Das “Who is Who” in Information Security

Eine Übersicht und eine Rangliste der 150+ einflussreichsten Blogs und Publikationen im Bereich der Informationssicherheit Cyber Security . Der Artikel (engl.) beinhaltet auch Rangfolgen pro Kategorie und aufgeteilt nach Twitter Followern oder der Alexa Position (Wichtigkeit im Internet). Die Studie wurde durch LUCY Security – einem Softwareanbieter für IT-Awareness Trainings und Technologie Assessments – im Oktober / November 2016 erstellt. Die gesamte Studie (engl.) kann auch  runtergeladen werden, siehe unten.

Die Übersicht – Die 150+ wichtigsten It-Security Blogs und Publikationen

Wir analysierten mehr als 150 Blogs, ‘Zeitschriften’ und weitere relevante Publikationen im Bereich der Informationssicherheit. Total folgen 63 Millionen Twitter-User den News dieser Informationsprovider. Die meisten Follower vereinen die grossen Magazine: The 150 most influencial cyber security blogs and publications by category - pie chart infosecDiejenigen Webseiten, die wie Onlinemagazine ausschauen, vereinen 43 Millionen Twitter Follower.

Im Vergleich dazu ist die ‘echte’ IT-Security Blogosphäre eher klein. Die 64 hier untersuchten Blogs kommen im mit ‘nur’  1.1 Millionen Twitter Followern vergleichsweise bescheiden daher.

Die Hersteller wurden ebenfalls untersucht. Diese liefern fast alle ausgezeichnete Inhalte zu Internet-Gefahren, IT-Schutz, Cyber Bedrohungen etc. Den 29 Herstellerseiten folgen über 17 million Twitter Follower.

Total deckt wertet diese Studie folgende Kategorien und Auftritte aus:

  • 64 Blogger
  • 36 Magazine und “Publikationen”
  • 29 Security Hersteller Auftrite
  • 08 Auftritte des SANS Instituts
  • 06 Consulting Firmen
  • 04 Government Sites (Sozusagen nur US)
  • 03 Microsoft Websites
  • 01 ‘Hybrid’ Website

Deutschsprachige Sites: Da die Community grundsätzlich englischsprachig ist, sind die rein deutschsprachigen Auftritte selten. Erwähnenswert sind

  1. Heise Online  auf Platz 10 im Alexa Ranking der Publikationen
  2. Heise Security auf Platz 11 im Alexa Ranking der Publikationen
  3. IT-Administrator auf Platz 17 im Alexa Ranking der Publikationen

So, und ab hier geht es auf Englisch weiter….

Top 20 Sites – The Titans

The most important sites are not only focussed on IT security. The first ‘pure’ IT security contributor is Fireye ranking on position 12. And there is only one blogger within the top 20: Brian Krebs is on position 16 with 153K followers.

Rank Site Twitter Twitter  Followers
1 Google Online Security Blog @google 15,996,107
2 Forbes (IT Security) @forbes 10,700,000
3 Mashable (Cybersecurity) @mashable 7,810,000
4 Techcrunch (Infosecurity) @TechCrunch 7,650,000
5 Wired’s Threat Level @WIRED 7,200,000
6 The Guardian Info Security Hub @guardian 5,940,000
7 CNET (IT security) @CNET 1,270,000
8 Ars Technica @arstechnica 1,080,000
9 PCMag @pcmag 342,000
10 Zero Day (zdnet) @ZDNet 340,000
11 Microsoft Secure Blog @msftsecurity 262,000
12 FireEye Blog @FireEye 239,000
13 Heise online @heiseonline 199,000
14 CIO @CIOonline 162,000
15 Cyber Defense Magazine @cyberdefensemag 155,000
16 Krebs on Security @briankrebs 153,000
17 TechRepublic @TechRepublic 152,000
18 Symantec Weblog @symantec 152,000
19 Motherboard Vice @motherboard 139,000
20 Dark Reading @DarkReading 135,000

LUCYs Choice – Unsere Wahl

While doing the research we were impressed by the amount of great content and the makeup of most of the websites. This made it hard to make a selection. Below we listed those 18 players, which impressed us most. Please take not that this is an individual and personal choice.

