In looking for good online cybersecurity sources, previously I wrote about the importance of finding credible sources and credible information. I wrote about using the CARS checklist for evaluating sources for Credibility, Accuracy, Reasonableness, and Support. I will post the CARS criteria here again, for convenience:
trustworthy source, author’s credentials, evidence of quality control, known or respected authority, organizational support. Goal: an authoritative source, a source that supplies some good evidence that allows you to trust it.
up to date, factual, detailed, exact, comprehensive, audience and purpose reflect intentions of completeness and accuracy. Goal: a source that is correct today (not yesterday), a source that gives the whole truth.
fair, balanced, objective, reasoned, no conflict of interest, absence of fallacies or slanted tone. Goal: a source that engages the subject thoughtfully and reasonably, concerned with the truth.
listed sources, contact information, available corroboration, claims supported, documentation supplied. Goal: a source that provides convincing evidence for the claims made, a source you can triangulate (find at least two other sources that support it).
In my previous post on cybersecurity sources of information, I listed some good, reputable sources. Please reference my CYBR650, Week 2 post for those. I also wanted to add some others that you might find useful.
Schneier on Security – Bruce Schneier is an internationally renowned security technologist, called a “security guru” by The Economist. He is also the author of 13 books.
Dark Reading – Christina Chipurici at Heimdal Security says Dark Reading is a widely-read cyber security site that addresses professionals from the IT environment, security researchers and technology specialists. They use their experience and knowledge to provide articles, recommendations, news and information on IT security.
CIO Magazine – a venerable favorite for IT news, insight and analysis. CIO has a section devoted to cybersecurity.
InfoSecurity Magazine – an online magazine covering cybersecurity and security strategy.
CARS Checklist (n.d.). CIS 629, Managing Emerging Technologies, Bellevue University.
Harris, R. (2015, January). Evaluating Internet Research Sources. Retrieved June 18, 2017, from http://www.virtualsalt.com/evalu8it.htm
Chipurici, C. (2017, January 06). 50 Amazing Internet Security Blogs You Should Be Following [Updated]. Retrieved July 14, 2017, from https://heimdalsecurity.com/blog/best-internet-security-blogs/