Our Top Vital 5 Cybersecurity Blogs to Follow in 2020

The world of cybersecurity is filled with so much news that it is hard to filter out what is relevant and reliable from all the noise. These cybersecurity bloggers have honed their skills in sharing relevant and credible information with readers, putting them on our list of Top Vital 5 Cybersecurity Blogs to follow in 2020.

KrebsonSecurity blog by Brian Krebs



Brian Krebs is a former reporter at The Washington Post who taught himself to read Russian while jogging on his treadmill and who blogs with a 12-gauge shotgun by his side. He is so entrenched in the digital underground that he is on a first-name basis with some of Russia’s major cyber-criminals.

Describing himself he says that much of his knowledge about computers and Internet security comes from having cultivated regular and direct access to some of the smartest and most clueful geeks on the planet. The rest he thinks probably comes from a willingness to take risks, make mistakes, and learn from them. The blog site which boasts 850,000 to 1.5 million page views a month and approximately 700,000 – 1 million unique visitors monthly, focuses on online crime investigations, the latest threats, security updates, data breaches, and cyber justice.

Troyhunt.com by Troy Hunt

troyhunt_smallTroy Hunt rose to fame with his `Have I Been Pwned’ project which gave him global recognition. As of June 2018, HIBP had recorded more than 5 billion compromised user accounts. The site as a public service offers information on data breaches and helps individuals to find out if their personal data has been stolen. His blog offers weekly information on the latest technologies, analysis of data breaches, his own security experiences, and news related to cybersecurity.

Troy is a Microsoft Regional Director who has also been named Microsoft’s Most Valued Professional (MVP) in Developer Security. He is often seen in the press covering big data leaks, and in Congress testifying on their global impact.

For his 101k followers, Troy is an authority dedicated to educating IT and security professionals with his 30+ security-related courses at Pluralsight, including his several-part Ethical Hacking course.

Schneieronsecurity.com by Bruce Schneier

bruch_schneir_smallSchneier on Security is the brainchild of Bruce Schneier who is an internationally renowned security enthusiast.

He has testified before Congress, is a frequent guest on television and radio, has served on several government committees, and is regularly quoted in the press. Schneier is a fellow at the Berkman Klein Center for Internet & Society at Harvard University; a Lecturer in Public Policy at the Harvard Kennedy School; a board member of the Electronic Frontier Foundation, AccessNow, and an Advisory Board Member of the Electronic Privacy Information Center and VerifiedVoting.org.

His blog shares his personal experiences, knowledge and opinions on cybersecurity, and related topics. Schneier’s newsletter “Crypto-Gram” and his blog “Schneier on Security” are read by over 250K people.

DanielMiessler.com by Daniel Miessler

daniel_miessler_smallAn experienced cybersecurity expert, consultant, and writer, Daniel takes a personal approach on his blog — greeting visitors with the words: “My name is Daniel Miessler… I explore the interesting and beautiful at the intersection of security, technology, and humans.”

His offerings include curated newsletters, essays, podcasts, and high-quality writing. He started his blog in 1999 as a platform for collecting technical knowledge. Today it is his most important life project, with over 2,500 essays, posts, tutorials, articles, and other types of content.

He is the Director of Advisory Services with IOActive and is based out of San Francisco. He has over 17 years of experience in information security and specializes in application security with a specific focus on web and application assessments, and helping enterprise customers build effective application security programs. His blog which attracts over 450K monthly visitors, is one of the highest-rated personal sites in the world. The blog focuses on information security, technology, and also philosophy, and creativity.

Grahamcluley.com by Graham Cluley

graham_clueley_smallA longtime industry expert who held senior roles with Sophos and McAfee before deciding to begin “working for myself” in 2013, one could say Graham Cluley is clued into the cybersecurity scene — running a blog with an open, accessible style while continuing his work as a conference speaker, media pundit, podcaster and consultant. He is recognized for his knowledge, insight, and ability to present potentially dry and weighty subject matters in a manner that is accessible to all.

Having worked in the computer security industry since the early 1990s, he was employed in senior roles at Sophos and McAfee. He was the editor and main writer of Sophos’s award-winning Naked Security site, which typically receives 1.5 million page views each month. In 2011, he was inducted into the Infosecurity Europe Hall of Fame. Graham now works as an independent security blogger, podcaster, and speaker and has made thousands of international media appearances on TV, radio, and in print.

About MazeBolt

Israel-based MazeBolt is an innovation leader in cybersecurity, with over two decades of experience in pioneering DDoS protection solutions. The company’s new flagship product, RADAR™, is a patented, new technology. It offers DDoS protection through automated DDoS simulations on live production, with zero downtime. Working in conjunction with any mitigation solution installed. Its unique capabilities have ensured business continuity and full DDoS security posture for enterprises worldwide including Fortune 1000 & NASDAQ-listed companies.

Leave a Reply

Your email address will not be published. Required fields are marked *

Stay Updated.
Get our Newsletter*

Recent posts

Rapid Reset: the New DDoS Threat

CISA (Cybersecurity and Infrastructure Security Agency) urged organizations that provide critical internet delivery services to immediately apply patches and other mitigations after an internet-wide security

Read More