Home Experience

Organizations

News & Reports

Verizon Data Breach Investigations Report

NIST Cybersecurity and Privacy Annual Report

Cisco Cybersecurity Report Series

Trend Micro Annual Reports (and other reports)

Varonis' Resources w/ Filters for Type, Industry, and Language

EU's European Network and Information Security Agency(ENISA) Threat Landscape

Cybersecurity & Information Systems Information Analysis Center (CSIAC) Resources

PurpleSec's Insights, Research, Templates, Samples, Statistics, Trends, and Tutorials

Cybersecurity Venture's Cybercrime Magazine

Australian Cyber Security Centre's Reports and Statistics

Becton, Dickinson, and Company's Annual Report and Templates

The State of Cybersecurity Resilience (annual report), along with other insights

Sophos' Security Threat Report

Trellix's Threat Reports

Interagency Security Committee (ISC) Annual Report"

New York State Department of Financial Services

Microsoft's Digital Defense Report

Crowdstrike's Resource Center

Crowdstrike's Public Policy Resource Center

IBM's annual Cost of a Data Breach report

Checkpoint's Cybersecurity Resources

Check Point Cyber Security Report

ISACA State of Cybersecurity Report

The Annual Cybersecurity Attitudes and Behaviors Report

Poneman Institute's Research Library

(CS)2AI KPMG Control System Cyber Security Annual Report

The DoD Cybersecurity Policy Chart

2020 International Comparative Legal Guide to Cybersecurity

Websites

WIRED

Forbes

Krebs on Security

BBC

S&P Global Market Intelligence

Cybersecurity and Infrastructure Security Agency (CISA)

Internet Initiative Japan - Japanese Internet Service Provider

ZDNet

The Record by Recorded Future

Ars Technica

Tech Crunch

ComputerWeekly

AT&T ThreatTraq

CERT – Carnegie Mellon University – Software Engineering Institute

Engadget

PC Magazine

Threatpost

The Next Web

The Register

Bleeping Computer

CPO Magazine

Decipher

The Verge

The Hacker News

Avast Blog

AppleInsider

Computing.co.uk

SiliconANGLE

TechRepublic

Tripwire

Graham Cluley

Infosecurity Magazine

Help Net Security

BGR

BankInfoSecurity

The Daily Swig

Computer Business Review

TechRadar

Naked Security by Sophos

CoinDesk

News – Cloud News Index

Security Now!

DataBreachToday

Dark Reading

New Scientist

Techdirt

Business Insider

CSO from IDG

WeLiveSecurity

BTCMANAGER

Motherboard Tech by Vice

SC Media

SecurityIntelligence

TechTarget

HackRead

SecurityWeek

Tom’s Guide

Security Boulevard

Tom’s Hardware

Gizmodo

Inverse.com

Cointelegraph

Security Affairs

BizTech

ExtremeTech

Complex.com

Recode – Vox

ReadWrite

Government Computer News

CNET

Slashdot

(ISC)^2

Anomali

Ben on Cyber-Sec

CIO Security

Cyber Defense Magazine

Cyware

FireEye

Fortinet

GBHackers

HackerOne

IT Security Guru

KitPloit

Latest Hacking News

QuickHeal

Schneier on Security

Sophos

Symantec

The Hacker News

Threatpost

ehacking.net

iTechHacks

Cyberscoop

 

from “Bits and Bolts: The Past, Present, and Future of Open Hardware” ebook

 

opensource.com

Open Hardware Week

NNMI

MakerBot

OS Vehicle Project

Tabby prototype cars

Joomla!

Beagleboard.com

MakerFaire

Embedded Linux Conference

Android Builders Summit

OSCON

CES

Linux Collaboration Summit

OpenROV

Replicape

Thing Printer

e-NABLE

All Things Open Conference

Open Source Software Institute

 

 

 

undefinedundefinedundefined