Below is a list of the web sources provided in my previous
post:
- National Vulnerability Database
- Common Vulnerabilities and Exposures – Official Site
- CVE Details
- Internet Storm Center
- The Honeynet Project
- McAfee’s Threat Center
- Symantec Security Response
- Information Week’s Dark Reading
- Schneier on Security
- Bellevue University’s Cybersecurity Center
What I have found is I like every site and visit each
often; however, I do visit some more than others and use five of them
extensively to assist me with my cybersecurity studies. The five sites I find myself visiting and
using more than the others are:
- National Vulnerability Database
- Common Vulnerabilities and Exposures – Official Site
- CVE Details
- Information Week’s Dark Reading
- McAfee’s Threat Center
The first three web sources are great for researching and
discovering system vulnerabilities. The
last two sources are good for staying current and learning about discovered
vulnerabilities, but they are also good sources to use for learning about
current and emerging threats.
It is difficult to determine if one or more of the initial
web sources should be removed from the list because of not using it extensively
for my research purposes. All of them
have been used at some point over the past three years to assist me with
obtaining more information about a cybersecurity related topic. Therefore, I have elected to keep the list as
is. The list can be used as a tool for others to use
as a guide to build their own web source library. Feel free to pick and choose the ones that
will work best for you.
There is one web resource I feel should be added to my
initial list. It is a source I can
always turn to when I have exhausted my list of sources when trying to obtain
information about a topic related to cybersecurity. That one source I can always count on is
Google.
Google always produces other
sources that may have something or may lead you to another source containing the
information you’re looking for. Just be
sure to verify the discovered information before using it to assist you with
whatever you are doing.
No comments:
Post a Comment