Curated references
Researchers & Security Blogs
Long-form analysis and research from established practitioners and security teams.
20 references
| Reference | URL |
|---|---|
| Schneier on Security | https://www.schneier.com/ |
| Krebs on Security | https://krebsonsecurity.com/ |
| Google Security Blog | https://security.googleblog.com/ |
| Microsoft Security Blog | https://www.microsoft.com/en-us/security/blog/ |
| Cloudflare Blog (Security) | https://blog.cloudflare.com/tag/security/ |
| Mandiant Blog | https://www.mandiant.com/resources/blog |
| Unit 42 Blog | https://unit42.paloaltonetworks.com/ |
| Cisco Talos Blog | https://blog.talosintelligence.com/ |
| SANS Internet Storm Center (ISC) | https://isc.sans.edu/ |
| PortSwigger Web Security Blog | https://portswigger.net/blog |
| Troy Hunt (blog) | https://www.troyhunt.com/ |
| Have I Been Pwned | https://haveibeenpwned.com/ |
| EFF Deeplinks | https://www.eff.org/deeplinks |
| Let’s Encrypt Blog | https://letsencrypt.org/blog/ |
| Tor Project Blog | https://blog.torproject.org/ |
| Signal blog | https://signal.org/blog/ |
| Microsoft SDL | https://www.microsoft.com/en-us/securityengineering/sdl/ |
| Google SRE book (security relevant) | https://sre.google/books/ |
| NCSC Passwords | https://www.ncsc.gov.uk/collection/passwords |
| NCSC MFA | https://www.ncsc.gov.uk/guidance/multi-factor-authentication-online-services |