SlideShare une entreprise Scribd logo
1  sur  3
Anton Chuvakinhttp://feeds.feedburner.com/AntonChuvakinPersonalBlog

BankInfoSecurityhttp://feeds.feedburner.com/BankinfosecuritycomRssMain

Cisco Cyber Risk Report http://tools.cisco.com/security/center/cyberRiskReport_10.xml

Cisco Security Advisories http://newsroom.cisco.com/data/syndication/rss1/SecurityAdvisories_20.xml

CNet News Security http://feeds.feedburner.com/CNETNewsSecurity

CSO Online http://www.csoonline.com/feed/articles/cso

Cybercrime & Doing Time http://garwarner.blogspot.com/feeds/posts/default

DanchoDanchevhttp://feeds.feedburner.com/DanchoDanchevOnSecurityAndNewMedia

FAS Secrecy News http://www.fas.org/blog/secrecy/feed

FireEye Labs http://blog.fireeye.com/research/atom.xml

F-Secure Antivirus Research Weblog http://www.f-secure.com/weblog/weblog.rdf

GovInfoSecurity.com Articles RSS Feed http://feeds.feedburner.com/GovinfosecuritycomRssArticles

GovInfoSecurity.com Blogs RSS Feed http://feeds.feedburner.com/GovinfosecuritycomRssBlogs

Graham Cluley Blog (Sophos) http://feeds.sophos.com/en/rss2_0-sophos-graham-cluley.xml

Hack in the Box (HiTB) http://www.hackinthebox.org/backend.php

HelpNet Security Vulnerabilities http://www.net-security.org/dl/bck/vuln.rss

Honeybloghttp://honeyblog.org/feeds/index.rss2

Information Warfare Monitor http://www.infowar-monitor.net/?feed=rss2

Infosec Daily Podcast http://www.isdpodcast.com/feed/

Infosec Ramblings http://feeds.feedburner.com/InfosecRamblings

Infowar.com http://feeds.feedburner.com/Infowar-com

InfoWorld Security Central http://www.infoworld.com/taxonomy/term/2535/feed

Jart Armin http://www.jartarmin.com/index.php?format=feed&type=rss

Jeremiah Grossman http://feeds.feedburner.com/JeremiahGrossman

Kaspersky News http://www.kaspersky.com/rss/news
Krebs on Security http://krebsonsecurity.com/feed/

Malware Intelligence Blog http://malwareint.blogspot.com/feeds/posts/default

McAfee Avert Blogs http://feeds.feedburner.com/McafeeAvertLabsBlog

McAfee Security Insights Blog » George Kurtz http://siblog.mcafee.com/author/georgekurtz/feed/

Metasploit http://feeds.feedburner.com/metasploit/blog

Microsoft Security Bulletins http://www.microsoft.com/technet/security/bulletin/secrss.aspx

MoreOver Computer Security News http://p.moreover.com/cgi-
local/page?c=Computer%20security%20news&o=rss

Most Popular White Papers and WebcastsSecurity Research
http://www.bitpipe.com/data/bpXchange?b=blat_security&d=31&f=rss&u=rss

NetworkWorld Security http://www.networkworld.com/rss/security.xml

NIST IT Security News http://www.nist.org/nist_plugins/rss_menu/rss.php?1.3.

Pandalabs Blog http://pandalabs.pandasecurity.com/feed/

PentestIThttp://feeds.feedburner.com/PenTestIT/

RBNExploithttp://rbnexploit.blogspot.com/feeds/posts/default

RootSecurehttp://www.rootsecure.net/?p=rss_xml_feed&t=secnews&i=15

SANS Forensics http://feeds.feedburner.com/SANSForensics?format=xml

SANS Information Security Reading Room http://feeds.feedburner.com/SansInstituteRRLast25

SANS Internet Storm Center http://iscxml.sans.org/rssfeed_full.xml

Schneier on Security http://www.schneier.com/blog/index.rdf

SearchSecurity: Network Security Tactics
http://feeds.pheedo.com/techtarget/searchsecurity/networksecurity

SearchSecurity: Security Wire Daily News
http://feeds.pheedo.com/techtarget/Searchsecurity/SecurityWire

SearchSecurity: Threat Monitor http://feeds.pheedo.com/SearchsecurityThreatMonitor

