Curated references

Researchers & Security Blogs

Long-form analysis and research from established practitioners and security teams.

20 references

ReferenceURL
Schneier on Securityhttps://www.schneier.com/
Krebs on Securityhttps://krebsonsecurity.com/
Google Security Bloghttps://security.googleblog.com/
Microsoft Security Bloghttps://www.microsoft.com/en-us/security/blog/
Cloudflare Blog (Security)https://blog.cloudflare.com/tag/security/
Mandiant Bloghttps://www.mandiant.com/resources/blog
Unit 42 Bloghttps://unit42.paloaltonetworks.com/
Cisco Talos Bloghttps://blog.talosintelligence.com/
SANS Internet Storm Center (ISC)https://isc.sans.edu/
PortSwigger Web Security Bloghttps://portswigger.net/blog
Troy Hunt (blog)https://www.troyhunt.com/
Have I Been Pwnedhttps://haveibeenpwned.com/
EFF Deeplinkshttps://www.eff.org/deeplinks
Let’s Encrypt Bloghttps://letsencrypt.org/blog/
Tor Project Bloghttps://blog.torproject.org/
Signal bloghttps://signal.org/blog/
Microsoft SDLhttps://www.microsoft.com/en-us/securityengineering/sdl/
Google SRE book (security relevant)https://sre.google/books/
NCSC Passwordshttps://www.ncsc.gov.uk/collection/passwords
NCSC MFAhttps://www.ncsc.gov.uk/guidance/multi-factor-authentication-online-services