Site Tweets
per Month
You should follow the blog because….
Google Online Security Blog 227 …is is one of the better blogs here in the list! It is a reliable source and reference point on online security and privacy you need to acknowledge.
Mashable (Cybersecurity) 1843 …they want to be the leading media company for the Connected Generation.
Wired’s Threat Level 598 …it’s Wired and look at the Alexa ranking (below)! Of course there are not only IT security tweets…
FireEye Blog 52 …if you would like to read posts from only one source it could be Fireye. The company has tree blogs: The Threat research blog, the products and services blog and the executive perspectives blog. It’s overwhelming.
Krebs on Security 123 …he became the most renowned infosec voice after the “Krebs Attack” in 2016 and he reported the “Target” and “Home Depot” Breaches. AND: You just can’t neglect him, that’s why he’s part of our top choices.
Motherboard Vice 559 …somebody told me that lots of the data breaches in the past years were first announced by Motherboard.
Infosecurity Magazine 249 …this magazine looks like a tabloid for IT security, well balanced between story, technology and information.
ThreatPost 133 …it is the Kaspersky Lab Security News Service, from our point of view one it is one of the most relevant news providers. Easy to read!
The Register 1079 …the tech publication is provocative, fresh and upbeat.
Sophos Naked Security 93 …a great example of how a supplier delivers high-quality content. This is an excellent news room, a professional magazine and easy reading like a blog!
Stay Safe Online 206 …Stay Stafe Online is powered by the National Cyber Security Alliance (US) an tries to teach online safety for everbody. No tech buzzwords but valuable content even for IT security Pros. We like it!
Alien Vault Blog 162 …it is one of LUCYs most beloved twitter accounts, great brand, great service, great content.
Sucuri Blog 102 …Sucuri cleans and protects websites. The blog has a beautiful design and focusses on hacking and protecting websites. Good!
J4vv4D 348 …Javvad Malik is an Information Security consultant, and Security Advocate at AlienVault. He is a author, researcher, analyst, advocate, blogger, and YouTuber with a fresh perspective on security. We love his videos.
Information Security Buzz 502 …’Tasty’ news site. Excellent for fast, reliable information (buzz) gathering. If you want to know what is going on read this site.
Liquidmatrix Security Digest 14 …it provides great features, briefings and podcasts. Not too technical. Good!
LUCY Security Blog 83 …because it’s first choice when it comes to malware simulations and awareness training. LUCY is the major platform for phishing / smishing simulations, technology assessements and IT security awareness training. Oure site contains a interesting blog. Disclaimer: We are the authors of this list.
Infosec News 13 …excellent stories from the world of IT security, cyber threads, attacks et cetera.

Disclaimer: The LUCY Security Blog is part of this list of 18 top choice websites. LUCY is the creator of this report.

 Blogger ranking

Site Twitter Twitter
Followers
Tweets
(Nov 2016)
Month joined
Twitter
1 Krebs on Security @briankrebs 153,000 11,200 03/01/2009
2 Dr. Eric Cole @drericcole 114,000 3,100 05/01/2009
3 Schneier on Security @schneierblog 88,500 3,600 12/01/2008
4 Dan Kaminsky’s Blog @dakami 56,700 65,300 09/01/2007
5 Graham Cluley @gcluley 51,200 21,800 01/01/2008
6 Paul’s Security Weekly @securityweekly 45,000 9,500 02/01/2008
7 A Few Thoughts on Cryptographic Engineering @matthew_d_green 45,000 29,400 01/01/2010
8 Troy Hunt @troyhunt 44,000 61,200 04/01/2008
9 TaoSecurity @taosecurity 41,000 16,800 12/01/2008
10 Uncommon Sense Security @jack_daniel 39,000 76,000 06/01/2007
11 Observations on InfoSec @DanielMiessler 37,800 8,300 03/01/2007
12 OpenDNS Blog @opendns 28,400 8,700 01/01/2007
13 Shell is Only The Beginning @Carlos_Perez 27,300 26,400 07/01/2008
14 Lenny Zeltser on Information security @lennyzeltser 26,400 4,700 05/01/2008
15 Errata Security @ErrataRob 24,000 63,600 07/01/2008
16 Rational Survivability @Beaker 21,000 98,000 04/01/2007
17 Elie Bursztein @elie 19,800 2,700 07/01/2009
18 Security Through Education @humanhacker 19,400 9,900 06/01/2009
19 PerezBox @sucurisecurity 18,900 9,200 04/01/2009
20 Network Security Blog @mckeay 17,900 62,800 03/01/2007
21 Security Affairs @securityffairs 16,200 168,000 11/01/2011
22 https://www.bsk-consulting.de/blog/ @cyb3rops 14,200 9,200 06/01/2013
23 The Hacker News @HNTweets 13,300 292,000 02/01/2010
24 Lawfare @lawfareblog 13,300 13,900 09/01/2010
25 Andrew Hay @andrewsmhay 12,300 46,600 12/01/2007
26 Matt Suiche @msuiche 11,200 1,600 04/01/2008
27 Dr. InfoSec @DrInfoSec 10,800 14,200 11/01/2008
28 Security-FAQs @Security_FAQs 10,800 27,700 06/01/2008
29 ImperialViolet @agl__ 10,500 2,400 01/01/2011
30 ShackF00 @daveshackleford 10,300 14,300 11/01/2008