SecureListhttp://www.securelist.com/en/rss/weblog

Security Database Tools Watch http://feeds.security-database.com/SecurityDatabaseToolsWatch
SecurityTracker Vulnerability Headlines
http://news.securitytracker.com/server/affiliate?61D319BD39309004

Sophos Latest Viruses http://feeds.sophos.com/en/rss2_0-sophos-latest-viruses.xml

Sophos Podcasts http://feeds.sophos.com/en/rss2_0-sophos-podcasts.xml

SophosLabs Blog http://feeds.sophos.com/en/rss2_0-sophos-sophoslabs-blog.xml

Sunbelt Blog http://feeds.feedburner.com/SunbeltBlog

Symantec Risks RSS Feed http://www.symantec.com/xml/rss/listings.jsp?lid=mixedsecurityrisks

Symantec Security Response Blog http://www.symantec.com/connect/feeds/srblog-external-en

Symantec Security Response Podcasts http://www.symantec.com/content/en/us/global/rss/sr/sr.xml

Symantec Threats RSS Feed http://www.symantec.com/xml/rss/listings.jsp?lid=latestthreats30days

Symantec Vulnerabilities RSS Feed http://www.symantec.com/xml/rss/listings.jsp?lid=advisories

TaoSecurityhttp://taosecurity.blogspot.com/atom.xml

Team Cymruhttp://www.team-cymru.org/News/secnews.rss

Tenable Security http://blog.tenablesecurity.com/atom.xml

The Dark Visitor http://www.thedarkvisitor.com/feed

TrendLabs Malware Blog http://feeds.trendmicro.com/Anti-MalwareBlog

US-CERT Current Activity http://www.us-cert.gov/current/index.atom

US-CERT Cyber Security Alerts and Tips http://www.us-cert.gov/channels/userdocs.rdf

US-CERT Cyber Security Tips http://www.us-cert.gov/channels/tips.rdf

US-CERT National Cyber Alert System http://www.us-cert.gov/channels/cas.rdf

US-CERT Technical Alerts and Bulletins http://www.us-cert.gov/channels/techdocs.rdf

WebSense Security Labs http://securitylabs.websense.com/content/alertsRSS.xml

Wired Threat Level http://www.wired.com/threatlevel/feed/

ZDNet Security http://feeds.feedburner.com/zdnetuk/news/security

Zone-H http://www.zone-h.org/rss/news

Contenu connexe

Similaire à Niels G's security websites list

NetVU Tech-4290/4390
NetVU Tech-4290/4390NetVU Tech-4290/4390
NetVU Tech-4290/4390jreverri
 
Innovating Together: the UX of Discovery
Innovating Together: the UX of DiscoveryInnovating Together: the UX of Discovery
Innovating Together: the UX of DiscoveryBohyun Kim
 
Список коротких ссылок на решения Cisco по безопасности
Список коротких ссылок на решения Cisco по безопасностиСписок коротких ссылок на решения Cisco по безопасности
Список коротких ссылок на решения Cisco по безопасностиCisco Russia
 
Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Nilesh Sapariya
 
Recent Trends in Cyber Security
Recent Trends in Cyber SecurityRecent Trends in Cyber Security
Recent Trends in Cyber SecurityAyoma Wijethunga
 
Maximo Application Suite 8.4 & 8.5 Learning & Resources Guide.PPTX
Maximo Application Suite 8.4 & 8.5 Learning & Resources Guide.PPTXMaximo Application Suite 8.4 & 8.5 Learning & Resources Guide.PPTX
Maximo Application Suite 8.4 & 8.5 Learning & Resources Guide.PPTXRajKumar813803
 
White Hats 1st Meeting
White Hats 1st MeetingWhite Hats 1st Meeting
White Hats 1st Meetingsophto92
 
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...PROIDEA
 
January Patch Tuesday 2019
January Patch Tuesday 2019January Patch Tuesday 2019
January Patch Tuesday 2019Ivanti
 
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...Casey Ellis
 
Mengenal Fitur Keamanan Dasar pada Windows 7
Mengenal Fitur Keamanan Dasar pada Windows 7Mengenal Fitur Keamanan Dasar pada Windows 7
Mengenal Fitur Keamanan Dasar pada Windows 7Aris Lesmana
 
