Since launching 12 years ago, Bankless Times has brought unbiased news and leading comparison in the crypto & financial markets. Our articles and guides are based on high quality, fact checked research with our readers best interests at heart, and we seek to apply our vigorous journalistic standards to all of our efforts.
BanklessTimes.com is dedicated to helping customers learn more about trading, investing and the future of finance. We accept commission from some of the providers on our site, and this may affect where they are positioned on our lists. This affiliate advertising model allows us to continue providing content to our readers for free. Our reviews are not influenced by this and are impartial. You can find out more about our business model here.
Top 20 Cyber Security Blogs To Help Protect Yourself Online
According to data from WeSecureApp, April 2023 saw 4.3 million records worldwide compromised by data breaches. These included breaches from companies as well-known as Western Union and KFC, and across a broad spectrum of industries. With data breaches becoming ever more common, one of the best ways that both companies and individuals can stay on top of recent developments and safeguard their information is by looking to industry experts for guidance and tips.
At BanklessTimes.com, we’ve shared our top 20 blogs in the cybersecurity industry, featuring computer security experts from America to Australia. From teams of developers working at the forefront of the cybersecurity industry to specialists that helped develop the first antivirus software back in the 90s, our list has it all:
Graham Cluley
Graham Cluley is an award-winning keynote speaker on computer security and co-host of the Smashing Security podcast, which was named as 2022’s Most Entertaining. His blog style is just as irreverent and Graham has been uploading posts daily since his blog’s inception in 2006. As a programmer who worked on the first ever version of Dr Solomon’s Antivirus Toolkit for Windows back in the 90s, Graham has decades of experience in computer security and offers his own advice and opinions on recent news and developments in the industry. Graham also shares his writing for the bitdefender and Tripwire blogs and his podcast is uploaded onto the blog weekly.
Social Media: Twitter
Must Read: Plenty of Juice Jacking Scare Stories, But Precious Little Juice Jacking
Troy Hunt
Troy is perhaps best known for running the website “Have I Been Pwned” which allows users to search across multiple data breaches to see if their email address or phone number has been compromised. The Microsoft Regional Director has been blogging since 2009 and uploads weekly updates from the Gold Coast of Australia. Troy’s weekly updates are typically in the form of chatty and informative YouTube videos, and although he mainly covers data breaches and cyber security issues, Troy isn’t afraid to get personal, also sharing insights on divorce and home renovations.
Social Media: Twitter
Must Read: How to Succeed After You’ve Failed
Imperva
Imperva is a data-security platform with over ten years’ experience in fighting the bad bots. The team based in Bracknell, UK have also run a blog since 2009 which they update every couple of days. The blog gives an interesting insight into the behind-the-scenes work which goes on at Imperva, with their Red Team posting findings and software vulnerabilities and other team members sharing insights into why certain industries might be targeted by cyber criminals more than others. Although the blog is aimed for their clients, computer-security professionals will find the insights into what goes on on-the-job particularly interesting.
Social Media: Facebook
Must Read: Imperva Red Team Discovers Vulnerability in TikTok
Veracode
Veracode is another software security company with a blog that offers behind-the-scenes insight into the industry. Veracode has an interesting origin story with CTO, Chris Wysopal, an initial member of the hacker group L0pht who testified before congress in 1998 to expose the lack of software and network security. In 2006, Chris co-founded Veracode to invent a way to prevent malicious actors from exploiting vulnerabilities, and his team have been running their blog since 2007, posting on average once a week. While Veracode often writes about their new products or fixes, there are also some informative posts on secure coding and security flaws in software.
Social Media: Twitter
Must Read: What Are The Security Implications of AI Coding?
Trend Micro
Trend Micro are the creators of Cleaner One: an app that reduces system clutter, junk, duplicate and unwanted files on your mac. Although, Cleaner One also has an application for Windows, Apple is where this team’s specialisation lies – as evidenced on the blog. First started in 2020, the posts are written by team member, Louis and although posting can be sporadic there is usually a new post every fortnight. Louis’s writing style is informative and concise, covering everything from software reviews to how-to guides.