To see details about ranks 31 to 64 please download the full study (PDF) below.

Es ist die grösste Analyse der IT-Security Blogosphäre, lade die Details runter!

Herstellerranking

A lot of companies have excellent websites and are providing valuable content: News, stories, thread reports, etc. But if you think that most websites look the same and have similar content, then you are wrong. There are significant differences in terms of customer focus, content and professionalism in maintaining everything. Of course Google or Microsoft are not security vendors. But they are too important, that’s why we took them in the list without creating a separate category.

Rank Site Twitter
Followers
Tweets
per Month
You should follow the blog because….
1 Google Online Security Blog 15,996,107 227 …is is one of the better blogs here in the list! It is a reliable source and reference point on online security and privacy you need to acknowledge
2 FireEye Blog 239,000 52 …if you would like to read posts from only one source it could be Fireye. The company has tree blogs: The Threat research blog, the products and services blog and the executive perspectives blog. It’s overwhelming.
3 Symantec Weblog 152,000 199 …you should read at least one AV-provider blog. It contents an excellent and reliable mix of security information that focuses on malware, phishing and other threats from the cyber security world.
4 Trend Micro Simply Security 85,200 135 …it is a well written blog about all the information security topics, like zero day vulnerabilities, ransomware and it covers lot of news.
5 Hot For Security 72,500 146 …because it collects the really relevant blog posts from others. Provided by Bitdefender
6 F-Secure Blog 61,800 359 …it shows research from a major finnish player in the area of antivirus and intrusion prevention. Great insights and whitepapers about malware, national scams, etc.
7 F-Secure Safe & Savvy Blog 61,800 359 …this site is covering topics around privacy protection (VPN, security, mobile, cloud storage, privacy). They have a great mobile VPN app.
8 Webroot Threat Blog 52,700 157 …this blog contains weekly ‘Thread Recap’ posts, which give an excellent overview of ‘what happened’. Webroot is an endpoint security and threat intelligence service provider, covering even IoT devices. But translating the posts into German using Google Translate is a little bit cheesy.
9 Sophos Naked Security 50,100 93 …a great example of how a supplier delivers high-quality content. This is an excellent news room, a professional magazine and easy reading like a blog!
10 McAfee security blog 42,400 200 …it is a good a mix of tips and security information that focus on malware, phishing and other threats from the cyber security world.
11 Malwarebytes Labs 36,300 92 …it’s a renowned blog by a renowned company categorizing articles, from malware analysis, cybercrime, exploits and hacking.
12 State of Security 32,500 445 …TripWire provides advanced threat, security and compliance solutions. It’s their multi author blog.
13 Alien Vault Blog 28,600 162 …it is one of LUCYs most beloved twitter accounts, great brand, great service, great content.
14 SpiderLabs Security Blog 26,200 65 …you can see all the posts from Trustwave’s elite team of ethical hackers, forensic investigators and researchers helping organizations fight cybercrime and protect data.
15 Bromium Blog 25,400 16 …Bromium is an provider of an ‘alternative’ endpoint security solution. Protect your brand, your data and your people with Bromium’s revolutionary approach to security…CPU-enforced isolation
16 The Veracode Blog 20,500 79 …there are good written stories and questions about (IT) security as a whole. For business people
17 Sucuri Blog 18,900 102 …Sucuri cleans and protects websites. The blog has a beautiful design and focusses on hacking and protecting websites. Good!
18 Digital Forensics Blog 16,400 3584 …they obviously stopped the blog and became mass twitterers…
19 Cisco Security 13,800 142 …Cisco doesn’t have a lot of curated content on this site, but the content available you should definitively know! The video anatomy of an attack is just awesome!
20 Kaspersky Lab’s Securelist 12,100 16 …it provides an excellent and reliable mix of security information that focuses on malware, phishing and other threats from the cyber security world. The site is curated like a real magazine.
21 ThreatTrack Security 6,491 26 ..it is a well written blog in a techno orientied business language, mostly about actual threats. Suitable for non hackers.
22 Fox IT Security Blog 6,300 9 …it full of information about cybercrime defense and of course of all other itsecurity news.
23 Zone Alarm Cyber Security Blog 5,521 11 …it provides a reliable mix of security information that focuses on malware, phishing and other threats from the cyber security world.
24 Securosis 5,000 16 …it is a little bit different, because it comes from a security resarch and advisory company.
25 CYREN Security Blog 1,881 22 …Cyren provides a Enterprise Security SaaS solution and Threat Intelligence Services. Their blog is outstanding.
26 We Live Security 1,777 18 …it’s from a team of senior IT-security specialists known from elsewhere. It’s also known as Eset Blog
27 Fraud.net 1,322 9 …they provide real life stories about credit card fraud and data breach.
28 LUCY Security Blog 1,200 83 …because it’s first choice when it comes to phishing simulations, malware simulations and awareness training. LUCY is the major platform for phishing / smishing simulations, technology assessements and IT security awareness training. Their site contains a very interesting blog.
29 Corero / ex Security Bistro 885 43 …it is from Corero a company which provides a solution for automatic DDoS attack mitigation.