RBI Cyber Security Guidelines- FixNix GRC
RBI Cyber Security Guidelines- FixNix GRCRBI Cyber Security Guidelines- FixNix GRC
RBI Cyber Security Guidelines- FixNix GRCFixNix Inc.,
 
A reading of the IBM Research 5-in-5 2018 Edition
A reading of the IBM Research 5-in-5 2018 EditionA reading of the IBM Research 5-in-5 2018 Edition
A reading of the IBM Research 5-in-5 2018 EditionPietro Leo
 
Francisco Jesús Gómez & Carlos Juan Diaz - Sinfonier: Storm Builder for Secur...
Francisco Jesús Gómez & Carlos Juan Diaz - Sinfonier: Storm Builder for Secur...Francisco Jesús Gómez & Carlos Juan Diaz - Sinfonier: Storm Builder for Secur...
Francisco Jesús Gómez & Carlos Juan Diaz - Sinfonier: Storm Builder for Secur...RootedCON
 
ECONOMIC BlogpostWrite an economic profile of Egypt country , .docx
ECONOMIC BlogpostWrite an economic profile of Egypt country , .docxECONOMIC BlogpostWrite an economic profile of Egypt country , .docx
ECONOMIC BlogpostWrite an economic profile of Egypt country , .docxmadlynplamondon
 
The IoT: Internet of Threats?
The IoT: Internet of Threats?The IoT: Internet of Threats?
The IoT: Internet of Threats?TechWell
 

Similaire à Niels G's security websites list (20)

Security news 20151119
Security news 20151119Security news 20151119
Security news 20151119
 
NetVU Tech-4290/4390
NetVU Tech-4290/4390NetVU Tech-4290/4390
NetVU Tech-4290/4390
 
Innovating Together: the UX of Discovery
Innovating Together: the UX of DiscoveryInnovating Together: the UX of Discovery
Innovating Together: the UX of Discovery
 
Список коротких ссылок на решения Cisco по безопасности
Список коротких ссылок на решения Cisco по безопасностиСписок коротких ссылок на решения Cisco по безопасности
Список коротких ссылок на решения Cisco по безопасности
 
Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015
 
Recent Trends in Cyber Security
Recent Trends in Cyber SecurityRecent Trends in Cyber Security
Recent Trends in Cyber Security
 
Maximo Application Suite 8.4 & 8.5 Learning & Resources Guide.PPTX
Maximo Application Suite 8.4 & 8.5 Learning & Resources Guide.PPTXMaximo Application Suite 8.4 & 8.5 Learning & Resources Guide.PPTX
Maximo Application Suite 8.4 & 8.5 Learning & Resources Guide.PPTX
 
White Hats 1st Meeting
White Hats 1st MeetingWhite Hats 1st Meeting
White Hats 1st Meeting
 
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
 
Take Down
Take DownTake Down
Take Down
 
January Patch Tuesday 2019
January Patch Tuesday 2019January Patch Tuesday 2019
January Patch Tuesday 2019
 
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
 
How to use shodan more powerful
How to use shodan more powerful How to use shodan more powerful
How to use shodan more powerful
 
Mengenal Fitur Keamanan Dasar pada Windows 7
Mengenal Fitur Keamanan Dasar pada Windows 7Mengenal Fitur Keamanan Dasar pada Windows 7
Mengenal Fitur Keamanan Dasar pada Windows 7
 
RBI Cyber Security Guidelines- FixNix GRC
RBI Cyber Security Guidelines- FixNix GRCRBI Cyber Security Guidelines- FixNix GRC
RBI Cyber Security Guidelines- FixNix GRC
 
A reading of the IBM Research 5-in-5 2018 Edition
A reading of the IBM Research 5-in-5 2018 EditionA reading of the IBM Research 5-in-5 2018 Edition
A reading of the IBM Research 5-in-5 2018 Edition
 
Francisco Jesús Gómez & Carlos Juan Diaz - Sinfonier: Storm Builder for Secur...
Francisco Jesús Gómez & Carlos Juan Diaz - Sinfonier: Storm Builder for Secur...Francisco Jesús Gómez & Carlos Juan Diaz - Sinfonier: Storm Builder for Secur...
Francisco Jesús Gómez & Carlos Juan Diaz - Sinfonier: Storm Builder for Secur...
 
