LINK LIBRARY

"A truly great library has something in it to offend everyone."
-Jo Godwin

Cyber Security Podcasts

 
 
 

Gov. and Industry Resources

Info Security Architecture
SABSA Institute
COBIT - ISACA 
TOGAF
SABSA, COBIT, TOGAF Comparison


Certification Related

ISACA
SANS
    SANS Information Security Resources

    Certified Information Systems Security Professional (CISSP)
Cloud Security Alliance
    Certified Cloud Security Professional (CCSP)
OWASP
Ponemon Institute

ISC2
    Certifications: CISSP, SSCP, CCSP, CAP, CISSP-ISSAP, CISSP-ISSEP, CISSP-ISSMP

Healthcare

OCR Cybersecurity Newsletters Archive*
HIPAA Security Rule Crosswalk to NIST Cybersecurity Framework*
HIPAA Security Rule
 

.GOV

CERT Coordination Center
     Recent Vulnerabilities
Defense of Cyber Crime Center (DC3)

DOD Cyber Exchange
DHS
    DHS Cyber Resources
    Homeland Open Security Technology (HOST)
DOJ
    News Search Key Word "Cyber"
FTC
     FTC Privacy Resource Links
Forum for Incident Response and Security Teams (First)
International Telecommunications Union, Cybersecurity Gateway
National Council of ISACs
NIST
    NIST Cybersecurity
    NIST Framework
Organization of American States, Cyber Security Program

Organization of Economic Cooperation and Development, Information Security and Privacy
Secret Service Task Force
US-CERT

    National Cybersecurity and Communications Integration Center    
    Information Sharing Specification for Cybersecurity: TAXII, STIX, CybOX

 

Vulnerability Information

Common Vulnerabilities and Exposures List (CVE)
Bugtraq
National Infrastructure Advisory Council's Vulnerability Disclosure Framework
National Vulnerability Database (NVD): Search
Open Vulnerability Assessment Language (OVAL)


Risk Management Framework from NIST
Introduction to Components of the Framework (NIST 2018a)Uses and Benefits of the Framework (NIST, 2018b)NIST SP 800-37 Revision 2: Risk Management Framework for Information Systems and Organizations (NIST, 2018c)

 
 

Open Source Tools

 

Cyber Security Vendor Websites

Antivirus Websites, Tools, and Blogs
AhnLab (China)
    AhnLab Whitepaper and Manuals
Avast/AVG (Czech Republic)
    History and Dictionary of Online Threats
AVG/Avast (Czech Republic)
   Security & Performance Tips
Avira (Germany)
    Top 10 Attack Stats by Avira
    Avira Virus Description Database
    Avira Blog*
Bitdefender (Romania)
    BitDefender Blog. Hot for Security*
    Story of Building the Bitdefender Box
BullGaurd (Denmark)
    BullGuard Forum
    BullGuard Articles and Consumer Guides*
Check Point (Israel)
    Article Site. Cybertalk.org*
    Check Point Blog and Publications*
Dr. Web (Russia)
    Forum with Odd and Interesting Subjects*
ESET (Slovakia)
    ESET Webinars, Tech Briefs, and Whitepapers
F-PROT (Iceland)
    Cyren Security Blog*
F-Secure (Finland)
    Router Checker Tool**
    F-Secure News and Videos*
    Removal Instructions for Dealing with Threats**
    Threat (Virus and Malware) Description Database
G-Data (Germany)
    G-Data Blog
GFI Software (US)
Kaspersky (Russia)
     Kaspersky Press Releases
Kingsoft (China)
Malwarebytes (Estonia)
    Malwarebytes Blog*
    Malwarebytes Forum
    Malwarebytes Resources: Infographics, Case Studies, Analyst Reports*
McAfee (USA)
    Anti-Malware Tools**
Norton / Symantec (USA)
   Internet Security Threat Report (ISTR)
   Mobile Device Reports*
   Security White Papers*
   Blog*
   Video on Most Dangerous Locations for Internet
   Symantec Threat Specific Removal Tools
Panda (Spain)
    Really Cool Infographic Explaining Product
    Panda Blog*
PC Matic (USA)
    PC Matic Forum
PSafe (Brazil)
360 (China)
    360 Total Security Blog*
Quick Heal (India)
Sophos (United Kingdom)
    Sophos Free Tools**
    Sophos Blog*
TG Soft (Italy)
TrapX
    TrapX Case Studies*
Trend Micro (Japan)
    Trend Micro Deep Web Stories*
    Trend Micro's This Week in Security News*
    Trend Micro Cyber Definitions
    Trend Micro Predictions*
Zemana (Turkey)
    Zemana Blog

 

Applicatio Security Vendor Sites

Arxan (US)
Bangcle (China)
DNP HyperTech (Japan)
Gemalto (UK)
Giesecke+Devrient (Germany)
GaurdSquare (Belgium)
Inside Secure (France)
Intertrust (US)
Jscrambler (US)
KOBIL (German)
Licel (US)
Lockin (Korea)
NSHC (Singapore)
OneSpan (US)
Promon (German)

Radware (Israel)





Penetration Tester Sites

Beyond Security (Israel)
Beyond Trust (US)
    Beyond Trust Resources
Digital Defense
    Digital Trust Security Guides*
    Case Studies*
    Webinars and Podcasts
Greenbone Networks (Germany)
Outpost24 (Sweden)
Qualys (US)
    Qualys Free Tools
Rapid7 (US)
    Resource Library: Quarterly Threat Report & Whitepapers*
    Rapid7 Blog*
Tenable Network Security, Inc. (US)
TripWire (US)
     TripWire Blog*

Threat Intelligence
Alert Logic
AlienVault Threat Intelligence
Anitian
    Anitian Blog*
Anomaly Threat Intelligence
Arbor Network's Netscout
    Arbor Networks Digital Attack Map    
Brand Protect (Merged with PhishLabs)
Cisco's Talos Intelligence
    Beers with Talos Podcast*
Crowdstrike
Digital Shadows
Fireye
Hewlett Packard Threat Intelligence
IBM X-Force
LogRhythm
LookingGlass Threat Intelligence
Optive
Recorded Future
RiskIQ
Surfwatch Labs


Identity Access Management
Sailpoint


Privileged Access  Management (PAM)

CyberArk

 
 
Stack of Books

2022

Added sections of "Communication Tips", "Cyber Psychology", "Cyber Security News", and "Cyber Security Podcasts". Added sub-sections "Security Architecture". categorized sites and created menu.  New site and presentation. 

2019

Added sites to sections named "Industry Websites", "Government Resources", "Certification and Training" and "Cyber Security Tools". 

2018

Created library. Focused on capturing many security vendor sites.

Link Library Update History