Magazines: Alexa Ranking

A Twitter Ranking is available in the full study (PDF) –  For websites which look more like a magazine we decided to group them in a separate category. The Alexa ranking shows the importance / position of the website in the Internet.

Rank Site Alexa
global (2016)
Twitter Twitter
Followers
No. of Tweets
(Nov 16)
Tweets
per Month
1 CNET (IT security) 156 @CNET 1,270,000 123,000 1367
2 The Guardian Info Security Hub 157 @guardian 5,940,000 287,000 3458
3 Motherboard Vice 200 @motherboard 139,000 48,600 559
4 Forbes (IT Security) 214 @forbes 10,700,000 145,000 1747
5 Mashable (Cybersecurity) 472 @mashable 7,810,000 212,000 1843
6 Techcrunch (Infosecurity) 521 @TechCrunch 7,650,000 141,000 1226
7 PCMag 832 @pcmag 342,000 34,800 348
8 PCMag’s Security Watch 832 @neiljrubenking 2,511 3,700 43
9 Wired’s Threat Level 960 @WIRED 7,200,000 68,200 598
10 Heise online 1,328 @heiseonline 199,000 87,800 770
11 Heise security 1,328 @heisec 71,200 10,400 106
12 Ars Technica 1,331 @arstechnica 1,080,000 71,600 612
13 Zero Day (zdnet) 2,288 @ZDNet 340,000 135,000 1184
14 TechRepublic 2,729 @TechRepublic 152,000 39,500 353
15 The Register 5,342 @TheRegister 59,700 91,700 1079
16 CIO 8,701 @CIOonline 162,000 39,600 435
17 IT Administrator 17,490 @ita_blog 1,590 1,200 17
18 Techworld Security 32,538 @techworldnews 13,300 16,100 177
19 Dark Reading 39,963 @DarkReading 135,000 10,700 113
20 CSO Online 45,849 @csoonline 29,600 14,400 158
21 Tech News World 47,508 @technewsworld 8,362 15,600 164
22 IT Pro Portal 52,030 @ITProPortal 15,000 51,900 535
23 SC Magazine 63,232 @scmagazineUK 10,500 15,900 159
24 Network Computing 73,891 @NetworkComputin 5,880 8,100 86
25 SecurityWeek 77,954 @SecurityWeek 99,200 18,000 202
26 ThreatPost 79,145 @threatpost 123,000 12,400 133
28 Infosecurity Magazine 86,419 @InfosecurityMag 129,000 22,400 249
29 PenTest Magazine 547,018 @PenTestMag 6,000 4,000 61
30 eForensics Magazine 549,562 @eForensics_Mag 4,600 10,700 206
31 Security Weekly 742,362 @securityweekly 45,000 9,500 91
32 Cyber Defense Magazine 952,375 @cyberdefensemag 155,000 8,800 187
33 Inside Cybersecurity 1,226,809 @InsideCyber 1,770 11,800 268
34 Digital Forensics Magazine 2,089,503 @DFMag 9,100 4,100 48
35 ITSP Magazine 2,473,698 @ITSPmagazine 8,945 5,200 371
36 Help Net Security 5,247,374 @helpnetsecurity 36,400 31,600 310
37 Infosec News 5,755,663 @infosecnews_ 1,054 1,000 13

