With so much distrust in the media these days, it can be daunting trying to sift through the noise to find news that you trust. That’s why we compiled a list of our favorite, reliable cybersecurity news sources.

Recommended Cybersecurity News Outlets

 

The Hacker News

The Hacker News (THN) is a trusted, widely-acknowledged, and dedicated cybersecurity news platform attracting over 8 million monthly readers. Their audience includes IT professionals, researchers, hackers, technologists, and enthusiasts. The Hacker News features the latest cybersecurity news and in-depth coverage of current as well as future trends in infosec and how they are shaping our digital world. Visit The Hacker News

Dark Reading: Connecting the Information Security Community

One of the most widely-read cyber security news sites on the internet, Dark Reading, is now the most trusted online community for security professionals. Their community members include thought-leading security researchers, CISOs, and technology specialists, along with thousands of other security professionals.

DarkReading.com encompasses 13 communities, and each explores enterprise security challenges like analytics, attacks and breaches, application security, careers and people, cloud security, endpoint,  IoT, mobile, operations, perimeter, risk, threat intelligence, and vulnerabilities and threats. Each community is led by editors and subject matter experts who collaborate with security researchers, technology specialists, industry analysts, and other Dark Reading members to provide timely, accurate, and informative articles that lead to spirited discussions. Visit Dark Reading

Krebs On Security

Brian Krebs worked as a reporter for The Washington Post from 1995 to 2009, authoring more than 1,300 blog posts for the Security Fix blog. Additionally, he wrote hundreds of stories for washingtonpost.com and The Washington Post newspaper, including eight front-page stories in the dead-tree edition and a Post Magazine cover piece on botnet operators. After an incident where his home network was overrun by a Chinese hacking group, Krebs became intensely interested in computer security. Visit Krebs On Security

The CyberWire 

The CyberWire is a cybersecurity news source that serves as a trusted, independent voice in the marketplace. They deliver concise, accessible, and relevant content, separating the signal from the noise in a burgeoning industry, overloaded with information and competing messages. Real people create their cybersecurity new products—analysts, experts, and writers — who are committed to offering publications and programs where professionals, executives, students, and security enthusiasts alike can learn something new and keep up-to-date on the industry. Visit The CyberWire

 

Cybersecurity Podcasts

 

Darknet Diaries 

Real stories from the dark side of the internet. This podcast is about hackers, breaches, APTs, hacktivism, cybercrime, and all the things that dwell on the hidden parts of the network.

Where to listen: 
Apple Podcast
Spotify
RadioPublic
Google Podcast

Hacking Humans

The CyberWire produces this podcast. Each week the CyberWire’s Hacking Humans Podcast looks behind the social engineering scams, phishing schemes, and criminal exploits that are making cybersecurity news headlines and taking a heavy toll on organizations around the world.

Where to listen: 
Apple Podcast
Stitcher
Google Podcast

Hacked  

A podcast about the curious, enlightening, and occasionally criminal underbelly of the internet.  Hacked began as a concept for a documentary. With Jordan asking questions and Scott answering, they quickly realized that the content was definitely of interest, but the base of knowledge was too much to transfer in a single video—Hacked was born.

It seems that each day a news story breaks that speaks to digital security. Every season, a new TV show tries to latch onto this growing curiosity, but most fail to represent reality. Visited Hacked’s website

Where to listen:
Apple Podcast

Managed Security Services

Your around the clock SOC.

Managed Endpoint Detection and Response

Some attacks will succeed. Don’t worry—we have you.

Managed Detection and Response

Augment your IT team using our expertise and the latest technologies.

Email Protection Suite

Defending against the leading attack vector.

Cloud Email and Collaboration

More than ever, the cloud is essential.

Incident Response Readiness

When a breach occurs, you’ll be ready.

Compliance & Risk Services

Take the next steps on your cybersecurity maturity journey.

Trusted Cybersecurity for an Uncertain World

Understand, detect, and effectively respond to threats, reduce business risk and improve the return on your security investment.

Financial Services

We comply with the same regulations you do.

Healthcare

Affordable defenses for a sector under attack.

Retail

SilverSky stands between cybercriminals and your customers’ data.

Benefits of a Single Vendor Relationship

The Cooperative Bank of Cape Cod found itself especially appreciative of SilverSky’s comprehensive solution set—particularly as they rapidly, but securely, enabled employees to work remotely.

ACET

Automated Cybersecurity Examination Tool

HIPAA

Health Insurance Portability and Accountability Act

PCI DSS

Payment Card Industry Data Security Standard

FFIEC

Federal Financial Institutions Examination Council

GLBA

Gramm-Leach-Bliley Act

ACET Helps Credit Unions Further Their Missions

Learn how going all in for ACET protects customers and the health of community-based financial services.

Resources

Articles, guides, ebooks, tools, on-demand webinars, case studies, and more. Explore a range of topics.

Press & Events

Press releases, upcoming conferences and trade shows, and future and on-demand webinars

Revisiting Cybersecurity’s Delicate Balance

Learn how CISOs are rebalancing prevention, detection, and response for stronger cyber defenses.

About Us

Trusted cybersecurity for an uncertain world.

Careers

Looking to join the fight against cybercriminals?

Security Management Console

Comprehensive customer portal for state of devices, reports for compliance, support tickets, and more.

Transforming Cybersecurity Culture from Corner Offices to Cubicles

Executives are increasingly thinking about cybersecurity management in a similar manner as they would any other risk assessment. This guide is here to help.