ECONOMIC BlogpostWrite an economic profile of Egypt country , .docx
ECONOMIC BlogpostWrite an economic profile of Egypt country , .docxECONOMIC BlogpostWrite an economic profile of Egypt country , .docx
ECONOMIC BlogpostWrite an economic profile of Egypt country , .docx
 
The IoT: Internet of Threats?
The IoT: Internet of Threats?The IoT: Internet of Threats?
The IoT: Internet of Threats?
 
Threat Hunting with Cyber Kill Chain
Threat Hunting with Cyber Kill ChainThreat Hunting with Cyber Kill Chain
Threat Hunting with Cyber Kill Chain
 

Plus de Bill Hagestad II

Hagestad xmlversion-120110170214-phpapp02
Hagestad xmlversion-120110170214-phpapp02Hagestad xmlversion-120110170214-phpapp02
Hagestad xmlversion-120110170214-phpapp02Bill Hagestad II
 
Future of Chinese Cyber Warfare
Future of Chinese Cyber WarfareFuture of Chinese Cyber Warfare
Future of Chinese Cyber WarfareBill Hagestad II
 
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場 Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場 Bill Hagestad II
 
China's People's Liberation Army force distribution 2015 中国人民解放军陆军
China's People's Liberation Army force distribution 2015  中国人民解放军陆军China's People's Liberation Army force distribution 2015  中国人民解放军陆军
China's People's Liberation Army force distribution 2015 中国人民解放军陆军Bill Hagestad II
 
Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队Bill Hagestad II
 
China’s clandestine services red dragon rising copyright 2015
China’s clandestine services red dragon rising copyright 2015  China’s clandestine services red dragon rising copyright 2015
China’s clandestine services red dragon rising copyright 2015 Bill Hagestad II
 
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructures4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructureBill Hagestad II
 
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...Bill Hagestad II
 
高技术战争 Gaojishu People's Liberation Army high tech war in 2014
高技术战争 Gaojishu People's Liberation Army high tech war in 2014高技术战争 Gaojishu People's Liberation Army high tech war in 2014
高技术战争 Gaojishu People's Liberation Army high tech war in 2014Bill Hagestad II
 
Weaponized malware comparison
Weaponized malware comparisonWeaponized malware comparison
Weaponized malware comparisonBill Hagestad II
 
Cyber Threat Taxonomy Matrix APR 2014
Cyber Threat Taxonomy Matrix APR 2014Cyber Threat Taxonomy Matrix APR 2014
Cyber Threat Taxonomy Matrix APR 2014Bill Hagestad II
 
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014Bill Hagestad II
 
사이버 보안의 이해 Intro to korean cyber security
사이버 보안의 이해 Intro to korean cyber security사이버 보안의 이해 Intro to korean cyber security
사이버 보안의 이해 Intro to korean cyber securityBill Hagestad II
 
Korean information security practices 보안 인식교육
Korean information security practices 보안 인식교육Korean information security practices 보안 인식교육
Korean information security practices 보안 인식교육Bill Hagestad II
 
Chinese hackers how to presentation投影片 1網路安全
Chinese hackers how to presentation投影片 1網路安全Chinese hackers how to presentation投影片 1網路安全
Chinese hackers how to presentation投影片 1網路安全Bill Hagestad II
 
No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502Bill Hagestad II
 
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoSBill Hagestad II
 
Red Dragon's CYBER Security RSS Feed .docx version
Red Dragon's CYBER Security RSS Feed .docx versionRed Dragon's CYBER Security RSS Feed .docx version
Red Dragon's CYBER Security RSS Feed .docx versionBill Hagestad II
 

Plus de Bill Hagestad II (18)

Hagestad xmlversion-120110170214-phpapp02
Hagestad xmlversion-120110170214-phpapp02Hagestad xmlversion-120110170214-phpapp02
Hagestad xmlversion-120110170214-phpapp02
 
Future of Chinese Cyber Warfare
Future of Chinese Cyber WarfareFuture of Chinese Cyber Warfare
Future of Chinese Cyber Warfare
 
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場 Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
 