Die 150+ wichtigsten Beeinflusser, Publikationen und Blogger in Sachen – Komplette Studie runter laden

All 150+ Sites: Ranking based on Alexa

Site Alexa Rank
global (11/ 2016)
Twitter
Followers
Month joined
Twitter
Microsoft Secure Blog 41 262,000 10/01/2010
Microsoft Security Response 41 93,000 02/01/2010
Microsoft Malware Protection Center 41 19,200 11/01/2010
CNET (IT security) 156 1,270,000 04/01/2009
The Guardian Info Security Hub 157 5,940,000 11/01/2009
Motherboard Vice 200 139,000 07/01/2009
Forbes (IT Security) 214 10,700,000 11/01/2009
Mashable (Cybersecurity) 472 7,810,000 03/01/2007
Techcrunch (Infosecurity) 521 7,650,000 03/01/2007
Cisco Security 688 13,800 09/01/2008
PCMag 832 342,000 06/01/2008
PCMag’s Security Watch 832 2,511 07/01/2009
Wired’s Threat Level 960 7,200,000 03/02/2007
McAfee security blog 1,324 42,400 06/01/2010
Heise online 1,328 199,000 04/01/2007
Heise security 1,328 71,200 08/01/2008
Ars Technica 1,331 1,080,000 01/01/2007
Google Online Security Blog 2,153 15,996,107 02/01/2009
Zero Day (zdnet) 2,288 340,000 04/01/2007
TechRepublic 2,729 152,000 06/01/2007
Homeland Security / Cybersecurity 2,956 74,700 02/01/2012
Symantec Weblog 3,291 152,000 11/01/2008
OpenDNS Blog 3,403 28,400 01/01/2007
Malwarebytes Labs 3,875 36,300 01/01/2009
Bleeping Computer 4,840 5,774 06/01/2009
The Register 5,342 59,700 09/01/2009
Trend Micro Simply Security 6,796 85,200 08/01/2007
Sophos Naked Security 7,287 50,100 10/01/2010
The Hacker News 8,549 13,300 02/01/2010
CIO 8,701 162,000 03/01/2009
Sucuri Blog 10,900 18,900 04/01/2009
IT Administrator 17,500 1,590 10/01/2010
F-Secure Blog 19,700 61,800 08/01/2009
F-Secure Safe & Savvy Blog 19,700 61,800 08/01/2009
SANS Internet Storm Center Diary/Blog 24,800 59,000 06/01/2007
SANS Computer Forensics Blog 24,800 40,900 02/01/2009
SANS Security Trends Blog 24,800 29,800 04/01/2009
SANS Cyber Defense Blog 24,800 21,800 11/01/2014
SANS Penetration Testing Blog 24,800 18,800 10/01/2010
SANS Software Security Blog 24,800 7,931 05/01/2009
SANS Institute AppSec Blog 24,800 7,900 05/01/2009
SANS Security Awareness Blog 24,800 4,344 10/01/2011
Webroot Threat Blog 27,400 52,700 10/01/2008
Techworld Security 32,600 13,300 03/01/2009
SpiderLabs Security Blog 34,500 26,200 01/01/2009
Krebs on Security 35,500 153,000 03/01/2009
Dark Reading 40,000 135,000 11/01/2008
Zone Alarm Cyber Security Blog 45,700 5,521 08/01/2007
CSO Online 45,900 29,600 03/01/2009
FireEye Blog 46,700 239,000 05/01/2009
Tech News World 47,600 8,362 11/01/2008
IT Pro Portal 52,100 15,000 09/01/2008
Troy Hunt 53,100 44,000 04/01/2008
Schneier on Security 53,300 88,500 12/01/2008
We Live Security 56,200 1,777 01/01/2013
State of Security 56,900 32,500 05/01/2009
Alien Vault Blog 59,400 28,600 02/01/2009
Graham Cluley 62,500 51,200 01/01/2008
SC Magazine 63,300 10,500 06/01/2008
The Veracode Blog 71,600 20,500 05/01/2008
Network Computing 73,900 5,880 12/01/2008
Security Affairs 76,000 16,200 11/01/2011
SecurityWeek 78,000 99,200 05/01/2009
Observations on InfoSec 79,000 37,800 03/01/2007
ThreatPost 79,200 123,000 01/01/2009
IT Security Guru 79,200 8,000 03/01/2012
Kaspersky Lab’s Securelist 80,400 12,100 03/01/2009
US-CERT 85,400 58,600 12/01/2008
Infosecurity Magazine 86,500 129,000 04/01/2009
Information Security Buzz 121,000 10,200 05/01/2013
Lawfare 129,000 13,300 09/01/2010
SecureWorks 164,000 19,200 06/01/2008
CYREN Security Blog 174,000 1,881 12/01/2008
CyberArk 186,000 4,970 06/01/2009
Lenny Zeltser on Information security 194,000 26,400 05/01/2008
