May 24, 2024

Books & Blogs



  • Blockchain Revolution, Don Tapscott
  • Code Girls, Liza Mundy
  • The Cuckoo’s Egg, Cliff Stoll
  • Cyber War, Richard A. Clarke
  • Cyber Smart, Bart McDonough
  • Cybersecurity Career Master Plan, Dr. Gerald Auger
  • Future Crimes, Marc Goodman
  • Lights Out, Ted Koppel
  • Measuring and Managing Information Risk: a FAIR Approach, Jack Freund & Jack Jones
  • Sandworm, Andy Greenberg
  • Spam Nation, Brian Krebs
  • The Art of Invisibility, Kevin Mitnik
  • This is How They Tell Me the World Ends, Nicole Perlroth
  • Women Know Cyber, Steve Morgan & Di Freeze


  • Digital Fortress, Dan Brown
  • Girl With the Dragon Tattoo, Stieg Larsson (trilogy)
  • Threat Vector, Tom Clancy

More book listings:


Agio Inc.

Worth reading their Watch Commander’s Logs or their Healthcare blog page.

AT&T Security

The question of cybersecurity certifications comes up very frequently on discussion boards.  What is the best certificate to get?  Is a college degree better for getting a cybersecurity role?  What education or skills are needed for various cybersecurity roles?  And many, many more.  In this post, I’ll try to clarify some of these questions and more.

Blog on various cybersecurity career choices.

Bleeping Computer

Keeping you informed and protected on the Net. Bleeping Computer is an information security and technology news publication created in 2004. Millions of visitors come to every month to learn about the latest security threats, technology news, ways to stay protected online, and how to use their computers more efficiently.

CIO Security

CIO is the place where you find news, information technology articles, insight and analysis on major data breaches and online threats. Covering multiple aspects of world wide web, it provides in-depth, content rich information for IT professionals and normal users.


Weekly threat roundup


CSO Online

Cybersecurity Ventures, Steve Morgan

Reports, articles, blogs, interviews and more

Steve Morgan is founder and Editor-in-Chief at Cybercrime Magazine and Cybersecurity Ventures. His blogs and articles can be seen at CSO, DarkReading, Entrepreneur, Forbes, IDG, and others.

Cyber Seek

Hack the Gap: Close the cybersecurity talent gap with interactive tools and data

To help close the cybersecurity skills gap, CyberSeek provides detailed, actionable data about supply and demand in the cybersecurity job market.

Cybersecurity Career Pathway

There are many opportunities for workers to start and advance their careers within cybersecurity. This interactive career pathway shows key jobs within cybersecurity, common transition opportunities between them, and detailed information about the salaries, credentials, and skillsets associated with each role.

Cybersecurity Supply/Demand Heat Map

Cybersecurity talent gaps exist across the country. Closing these gaps requires detailed knowledge of the cybersecurity workforce in your region. This interactive heat map provides a granular snapshot of demand and supply data for cybersecurity jobs at the state and metro area levels, and can be used to grasp the challenges and opportunities facing your local cybersecurity workforce.

DARKReading encompasses 13 communities, each of which drills deeper into the enterprise security challenge: Analytics, Attacks & Breaches, Application Security, Careers and People, Cloud Security, Endpoint, IoT, Mobile, Operations, Perimeter, Risk, Threat Intelligence, and Vulnerabilities and Threats. Each community is led by editors and subject matter experts who collaborate with security researchers, technology specialists, industry analysts and other Dark Reading members to provide timely, accurate and informative articles that lead to spirited discussions.

Our goal is to challenge community members to think about security by providing strong, even unconventional points of view, backed by hard-nosed reporting, hands-on experience and the professional knowledge that comes only with years of work in the information security industry.

DARKReading Webinars:



Digital Forensics and Incident Response Blog Geared Toward Beginners.


Arm yourself with the best cybersecurity guidance to better understand — and protect — your critical infrastructure.


Information and insight on today’s advanced threats from the leader in advanced threat prevention.

Threat map:


Infosecurity Magazine

A one-stop-source for the information security industry. The magazine contains news articles, white papers, a list of upcoming events & conferences and a lot of webinars.

(ISC)² Blog

(ISC)² Cybersecurity Workforce Study

The (ISC)² Cybersecurity Workforce Study is conducted annually to assess the cybersecurity workforce gap, better understand the barriers facing the cybersecurity profession and uncover strategies that organizations can use to recruit, build and strengthen their cybersecurity teams. It provides insights on these talented individuals who are excelling in this profession, securing their organizations’ critical assets and advancing in their careers. This year’s study also offers the industry’s first known estimate of the number of cybersecurity professionals currently working in the field.

Krebs on Security, Brian Krebs

Cybersecurity journalism at its best.

Thinking of a Cybersecurity Career? Read This.

Microsoft Security Blog

Naked Security

Naked Security is the newsroom of Sophos, the well-known developer of computer security products. Lots of useful security news, opinions, advice and research.


Offensive Security

SANS Tip of the Day

Each day they post a new tip that focuses on and explains a specific topic and actionable steps people can take to protect themselves, their family and their organization.

Schneier on Security

SC Magazine

SC supplies information security professionals with a wide range of business and technical information resources. You’ll discover news articles, product reviews, white papers, videos and more.

Security Made Simple

This blog is focused on teaching Cybersecurity content in a simple way. The infosec topics covered including latest technologies, governance, learning platforms and security best practices.

Stay Safe Online

Learn how to protect yourself, your family and your devices with these tips and resources.

Stay Safe Online Blog


How to become a cybersecurity pro: A cheat sheet

The Hacker News

The Hacker News is the most popular, independent and trusted source for the latest news headlines on cybersecurity, hacking, computer security, cybercrime, privacy, vulnerabilities and technology for all businesses, information security professionals and hackers worldwide.


Troy Hunt

Troy Hunt’s blog showcases a lot of the different issues with which he is familiar. He is a Microsoft MVP and Pluralsight author whose credentials also include working with Pfizer. His blog posts focus on customer and individual user interfaces and security. Written with an approachable tone, this blog is a great one for the non-technical c-suite reader.

Veracode Blog

Focused on security at the application level.


Amongst the various reports they produce, it is worth subscribing to their annual Verizon Data Breach Investigations Report (DBIR).

Wired – Threat Level

Wired’s section on privacy, crime and security online is packed with articles and resources. Many of the stories have a national/international flavor.


Last but not least, a good resource on the latest cybersecurity news.

Find more security blogs:

Want to be a Guest?

Would you like to share your cybersecurity journey with our audience?  Submit your story by clicking on the button below.

Submit your story

Become a Sponsor

Would you like to gain visibility by having your logo on our website or an ad in our podcast?

Become a Sponsor