1.  We Need More than a “Good Samaritan” Law for Cybersecurity Information Sharing

We Need More than a “Good Samaritan” Law for Cybersecurity Information Sharing


2.  Jumble. Simple email security

Jumble. Simple email security

Jumble helps businesses to quickly secure their 75 billion daily emails by providing integrated 1 click end-to-end encryption #SecurityMatters #EmailEncryption


3.  The Mutt

The Mutt


4.  IMFirewall Blog - Block Internet Access,Block P2P,Web Filtering

IMFirewall Blog - Block Internet Access,Block P2P,Web Filtering

IMFirewall Blog - Block Internet Access,Block P2P,Web Filtering


5.  MALWARELIST: Antivirus and Security

MALWARELIST: Antivirus and Security

MALWARELIST.net – Your Information Security Source.
All what you need to know about malware & how to protect your computer and web site.


6.  Aeris Secure | PCI Knowledge Blog

Aeris Secure | PCI Knowledge Blog

The Aeris Secure PCI Knowledge Blog specializes in providing merchants with the information the need to become PCI compliant. Focus on the PCI DSS and SAQ requirements for small to mid-size companies.


7.  Technoloman

Technoloman

Online security, endpoint security, antivirus, firewall, cloud security, etc...


8.  christoperj|[.com]

christoperj|[.com]

Information security professional by day and husband, father, and full-time volunteer at night, Christopher J. Marcinko writes about his work and views on different subjects on christoperj|[.com].

If you share his interest in Cloud security, Firewalls, threat research, virus response tools, and the like, head out to his blog that has over 100 entries on the subject. On top of all this, you’ll also find a list of virus response tools.

When Christopher takes a break from work, he likes to ruminate about political and social issues and to take pictures of nature, fireworks, and places he’s been to.


9.  Jörn's space

Jörn's space

Private thoughts about FinTec, cyber security, programming and startups.


10.  Reedphish puncturing security, development and life

Reedphish puncturing security, development and life


11.  Groman Consulting Group

Groman Consulting Group

Cybersecurity blog