Social Media: Twitter
Must Read: How to Surf The Dark Web
Upguard
Upguard needs no introduction – their software allows businesses to monitor and protect themselves against cybersecurity issues and data breaches, and the team have also been running a blog since 2021. You can easily subscribe to the blog to stay updated, with posts on average every couple of days and covering a wide range of categories from third-party risk management to cybersecurity and DevOps. The is one of the most informative blogs in the industry with snappy writing, paired with easy-to-follow infographics and explanatory YouTube videos.
Social Media: Facebook
Must Read: The Role of Cybersecurity in Blockchain Technology
Flying Penguin
What has a flying penguin got to do with anything, you might ask? The penguin comes from author Davi Ottenheimer’s work with Linux in 1995 and the fact that the seabird flies by flapping its fins underwater. Davi felt this paradigm shift was a great fit for a website on information security and a subtle reminder to always consider alternative perspectives when hoping to achieve velocity in business. Davi has more than 17 years’ experience in managing global security operations and started Flying Penguin in 2002. As the founder of poetry.org he pairs his takes on information security with poetry and offers insight into his other hobbies, food, history and sailing. Davi shares updates daily and sometimes posts several times a day.
Social Media: Davi Ottenheimer
Must Read: “When You Buy an Apple Product You Don’t Expect it to be in a Testing Phase”
Heimdal Security
The team behind Copenhagen-based Heimdal Security have been running an insightful blog since 2014. The CEO of the company, Morten Kjærsgaard, regularly offers his insights, while writing is shared across all staff members. Posts provide insight into the latest cybersecurity trends, as well as advice on what companies can do themselves to stay vigilant. The blog is updated daily and the short-snappy posts make for a quick and easy read.
Social Media: Facebook
Must Read: How to Create a Successful Cybersecurity Culture
Erdal Ozkaya
Dr Erdal Ozkaya has been blogging since 2005 and posts on average once a week. The part-time lecturer at Australia’s Charles Sturt University has been named as one of the top 50 technology leaders by IDC and CIO Online. Dr Ozkaya is committed to delivering accurate and accessible resources to inform individuals and organisations of cybersecurity and privacy matters in the internet age. While the majority of his posts relate to cybersecurity issues, Erdal regularly shares information about his industry events and the financial sector as well as issues related to cloud computing.
Social Media: Instagram
Must Read: Cybersecurity Predictions for 2023
Seqrite
Indian-based Seqrite has been providing companies with cybersecurity solutions since 2015. Its blog was started at around the same time and features posts from Sanjay Katkar, the Joint Managing Director and Chief Technology Officer, and Jayesh Kulkarni, the Security Researcher. The duo post on average every couple of weeks, covering a vast range of cybersecurity issues from malware attacks to ransomware. The posts are informative and to-the-point with an average reading time of three minutes per post.
Social Media: Twitter
Must Read: Healthcare on High Alert
Daniel Miessler
Daniel Miessler is a leader in the cybersecurity industry and the founder of Unsupervised Learning, a weekly update that condenses 20 hours of security, AI and tech analysis into just ten minutes. His clean-cut blog offers readers a more comprehensive look into the relevant issues, and special mention must go to his eye-catching graphics. Daniel has been blogging since 1999 and his content has featured on both the WSJ and BBC. Many of his more recent posts relate to AI and in particular ChatGPT, though he has touched on topics as diverse as the best way to disagree with people.
Social Media: Twitter
Must Read: The AI Attack Surface Map v1.0
IT Security Guru
The IT Security Guru isn’t just one person but a collection of people from all over the world coming together to share the latest IT security news stories. Although posting is sporadic and largely depends on how many contributors they have lined up, new blogs usually appear every few days. The UK-based magazine has now been running for over a decade and has in the past featured insights from security specialists, such as Darren Guccione, CEO at Keeper Security, and Vina Nguyen, a Cybersecurity Subject Matter Specialist.
Social Media: Twitter
Must Read: Why is Cybersecurity Vital for Small Businesses?
SC Magazine
SC Magazine was set up in 2008 by CyberRisk Alliance, an organisation formed to help cybersecurity professionals face the challenges and obstacles that threaten the success and prosperity of their organisations. Leaders can come together on SC Magazine and share the latest resources, perspectives and software reviews relating to cybersecurity – there is even a section devoted to industry podcasts. With such a wide range of contributors, there are usually several new blog posts a day covering everything from cybercrime to asset management.