China's People's Liberation Army force distribution 2015 中国人民解放军陆军
China's People's Liberation Army force distribution 2015  中国人民解放军陆军China's People's Liberation Army force distribution 2015  中国人民解放军陆军
China's People's Liberation Army force distribution 2015 中国人民解放军陆军
 
Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队
 
China’s clandestine services red dragon rising copyright 2015
China’s clandestine services red dragon rising copyright 2015  China’s clandestine services red dragon rising copyright 2015
China’s clandestine services red dragon rising copyright 2015
 
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructures4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
 
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
 
高技术战争 Gaojishu People's Liberation Army high tech war in 2014
高技术战争 Gaojishu People's Liberation Army high tech war in 2014高技术战争 Gaojishu People's Liberation Army high tech war in 2014
高技术战争 Gaojishu People's Liberation Army high tech war in 2014
 
Weaponized malware comparison
Weaponized malware comparisonWeaponized malware comparison
Weaponized malware comparison
 
Cyber Threat Taxonomy Matrix APR 2014
Cyber Threat Taxonomy Matrix APR 2014Cyber Threat Taxonomy Matrix APR 2014
Cyber Threat Taxonomy Matrix APR 2014
 
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
 
사이버 보안의 이해 Intro to korean cyber security
사이버 보안의 이해 Intro to korean cyber security사이버 보안의 이해 Intro to korean cyber security
사이버 보안의 이해 Intro to korean cyber security
 
Korean information security practices 보안 인식교육
Korean information security practices 보안 인식교육Korean information security practices 보안 인식교육
Korean information security practices 보안 인식교육
 
Chinese hackers how to presentation投影片 1網路安全
Chinese hackers how to presentation投影片 1網路安全Chinese hackers how to presentation投影片 1網路安全
Chinese hackers how to presentation投影片 1網路安全
 
No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502
 
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
 
Red Dragon's CYBER Security RSS Feed .docx version
Red Dragon's CYBER Security RSS Feed .docx versionRed Dragon's CYBER Security RSS Feed .docx version
Red Dragon's CYBER Security RSS Feed .docx version
 

