Publications tagged `CYBERSECURITY`
|A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. In a nutshell, we are the largest InfoSec publication on Medium.
|PC Magazine: redefining technology news and reviews since 1982.
|Insights into the world of threat intelligence, cybercrime and IT security. Brought to you by researchers at Symantec.
|Cybersecurity from the trenches, written by Kevin Beaumont. Opinions are of the author alone, not their employer.
|This is the official blog for MITRE ATT&CK®, the MITRE-developed, globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The full website is located at https://attack.mitre.org.
|ASecuritySite: When Bob Met Alice
|This publication brings together interesting articles related to cyber security.
|Hedera Hashgraph Blog
|Hedera is a decentralized public network where anyone can carve out a piece of cyberspace to transact, play, and socialize in a secure, trusted environment.
|New skills for a new world
|SFU Professional Master’s Program in Computer Science
|This is an unofficial publication written and maintained by students in the Professional Master’s Program in the School of Computing Science at Simon Fraser University. To learn more about this unique program, please visit https://sfu.ca/computing/pmp
|Anton on Security
|A new start for my security blog. Also see our podcast at bit.ly/CloudSecPodcast
|A collection of write-ups for various systems.
|Uber Privacy & Security
|Insights and updates from Uber’s security and privacy teams
|Connecting the global application security community to enterprises.
|Independent Security Evaluators
|Security specialists that provide custom services including security assessments and software development. ISE also runs IoT Village, which hosts talks by expert security researchers and hacking contests.
|The Internet Privacy Expert discussing the latest news about privacy and internet security.