The inside scoop on the never-ending effort to fight the black hatters who plague our computers.
35) Schneier on Security
Is there a more famous security guru than Bruce Schneier? Whats impressive about his blog is the expansive reach of subject matter: software, hardware, the Net, privacy, as well as security issues in a larger societal context.
36) Network Security Blog
Longtime blogger Martin McKeay holds forth on spammers, hackers, black-hatters, and the good IT folks who work to keep them at bay.
Privacy, app security, physical and home security, Securosis offers thoughtful analysis with a hefty dose of uncensored opinion.
38) Mike Rothmans Security Incite
Covers the information security marketplace and also offers comment on major security news stories.
39) Brian Krebss Security Fix
Backed by the reporting chops of the Washington Post, Security Fix is a deep and widely inclusive resource. Very well done.
40) Rational Survivability
Big time insight about risk management and disruptive innovation. As proof of his street cred, blogger Chris Hoff wrote the infamous DNS Debacle poem: A few months ago/ Kaminsky discovered a flaw / It was with DNS/ It was nasty and raw.
41) Stiennon on Security
A well known name in the security business, Richard Stiennon pens pithy commentary about enterprise security.
42) Microsoft Security Response Center
All the bulletins and updates youll need (or at least most of them) for Microsoft security vulnerabilities. Sign up for a notification so you dont need to check in regularly.
43) Danger Room
National security coverage written and reported with a high profile reputation. Ive even heard the Pentagon keeps on eye on this blog.
44) Tao Security
The personal blog of Richard Bejtlich, director of incident response for General Electric. He gets around and knows how to share his insights.
46) Mark Colliers VoIP Security Blog
A deep resource on the unique security challenges posed by voice over Internet communication protocols which will clearly be an ever-bigger issue in the years ahead.
Actively combats the bad guys who put out viruses and other malware that threatens our PCs. (If you're a bad guy, you'd best fear me.) Some quite entertaining stuff.
48) Kim Camerons Identity Weblog
Cameron, the architect of Identity and Access at Microsoft, offers some important and smart thoughts about protecting yourself against the epidemic of identity theft.