
LINK LIBRARY
"A truly great library has something in it to offend everyone."
-Jo Godwin
Cyber Security Podcasts
Cyber Pyschology
Profiling Hackers - The Psychology of Cybercrime | Mark T. Hoffmann | TEDxHHL (Video)
Ethical hacking and subverting the internet | Thomas Webb (Tom London) | TEDxBerlinSalon (Video)
Human Hacking: The Psychology Behind Cybersecurity | Dr. Erik J. Huffman | TEDxColoradoSpring (Video)
Your Human Firewall – The Answer to the Cyber Security Problem | Rob May | TEDxWoking (Video)
Psychology and Cybercrime (Video)
DOD - Free Virtual Training against Phishing and Social Engine
Cybercriminals use psychology - cybersecurity pros should, too
6 Psychological Elements Behind Sophisticated Cyber Attacks
The British Psychological Society Resources- search term "cyber security"
Frames of fraud: A qualitative analysis of the structure and process of victimization on the internet
Businesses can improve cyber security by linking staff training to personality
Why the Myers-Briggs test is totally meaningless (Video)
The Role of User Behaviour in Improving Cyber Security Management
Speaking of Psychology: The Internet of Things and consumer risk
Psychology Concepts that Apply to Cyber
Counterintelligence
Optimism Bias
Priming (Psychology)
Online Disinhibition Effect
Mirror Neurons
Protection motivation theory
Habituation
Predictive Reasoning
Information Framing
Hyperbolic Discounting
Gamification
Barnum–Forer Effect
Gov. and Industry Resources
Info Security Architecture
SABSA Institute
COBIT - ISACA
TOGAF
SABSA, COBIT, TOGAF Comparison
Certification Related
ISACA
SANS
SANS Information Security Resources
Certified Information Systems Security Professional (CISSP)
Cloud Security Alliance
Certified Cloud Security Professional (CCSP)
OWASP
Ponemon Institute
ISC2
Certifications: CISSP, SSCP, CCSP, CAP, CISSP-ISSAP, CISSP-ISSEP, CISSP-ISSMP
Healthcare
OCR Cybersecurity Newsletters Archive*
HIPAA Security Rule Crosswalk to NIST Cybersecurity Framework*
HIPAA Security Rule
.GOV
CERT Coordination Center
Recent Vulnerabilities
Defense of Cyber Crime Center (DC3)
DOD Cyber Exchange
DHS
DHS Cyber Resources
Homeland Open Security Technology (HOST)
DOJ
News Search Key Word "Cyber"
FTC
FTC Privacy Resource Links
Forum for Incident Response and Security Teams (First)
International Telecommunications Union, Cybersecurity Gateway
National Council of ISACs
NIST
NIST Cybersecurity
NIST Framework
Organization of American States, Cyber Security Program
Organization of Economic Cooperation and Development, Information Security and Privacy
Secret Service Task Force
US-CERT
National Cybersecurity and Communications Integration Center
Information Sharing Specification for Cybersecurity: TAXII, STIX, CybOX
Vulnerability Information
Common Vulnerabilities and Exposures List (CVE)
Bugtraq
National Infrastructure Advisory Council's Vulnerability Disclosure Framework
National Vulnerability Database (NVD): Search
Open Vulnerability Assessment Language (OVAL)
Risk Management Framework from NIST
Introduction to Components of the Framework (NIST 2018a)Uses and Benefits of the Framework (NIST, 2018b)NIST SP 800-37 Revision 2: Risk Management Framework for Information Systems and Organizations (NIST, 2018c)
Open Source Tools
Misc. Open Source Tools
BlackArch
Kali Linux
Gibson Research
DC3: Advanced carver, Forensic Imaging, Detection of Encrypted Data
Sam Spade
OpenVAS
NMAP
Internet Registration Information
WHOIS
RIPE
ARIN
APNIC
CanaryToken Tracking
Track a Target Using Canary Token Tracking Links [Tutorial]
Website SSL Test
Qualys SSL Test
MAC Address Lookup
MAC Vendor Lookup
Wireshark OUI
Social Engineering Training
DOD - Virtual Training
Network
Solarwinds Free Tools
Azure Free Services
Cyber Security Vendor Websites
Antivirus Websites, Tools, and Blogs
AhnLab (China)
AhnLab Whitepaper and Manuals
Avast/AVG (Czech Republic)
History and Dictionary of Online Threats
AVG/Avast (Czech Republic)
Security & Performance Tips
Avira (Germany)
Top 10 Attack Stats by Avira
Avira Virus Description Database
Avira Blog*
Bitdefender (Romania)
BitDefender Blog. Hot for Security*