Dernier

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 

Dernier (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 

Niels G's security websites list

  • 1. Anton Chuvakinhttp://feeds.feedburner.com/AntonChuvakinPersonalBlog BankInfoSecurityhttp://feeds.feedburner.com/BankinfosecuritycomRssMain Cisco Cyber Risk Report http://tools.cisco.com/security/center/cyberRiskReport_10.xml Cisco Security Advisories http://newsroom.cisco.com/data/syndication/rss1/SecurityAdvisories_20.xml CNet News Security http://feeds.feedburner.com/CNETNewsSecurity CSO Online http://www.csoonline.com/feed/articles/cso Cybercrime & Doing Time http://garwarner.blogspot.com/feeds/posts/default DanchoDanchevhttp://feeds.feedburner.com/DanchoDanchevOnSecurityAndNewMedia FAS Secrecy News http://www.fas.org/blog/secrecy/feed FireEye Labs http://blog.fireeye.com/research/atom.xml F-Secure Antivirus Research Weblog http://www.f-secure.com/weblog/weblog.rdf GovInfoSecurity.com Articles RSS Feed http://feeds.feedburner.com/GovinfosecuritycomRssArticles GovInfoSecurity.com Blogs RSS Feed http://feeds.feedburner.com/GovinfosecuritycomRssBlogs Graham Cluley Blog (Sophos) http://feeds.sophos.com/en/rss2_0-sophos-graham-cluley.xml Hack in the Box (HiTB) http://www.hackinthebox.org/backend.php HelpNet Security Vulnerabilities http://www.net-security.org/dl/bck/vuln.rss Honeybloghttp://honeyblog.org/feeds/index.rss2 Information Warfare Monitor http://www.infowar-monitor.net/?feed=rss2 Infosec Daily Podcast http://www.isdpodcast.com/feed/ Infosec Ramblings http://feeds.feedburner.com/InfosecRamblings Infowar.com http://feeds.feedburner.com/Infowar-com InfoWorld Security Central http://www.infoworld.com/taxonomy/term/2535/feed Jart Armin http://www.jartarmin.com/index.php?format=feed&type=rss Jeremiah Grossman http://feeds.feedburner.com/JeremiahGrossman Kaspersky News http://www.kaspersky.com/rss/news
  • 2. Krebs on Security http://krebsonsecurity.com/feed/ Malware Intelligence Blog http://malwareint.blogspot.com/feeds/posts/default McAfee Avert Blogs http://feeds.feedburner.com/McafeeAvertLabsBlog McAfee Security Insights Blog » George Kurtz http://siblog.mcafee.com/author/georgekurtz/feed/ Metasploit http://feeds.feedburner.com/metasploit/blog Microsoft Security Bulletins http://www.microsoft.com/technet/security/bulletin/secrss.aspx MoreOver Computer Security News http://p.moreover.com/cgi- local/page?c=Computer%20security%20news&o=rss Most Popular White Papers and WebcastsSecurity Research http://www.bitpipe.com/data/bpXchange?b=blat_security&d=31&f=rss&u=rss NetworkWorld Security http://www.networkworld.com/rss/security.xml NIST IT Security News http://www.nist.org/nist_plugins/rss_menu/rss.php?1.3. Pandalabs Blog http://pandalabs.pandasecurity.com/feed/ PentestIThttp://feeds.feedburner.com/PenTestIT/ RBNExploithttp://rbnexploit.blogspot.com/feeds/posts/default RootSecurehttp://www.rootsecure.net/?p=rss_xml_feed&t=secnews&i=15 SANS Forensics http://feeds.feedburner.com/SANSForensics?format=xml SANS Information Security Reading Room http://feeds.feedburner.com/SansInstituteRRLast25 SANS Internet Storm Center http://iscxml.sans.org/rssfeed_full.xml Schneier on Security http://www.schneier.com/blog/index.rdf SearchSecurity: Network Security Tactics http://feeds.pheedo.com/techtarget/searchsecurity/networksecurity SearchSecurity: Security Wire Daily News http://feeds.pheedo.com/techtarget/Searchsecurity/SecurityWire SearchSecurity: Threat Monitor http://feeds.pheedo.com/SearchsecurityThreatMonitor SecureListhttp://www.securelist.com/en/rss/weblog Security Database Tools Watch http://feeds.security-database.com/SecurityDatabaseToolsWatch
  • 3. SecurityTracker Vulnerability Headlines http://news.securitytracker.com/server/affiliate?61D319BD39309004 Sophos Latest Viruses http://feeds.sophos.com/en/rss2_0-sophos-latest-viruses.xml Sophos Podcasts http://feeds.sophos.com/en/rss2_0-sophos-podcasts.xml SophosLabs Blog http://feeds.sophos.com/en/rss2_0-sophos-sophoslabs-blog.xml Sunbelt Blog http://feeds.feedburner.com/SunbeltBlog Symantec Risks RSS Feed http://www.symantec.com/xml/rss/listings.jsp?lid=mixedsecurityrisks Symantec Security Response Blog http://www.symantec.com/connect/feeds/srblog-external-en Symantec Security Response Podcasts http://www.symantec.com/content/en/us/global/rss/sr/sr.xml Symantec Threats RSS Feed http://www.symantec.com/xml/rss/listings.jsp?lid=latestthreats30days Symantec Vulnerabilities RSS Feed http://www.symantec.com/xml/rss/listings.jsp?lid=advisories TaoSecurityhttp://taosecurity.blogspot.com/atom.xml Team Cymruhttp://www.team-cymru.org/News/secnews.rss Tenable Security http://blog.tenablesecurity.com/atom.xml The Dark Visitor http://www.thedarkvisitor.com/feed TrendLabs Malware Blog http://feeds.trendmicro.com/Anti-MalwareBlog US-CERT Current Activity http://www.us-cert.gov/current/index.atom US-CERT Cyber Security Alerts and Tips http://www.us-cert.gov/channels/userdocs.rdf US-CERT Cyber Security Tips http://www.us-cert.gov/channels/tips.rdf US-CERT National Cyber Alert System http://www.us-cert.gov/channels/cas.rdf US-CERT Technical Alerts and Bulletins http://www.us-cert.gov/channels/techdocs.rdf WebSense Security Labs http://securitylabs.websense.com/content/alertsRSS.xml Wired Threat Level http://www.wired.com/threatlevel/feed/ ZDNet Security http://feeds.feedburner.com/zdnetuk/news/security Zone-H http://www.zone-h.org/rss/news