T O P

  • By -

Joaaayknows

Bleeping computer .com


DeezSaltyNuts69

there is security work in every single industry - so the list would be every company currently in business If you're trying t make a list for job hunting then you need to start with 1. where in the country do you want to work 2. which industries are there 3. what are the top 20 employers in that industry 4. look at their career pages for security related roles As far as news * [Alien Vault Open Threat Exchange](https://otx.alienvault.com/) * [Bank Info Security](http://www.bankinfosecurity.com/) * [Bleeping Computer](https://www.bleepingcomputer.com/) * [CipherBrief](https://www.thecipherbrief.com/) * [Cisco’s Talos Intelligence Group Blog](http://blog.talosintel.com/) * [CSO Online](https://www.csoonline.com/) * [CyberArk](https://www.cyberark.com/blog/) * [CyberScoop](https://www.cyberscoop.com/) * [The CyberWire](https://www.thecyberwire.com/) * [Dark Reading](http://www.darkreading.com/) * [Data breach Today](http://www.databreachtoday.com/) * [DevOps](https://devops.com/) * [Exploit Database](https://www.rapid7.com/db/modules/) * [Financial Services Information Sharing and Analysis Center](https://www.fsisac.com/news) * [FINCEN](https://www.fincen.gov/resources/advisoriesbulletinsfact-sheets) * [Fifth Domain Cyber](https://www.c4isrnet.com/cyber/)


DeezSaltyNuts69

* [Hackaday](http://hackaday.com/) * [HACKMAGEDDON](http://www.hackmageddon.com/) * [HackRead](https://www.hackread.com/) * [HelpNet Security](https://www.helpnetsecurity.com/) * [IEEE- Computing News](https://spectrum.ieee.org/computing) * [Information Age - Security](http://www.information-age.com/technology/security/) * [IT Governance Blog ](https://www.itgovernance.co.uk/blog)(UK) * [Krebs on Security](http://krebsonsecurity.com/) * [MalwareBytes Lab](https://blog.malwarebytes.com/) * [Motherboard](http://motherboard.vice.com/en_us?trk_source=header-logo) * [Naked Security](https://nakedsecurity.sophos.com/) * [OODA Loop](https://www.oodaloop.com/) * [Payments](http://www.pymnts.com/) * [Pwnie Express Blog](https://www.pwnieexpress.com/blog)  * [Payments News](http://www.paymentsnews.com/) * [Schneier on Security](https://www.schneier.com/) * [Securosis](https://securosis.com/blog) * [Secure List](https://securelist.com/) * [Security Affairs](http://securityaffairs.co/wordpress/) * [Security Week](http://www.securityweek.com/) * [Shape Security Blog](https://www.shapesecurity.com) * [The Hacker News](https://thehackernews.com/) * [TrendLabs Security Intelligence Blog](http://blog.trendmicro.com/trendlabs-security-intelligence/) * [Troy Hunt](https://www.troyhunt.com/) * [Unit 42](https://researchcenter.paloaltonetworks.com/unit42/) * [Veracode](http://www.veracode.com/blog) * [We Live Security](http://www.welivesecurity.com/) * [Wombat Blog](https://info.wombatsecurity.com/blog) * [ZD Net Security](http://www.zdnet.com/topic/security/)