Story of Building the Bitdefender Box
BullGaurd (Denmark)
BullGuard Forum
BullGuard Articles and Consumer Guides*
Check Point (Israel)
Article Site. Cybertalk.org*
Check Point Blog and Publications*
Dr. Web (Russia)
Forum with Odd and Interesting Subjects*
ESET (Slovakia)
ESET Webinars, Tech Briefs, and Whitepapers
F-PROT (Iceland)
Cyren Security Blog*
F-Secure (Finland)
Router Checker Tool**
F-Secure News and Videos*
Removal Instructions for Dealing with Threats**
Threat (Virus and Malware) Description Database
G-Data (Germany)
G-Data Blog
GFI Software (US)
Kaspersky (Russia)
Kaspersky Press Releases
Kingsoft (China)
Malwarebytes (Estonia)
Malwarebytes Blog*
Malwarebytes Forum
Malwarebytes Resources: Infographics, Case Studies, Analyst Reports*
McAfee (USA)
Anti-Malware Tools**
Norton / Symantec (USA)
Internet Security Threat Report (ISTR)
Mobile Device Reports*
Security White Papers*
Blog*
Video on Most Dangerous Locations for Internet
Symantec Threat Specific Removal Tools
Panda (Spain)
Really Cool Infographic Explaining Product
Panda Blog*
PC Matic (USA)
PC Matic Forum
PSafe (Brazil)
360 (China)
360 Total Security Blog*
Quick Heal (India)
Sophos (United Kingdom)
Sophos Free Tools**
Sophos Blog*
TG Soft (Italy)
TrapX
TrapX Case Studies*
Trend Micro (Japan)
Trend Micro Deep Web Stories*
Trend Micro's This Week in Security News*
Trend Micro Cyber Definitions
Trend Micro Predictions*
Zemana (Turkey)
Zemana Blog
Applicatio Security Vendor Sites
Arxan (US)
Bangcle (China)
DNP HyperTech (Japan)
Gemalto (UK)
Giesecke+Devrient (Germany)
GaurdSquare (Belgium)
Inside Secure (France)
Intertrust (US)
Jscrambler (US)
KOBIL (German)
Licel (US)
Lockin (Korea)
NSHC (Singapore)
OneSpan (US)
Promon (German)
Penetration Tester Sites
Beyond Security (Israel)
Beyond Trust (US)
Beyond Trust Resources
Digital Defense
Digital Trust Security Guides*
Case Studies*
Webinars and Podcasts
Greenbone Networks (Germany)
Outpost24 (Sweden)
Qualys (US)
Qualys Free Tools
Rapid7 (US)
Resource Library: Quarterly Threat Report & Whitepapers*
Rapid7 Blog*
Tenable Network Security, Inc. (US)
TripWire (US)
TripWire Blog*
Threat Intelligence
Alert Logic
AlienVault Threat Intelligence
Anitian
Anitian Blog*
Anomaly Threat Intelligence
Arbor Network's Netscout
Arbor Networks Digital Attack Map
Brand Protect (Merged with PhishLabs)
Cisco's Talos Intelligence
Beers with Talos Podcast*
Crowdstrike
Digital Shadows
Fireye
Hewlett Packard Threat Intelligence
IBM X-Force
LogRhythm
LookingGlass Threat Intelligence
Optive
Recorded Future
RiskIQ
Surfwatch Labs
Identity Access Management
Sailpoint
Privileged Access Management (PAM)
Misc. Cyber Security Sites
Product Reviews
Gartner.com
RFCs, Protocols, Algorithms
The Transport Layer Security (TLS) Protocol Version 1.2
IOT Protocol Stack Options by Micrium.com
General Implementation and Configuration
STIGs
Linux
SELinux User's and Administrator's Guide
Red Hat Enterprise Linux 6: Virtualization Security Guide
Windows
What's new in Active Directory Domain Services for Windows Server 2016
Security of the VMware vSphere® Hypervisor
Metasploitable
Metasploitable Guide from Rapid7
Formulating Operational Policy
BYOD Security Implementation for Small Companies by SANS
Security Policy Roadmap by SANS
A Preparation Guide to Information Security Policies by SANS
How to Create a Successful Corporate Policy by Malwarebytes Blog
10 Reasons Why Employees Don't Follow Organizational Processes by the Huffington Post
Promoting Employee Policy Adherence and Rule Following in Work Setting: The Value of Self-Regulatory Process
Conferences & Competitions
Blackhat
Defcon
Understanding BEC
Phishing for Funds: Understanding Business Email Compromise


2022
Added sections of "Communication Tips", "Cyber Psychology", "Cyber Security News", and "Cyber Security Podcasts". Added sub-sections "Security Architecture". categorized sites and created menu. New site and presentation.
2019
Added sites to sections named "Industry Websites", "Government Resources", "Certification and Training" and "Cyber Security Tools".
2018
Created library. Focused on capturing many security vendor sites.