Weblog

The Guardian’s Information Security Hub

Zone Alarm Cyber Security Blog

BH Consulting’s Security Watch Blog

Contagio Malware Dump



Advertisement


               



Cyber Security Stock Ticker
 


Subscribe to our Daily Briefs Email



Subscribe to our DAILY BRIEFS to receive
the latest cyberbriefs news by email





Cyberbriefs Archive




Top Users Clicked


Visits to Cyberbriefs
Low                   High

Saturday February 13, 2016

Total number of visitors : 28487
Past 24 hours: 61
Past 31 days: 1692
Past year: 16095



Send suggestions, tips and links to add:

Advertisement
© All rights reserved – www.cyberbriefs.org