eLearn Security 212,000 4,100 08/01/2009
Kroll Call Blog 215,000 2,143 10/01/2012
Stay Safe Online 215,000 33,200 09/01/2009
Hot For Security 224,000 72,500 09/01/2007
SkullSecurity 256,000 3,520 02/01/2010
TrustedSec 304,000 18,100 11/01/2011
Hacking Articles 315,000 386 09/01/2009
Shell is Only The Beginning 366,000 27,300 07/01/2008
Errata Security 389,000 24,000 07/01/2008
Infosec Island 430,000 5,540 06/01/2009
Security Through Education 431,000 19,400 06/01/2009
PenTest Magazine 548,000 6,000 04/01/2011
eForensics Magazine 550,000 4,600 06/01/2012
Bromium Blog 586,000 25,400 01/01/2009
The Security Ledger 599,000 2,560 08/01/2012
Corero / ex Security Bistro 610,000 885 02/01/2009
ThreatTrack Security 621,000 6,491 08/01/2008
PerezBox 667,000 18,900 04/01/2009
Robert Penz Blog 696,000 147 05/01/2013
Security Weekly 743,000 45,000 02/01/2008
Paul’s Security Weekly 744,000 45,000 02/01/2008
A Few Thoughts on Cryptographic Engineering 745,000 45,000 01/01/2010
Securosis 865,000 5,000 11/01/2008
stop.think.connect 872,000 27,200 01/01/2012
Fox IT Security Blog 876,000 6,300 10/01/2008
Cyber Defense Magazine 953,000 155,000 11/01/2012
…AND YOU WILL KNOW US BY THE TRAIL OF BITS 983,000 6,019 05/01/2010
/dev/random 986,000 8,122 05/01/2008
Dan Kaminsky’s Blog 1,003,000 56,700 09/01/2007
Elie Bursztein 1,142,000 19,800 07/01/2009
WiKID Blog 1,186,000 4,670 12/01/2008
Inside Cybersecurity 1,227,000 1,770 02/01/2013
Application & Cyber Security Blog 1,243,000 1,500 11/01/2010
Security Wing 1,333,000 2,600 12/01/2010
ImperialViolet 1,450,000 10,500 01/01/2011
Security-FAQs 1,571,000 10,800 06/01/2008
J4vv4D 1,977,000 10,300 04/01/2009
TaoSecurity 2,005,000 41,000 12/01/2008
NoticeBored 2,020,000 155 07/01/2009
Digital Forensics Magazine 2,090,000 9,100 09/01/2009
Kevin Townsend’s IT Security 2,419,000 2,520 12/01/2009
Rational Survivability 2,440,000 21,000 04/01/2007
ITSP Magazine 2,474,000 8,945 08/01/2015
Fraud.net 2,481,000 1,322 11/01/2012
Network Security Blog 2,536,000 17,900 03/01/2007
BH Consulting IT Security Watch 2,596,000 730 01/01/2009
LUCY Security Blog 2,954,000 1,200 10/01/2015
https://www.bsk-consulting.de/blog/ 3,036,000 14,200 06/01/2013
http://emergentchaos.com/ 3,098,000 7,950 01/01/2009
The Security Skeptic 3,184,000 1,580 11/01/2009
Roger’s Information Security Blog 3,326,000 1,002 06/01/2009
flyingpenguin 3,442,000 3,970 05/01/2010
Liquidmatrix Security Digest 3,519,000 1,750 08/01/2008
http://www.principlelogic.com/ 3,961,000 2,412 04/01/2009
IT Security Expert Blog 3,996,000 4,320 10/01/2008
DataLossDB 4,469,000 5,830 01/01/2009
Help Net Security 5,248,000 36,400 04/01/2008
Infosec News 5,756,000 1,054 06/01/2010
The Harmony Guy 5,923,000 5,107 06/01/2008
Andrew Hay 6,008,000 12,300 12/01/2007
Holistic InfoSec 6,131,000 2,230 06/01/2009
Matt Suiche 6,283,000 11,200 04/01/2008
Simon PG Edwards 7,066,000 754 09/01/2011
Cyber Sins 7,369,000 865 04/01/2009
ShackF00 7,560,000 10,300 11/01/2008
Front Line Sentinel 9,018,000 291 04/01/2012
Uncommon Sense Security 10,530,000 39,000 06/01/2007
Lucius on Security 10,530,000 380 01/01/2010
Dr. InfoSec 10,672,000 10,800 11/01/2008
Digital Forensics Blog 11,635,000 16,400 05/01/2009
Data-Driven Security 14,036,000 608 01/01/2014
Dr. Eric Cole 14,080,000 114,000 05/01/2009
Matt Flynn’s Identity Management Blog 19,422,000 1,210 08/01/2008
The Smoothwall Blog 19,435,000 2,340 10/01/2008
An Analytical Approach 22,192,000 2,974 02/01/2014
Security Balance 22,492,000 1,464 02/01/2008