Social Media: Twitter
Must Read: The Rise of the Cyber-Resilient Leader
Infosecurity Magazine
Infosecurity Magazine has been running for over 12 years with the goal of providing knowledge and insight into the information security industry. The magazine provides free educational content, as well as an established webinar channel and a whitepaper syndication program. Infosecurity also hosts several industry events, making the magazine something of a one-stop shop for information security professionals. News articles are updated several times throughout the day by the Infosecurity Magazine’s own roving team of news reporters and overseen by Editor Beth Maundrill.
Social Media: Twitter
Must Read: Thousands of Social Media Takedowns Hit People Smugglers
The Hacker News
The Hacker News is followed by 3.45+ million users and is one of the most trusted cybersecurity news platforms. The Hacker News was launched over a decade ago and as an independent news source they’re proud to offer unbiased and comprehensive coverage of the industry. Their readership is largely made up of IT Security Professionals with 70% of them coming from North America and Europe. Blogs are uploaded several times a day covering everything from data breaches to cyber-attacks and THN also send out a daily newsletter every morning.
Social Media: Facebook
Must Read: Does Your Help Desk Know Who’s Calling?
Information Security Buzz
Information Security Buzz is an independent resource that provides expert commentary, opinion and analysis on the latest information security news. Blogs alternate between posts from the ISBuzz team and guest posts from industry experts, such as David Emm, Principal Security Researcher at Kaspersky, and Professor John Walker from Nottingham Trent University. There are typically a couple of posts per day and those wishing to contribute their ideas can apply to register as an expert with the website. Overall the site has boasted more than a thousand guest authors since it was launched in 2013.
Social Media: Twitter
Must Read: 12 Ways to Protect Small Businesses from Cyber Attacks
Schneier
Bruce Schneier is a public-interest technologist working at the intersection of technology, security and people. A fellow at Harvard’s Kennedy School, Bruce has been blogging since 2004 and generally updates every couple of days, covering everything from accountability to zero-day vulnerabilities. Bruce’s writing style is short and to the point; some of his updates are less than two lines long yet still manage to contain a concise amount of information. Readers can also subscribe to his monthly newsletter, which has been running since 1998.
Social Media: Facebook
Must Read: Terrorists Don’t Do Movie Plots
Dark Reading
Dark Reading is not only one of the most widely read cybersecurity websites, but it is also the most trusted online community for security professionals. Run by Editor-in-Chief, Kelly Jackson Higgins, since 2008, Dark Reading posts fall into one of fourteen categories, from analytics to vulnerabilities and threats. There are also two feature sections, The Edge, and Dark Reading Technology which are led by editors and subject matter experts to feature timely, accurate and informative content. Typically new blog posts are uploaded several times a day, but the Dark Reading newsletter provides a weekly commentary.
Social Media: Twitter
Must Read: What I Wish I Knew at the Start of my InfoSec Career
KrebsonSecurity
Brian Krebson got into cybersecurity accidentally in 2001 after his entire home-network was taken over by a Chinese hacking group. Vowing to learn as much as he could about internet security, his blog is a by-product of this obsession. Brian updates on a bi-weekly basis from his home in Northern Virginia and isn’t afraid to name and shame cyber criminals. He also covers the latest industry news and relevant software updates. When he isn’t blogging, Brian can be found learning Russian or practising the guitar.
Social Media: Twitter
Must Read: Interview with a Crypto Scam Investment Spammer
WeSecureApp
WeSecureApp is rated as one of the top five security companies on Clutch and specialise in creating secure eco-systems for businesses, naming themselves the guardians of technology. The Texas-based company also runs its own blog, and has done since 2017, which it updates on average once a week. Featuring simple flow-charts and infographics the topics include everything from Blockchain technology to lists of the world’s worst passwords.
Social Media: Twitter
Must Read: How to Prepare for a Data Breach Before it Happens
With a wealth of information, alternative viewpoints and disparate backgrounds, these bloggers may all come at cybersecurity from different directions, but the underlying message is the importance of protecting both your and your client’s information from cybersecurity attacks and data breaches. We at Bankless Times feel fortunate to belong to an industry in which so many experts and communities dedicate their time and energy to producing free resources that help us to do just that.
Choosing the Best Blogs from Cybersecurity Specialists
With hundreds of cybersecurity specialists dotted all over the world, it’s not surprising that we had a lot of blogs to choose from. To give you an insight into our selection process, these are the criteria that we looked at when deciding which blogs to include in our top 20: