21 Cyber Security Blogs that Keep IT Pros in the Know

Cyber Security Blogs

Living in a digital age can be stressful. Even if you set aside the noise and power of social media, and the constant barrage of news, ads and information, there is still an aspect of our digital dependence that can haunt you. We rely so heavily on networks and devices in daily life--everything from paying our bills to accessing our healthcare information. But data breaches and cybercrime are topics that rarely stray from the headlines. It’s enough to make anyone nervous.

But you don’t have to be defenseless. Cyber security professionals are tasked with protecting our private information along with the networks and systems we utilize. Technology is rapidly evolving—as are the tactics used by cybercriminals. Whether you’re simply an online consumer or you’re considering a career in cyber security, following the top cyber security blogs is a great way to stay safe and up to date on the latest industry happenings.

We identified a handful of the most renowned cyber security blogs the internet has to offer. These websites are great sources of information, education and conversation about all things cyber security. Be sure to bookmark this list to keep tabs on these resources in the future.

21 High-quality cyber security blogs

1. CyberArk

Why follow? CyberArk is one of the few security companies whose efforts are entirely dedicated to preventing cyberattacks. With many of the world’s top businesses trusting their protection, CyberArk is a blog boasting a lot of authority. The site is updated every few weeks or so with insightful, intelligent articles on hot topics such as the newest global security concerns and recaps from recent security and hacker conferences.

2. Electronic Frontier Foundation

Why follow? The Electronic Frontier Foundation is a nonprofit dedicated to protecting civil liberties online. Their blog is an excellent way to stay tuned into the wide world of digital rights and anything that threatens them. If issues like net neutrality or abuse of private information are on your radar, this will be a great blog for you.

3. Dark Reading

Why follow? Dark Reading is a cyber security community comprised of contributing influential IT professionals. This cutting-edge blog is chock full of news and commentary covering a broad range of cyber security-related issues and even offers podcasts and videos. Dark Reading is part of Information Week, which hosts nine digital technology communities.

4. Homeland Security News Wire

Why follow? Homeland Security News Wire, a leader in the industry’s online daily publications, manages its own cyber security blog. This resource combines elements of government, science and business to analyze the technical aspects of current events. Plus, it’s packed with authoritative and informative reporting and is updated daily.

5. Krebs on Security

Why follow? Krebs on Security is authored by Brian Krebs, a former Washington Post reporter. This longstanding blog offers a lot of archives to dig through, while also providing a fresh look at current cyber security threats. Because of his unorthodox ushering into the cyber security industry, Krebs’ style is accessible and casual, which makes following this blog easy and enjoyable.

6. Information Security Buzz

Why follow? Information Security Buzz, cyber security blog is an independent resource for the latest updates and expert input on industry happenings. This blog features a video channel with insightful commentary from IT professionals. You can even use their LinkedIn community discussion page to rub elbows with other industry professionals and hash out the latest hot topics.

7. Infosecurity Magazine

Why follow? Infosecurity Magazine is one of the larger cyber security publications out there with a vast amount of information on their website. The site is updated daily, hosts its own virtual conferences throughout the year, has its own webinar channel and boasts an extensive directory of cyber security companies.

8. Inside Cybersecurity

Why follow? Inside Cybersecurity is a site dedicated to keeping professionals up to date with federal policies affecting digital security. The site provides behind-the-scenes reporting of law making and its repercussions on the public, though it is subscription-based. Give the free trial a shot to better understand the relationship between public policy and cyber security.

9. BSSi2

Why follow? BSSi2 specializes in IT and cyber security for companies. They post informative articles on many different practical technology topics on a regular basis. If there are big hacks or glitches going around, BSSi2’s blog might tell you how to avoid, patch or troubleshoot them. The best part is that these articles are tailored toward the average person and don’t take a ton of technical know-how to follow. If you want a quick and easy explanation for a friend, or perhaps yourself, this blog is a great resource.

10. The Hacker News

Why follow? The Hacker News is a great resource for breaking news in the world of hacking. With a tab at the top, you can read recent and archived posts on DDos attacks, cyber espionage, the Tor Anonymity Network, Botnet attacks and, really, whichever flavor of hacking intelligence you are interested in. If you don’t care to browse, follow them for breaking updates via their active Twitter presence.

11. Security Current News

Why follow? Security Current keeps a well-refreshed feed of succinct, intelligent posts on information security. Posts often relate to current news in the cyber security world, offering perspectives and discussion on the topic instead of basic reporting. For those who prefer to learn on the go, the Security Current podcast is a great choice.

12. Schneier on Security

Why follow? Bruce Schneier is a heavy hitter in the security field with impressive credentials. His cyber security blog, Schneier on Security, pulls in all sorts of articles from across the web and generates a lot of engagement on his site. This is a good blog to follow if you want to see differing opinions on the topics everyone’s discussing. Schneier also produces a monthly newsletter to keep you in the know.

13. CNET

Why follow? CNET has an entire section of their site devoted to security. Their consumer technology experts weigh in each day on everything from credit card data breaches and cyber warfare to scams and social media privacy. They cover what’s happening in current events while providing a solid technological outlook. This blog has a casual tone and is not overly technical in writing. It’s a good one to follow if you have a particular interest in consumer-related security.

14. Veracode

Why follow? Veracode is a cloud-based security firm. Their blog is updated nearly every day with new content from both industry professionals and members of the Veracode team. The posts are casual and consistently deliver on everything from cyber vulnerabilities to social media and security software. The site also features a wealth of security resources such as webinars, whitepapers and reports.

15. BH Consulting Security Watch

Why follow? Security Watch is the blog of BH Consulting, an independent IT solutions firm in Ireland. The blog covers information security issues on an international level. It is updated regularly with casually written content along with occasional videos. Browse through their multiple archives or search by category to find a topic of your choice.

16. SecurityWeek

Why follow? SecurityWeek is a cyber security blog that provides insight and expert analysis on global security threats and headlines. The blog is jam-packed with articles and information. They also divvy it up conveniently into different categories like cybercrime and security architecture. The site also offers more in-depth research and whitepaper reports.

17. Stay Safe Online

Why follow? Stay Safe Online is a security blog run by the National Cyber Security Alliance (NCSA.) Their mission is to educate and advocate for safe and secure internet use. This resource focuses heavily on providing family-friendly advice on teaching safe online practices to children. The posts are not weighed down with technical jargon and they often feature guest bloggers. The NCSA also promotes National Cyber Security Awareness Month each October.


Why follow? CERIAS stands for the “Center of Research and Information Assurance Security” and is an extension of Purdue University’s Information Technology department. This blog is a fantastic resource for IT or Infosec students no matter where they are studying. While there will be occasional Purdue-specific posts, this blog has a wealth of great research and knowledge to offer.

19. Naked Security

Why follow? Naked Security is the security threat blog of Sophos, a cyber security company. This blog has a huge following and does a great job of making their content interesting, relevant and accessible. The site is divided into relevant hot topics such as vulnerability, Android privacy and Facebook, so you can easily find content relating to your interests.

20. Tech News World

Why follow? Tech News World’s cyber security section covers everything from hacking to privacy issues and the latest news in the information security field. This blog does a good job of writing on consumer-related security issues in a comprehensible manner. They also write quite a bit about cyber security law and legislation that affects the industry.

21. Threat Post

Why follow? Threat Post is an independent news source that regularly breaks the latest in information security news. The blog publishes multiple posts each day, accompanied by their podcast and video library. Threat Post has a huge following, is an award-winning blog and is a well-known and authoritative source if you ever need a credible citation on cyber security.

Considering combatting cybercrime?

You are now equipped with some of the best cyber security blogs the internet has to offer. If these resources inspire you to make a career out of protecting the internet and its users, a Cyber Security Degree can help you take the next step.

Not sure if pursuing a degree is worth your time? Check out our article, “Is a Cyber Security Degree Worth it? The Facts You Can’t Ignore” for more reasons to consider earning a degree.


EDITOR’S NOTE: This article was originally published in October 2014. It has since been updated to include information relevant to 2017.

Brianna Flavin

Brianna is a content writer for Collegis Education who writes student focused articles on behalf of Rasmussen College. She earned her MFA in poetry and teaches as an adjunct English instructor. She loves to write, teach and talk about the power of effective communication.

female writer

Related Content

This piece of ad content was created by Rasmussen College to support its educational programs. Rasmussen College may not prepare students for all positions featured within this content. Please visit www.rasmussen.edu/degrees for a list of programs offered. External links provided on rasmussen.edu are for reference only. Rasmussen College does not guarantee, approve, control, or specifically endorse the information or products available on websites linked to, and is not endorsed by website owners, authors and/or organizations referenced. Rasmussen College is a regionally accredited private college.

Add your comment


Please enter your name.


Please enter your email.


Please enter your comment.


Take the Next Step—Talk to Us!

There are some errors in the form. Please correct the errors and submit again.

Request More Information

Talk with a program manager today.

Fill out the form to receive information about:
  • Program Details and Applying for Classes 
  • Financial Aid and FAFSA (for those who qualify)
  • Customized Support Services
  • Detailed Program Plan

Step 1 of 3

What's Your Name?

Please enter your first name.

Please enter your last name.

Step 2 of 3

Contact Information

Please enter your email address.

Please enter your phone number.

Please enter your five digit zip code.

Step 3 of 3

Program Preferences

Please choose a school of study.

Please choose a program.

Please choose a degree.

The program you have selected is not available in your area. Please select another program of interest.

By requesting information, I authorize Rasmussen College to contact me by email, phone or text message at the number provided. There is no obligation to enroll.

icon-colored-advance icon-colored-build icon-colored-certificate icon-colored-continual-developement icon-colored-growth icon-colored-national icon-colored-prep icon-colored-regional icon-colored-state icon-colored-student-centered icon-colored-support icon-colored-world-experience icon-general-connect icon-general-degree icon-general-discuss icon-general-email icon-general-find icon-general-laptop icon-general-leader icon-general-map icon-general-paperwork icon-general-phone icon-general-speak-out icon-camera icon-filter icon-info-circle icon-mail-forward icon-play-solid icon-quote-mark-left icon-quote-mark-right icon-share-square-o icon-spinner icon-tag logo-accreditation-acen logo-accreditation-ccne ras-logo-flame ras-logo-horizontal ras-logo-stacked icon-simple-chat icon-simple-desktop icon-simple-find icon-simple-hamburger icon-simple-phone icon-testimonial-quotes icon-social-facebook-square-colored icon-social-facebook-square icon-social-facebook icon-social-google-plus-square icon-social-google-plus icon-social-instagram icon-social-linkedin-square-colored icon-social-linkedin-square icon-social-linkedin icon-social-pinterest-p icon-social-twitter-square icon-social-twitter icon-social-youtube-play-colored icon-social-youtube-play icon-util-checkbox-white icon-util-checkbox icon-util-checked-white icon-util-checked icon-util-chevron-down icon-util-chevron-left icon-util-chevron-right icon-util-chevron-up icon-util-loading icon-util-open-window-button icon-util-open-window-link icon-util-pdf-button icon-util-pdf-link icon-util-refresh icon-util-x