The whole list

Detailed data and more reports are available in the full study. If you like the see the full ranking of all 150+ IT security influencers by Twitter followers or you want to see how the consultancy firms rank, just download the pdf.

150+ Wichtigste Influencer im Cyber Security Bereich – Alle Platzierungen runterladen

Methodology

How was the research done?

  • The basic data has been extracted out of the six top ranking sites searching the keyword ‘most influential security blogs‘ using Google search in ‘incognito mode’ (see sources below) Additional relevant sites have been added to the list by LUCY Security.
  • Websites and Blogs which did not have a twitter account were excluded from the research.
  • Research on Alexa and Twitter has been done in October / November 2016.
  • Alexa rankings in the global listing have been rounded up: Below 10’000 no rounding; above 10’000 to the next hundred, above 100’000 to the next thousand. Sectorial reports (f.e. the Magazine ranking) contain the exact Alexa rank. Of course the Alexa score is changing over the time.
  • Twitter followers have been rounded up: Below 100’000 to the next hundred; above 100’000 to the next thousand.

Which sources has been used?

  1. Digital Guardian: Top 50 InfoSec Blogs You Should Be Reading
  2. Heimdal Security: 50+ Amazing Internet Security Blogs You Should Be Following [Updated]
  3. Security Innovation Europe: 40 Information Security Blogs You Should Be Reading
  4. Rasmussen College: 21 Cyber Security Blogs that Keep IT Pros in the Know
  5. Solutions Review: 17 Security Blogs You Should Be Reading
  6. GFI Software: The best 35 information security blogs to follow

About LUCY Server

Assess, Phish and Train yourself The LUCY Social Engineering and Malware Testing Suite facilitate multiple application areas. They can be used for:

LUCY helps you to increase IT Security and maintain cybersecurity awareness! The process is Increasing IT security Awareness with LUCY - Application Areas (People Testing, Technology Assessments, Pentest Showcase) - Phishing and Smishing Simulationssimple, just create campaigns based on templates, run and measure the results. And rerun more simulations:

  • People testing and education (Phishing-, SmiShing-, BadMedia- Simulations) and LMS- / e-trainings.
  • Technology assessments including malware and ransomware simulations
    An inoffensive penetration test showcase
  • LUCY Multitenant Server allows an on-premise installation or it can be used in as a cloud solution.
The People Testing and Training Cycle - Create Phishing Simulations, run campaigns, capture user activity, analyze the data, learn and rerun phishing simulation campaigns

The People Testing and Training Cycle

Contact and Downloads

Our product can be downloaded at lucysecurity.com. Full-scale LUCY instances for test purposes are available for a limited time period. When you are interested or if you need additional information, please do not hesitate to contact us at:

LUCY Phishing GmbH, Seestrasse 13, CH-8800 Thalwil, Switzerland, Fax:  +41 44 557 19 37, Email: [email protected]

150+ most important influencers in IT security – Get the full study