“Those who would trade freedom for security deserve neither”
Ben Franklin
PRIVACY / SECURITY RESOURCES
Click @ for links
OVERVIEWS
SMART CONTRACTS
- @ Smart Contract Research Forum
- @ Smart Contract Security Alliance
- @ Ethereum.org: Smart Contract Security
- @ Dexaran: ERC-20 Vulnerabilities (2022)
- @ Populus: Solidity & Smart Contract Gotchas
- @ BlockGeeks: How to Audit a Smart Contract
- @ Trail of Bits: Ethereum Security Suite, YT Channel
- @ Trail of Bits: Assurance, Blockchain Security (2021)
- @ OpenZeppelin Blog/Smart Contract Security Workshops
- @ OpenZeppelin: Security audits for distributed systems
- @ Sm4rty: Roadmap for Web3/Smart Contract Hacking (2022)
- @ Consensys Diligence: Ethereum Smart Contract Best Practices
- @ ConsenSys Diligence: Blockchain Security & Ethereum Smart Contract Audits
- @ Blaize.Tech: How to Conduct a Smart Contract Security Audit of Your Project
- @ Yuriy Sannikov: Solidity Smart Contract Audit and Best Practices
- @ R. Ravindran, EattheBlocks: Smart Contract Security Roadmap
- @ DASP Top 10: Decentralized Application Security Project (2018)
- @ bloctrax: Philosophy of a Smart Contract Security Audit (2018)
- @ Etherchain.org: Proof-of-work issuance until Casper is ready (2018)
- @ Sigmaprime: Solidity known attack vectors & anti-patterns (2018)
- @ New Alchemy: History of smart contract hacks on Ethereum (2018)
- @ Nomadic Labs: Malicious backdoors in Ethereum Proxies (2018)
Security Tools
- @ MythX
- @ Oyente
- @ ToB Manticore
- @ Pentestwiki: Smart Contract Security Tools
- @ Chainlink: Smart Contract Security & Audit Tools
AI
- @ Security Intelligence: Artifical Intelligence Topics (2023)
- @ V7 Labs: AI in Cybersecurity, 5 Crucial Applications (2023)
- @ Artificial Intelligence and Cybersecurity For Dummies, IBM Limited Edition (2022)
- @ Artificial Intelligence for Cyber Security: XenonStack (2019)
- @ AI in Cybersecurity Startups Landscape: WhatstheBigData
- @ Eight leading AI/ML cybersecurity companies in 2020: ZDNet
- @ Why AI Is The Future Of Cybersecurity: Enterprise Irregulars (2019)
- @ UC Berkeley Center for Long-Term Cybersecurity: AI Security Initiative
- @ 4 Ways to Integrate Cyber Security Automation Within Your Enterprise by the SSL Store (2019)
- @ Why 2020 Will Be the Year Artificial Intelligence Stops Being Optional for Security by SecurityIntelligence
TRAINING
- @ IBM: Cost of a Breach (2022)
- @ B9 Lab Academy Courses
- @ Certified Ethical Hacker Tracks
- @ Cisco Security Certification
- @ CompTIA Security+
- @ EC-Council University
- @ Fortinet Certification
- @ ISACA Website (CISM, CISA, CRISC)
- @ (ISC)² (CISSP, SSCP, CCSP, CAP, CSSLP)
- @ NIST Cybersecurity Framework
- @ RSA Security University
- @ SANs Training Courses
- @ Singularity University Resources
- @ Yu: Cyber Defense Matrix (NIST CSF extension)
- @ ISO/IEC 27001 Information security management
- @ 10 Hot Cybersecurity Certifications For IT Professionals To Pursue In 2020 Cybercrime Mag
TOOLS
- @ 24 Free Security Tools via CSO
- @ Eldam: 116 Best Cybersecurity Toos & Tactics
- @ Art of Path Manipulation via RJ!
- @ Bandwidth Calculator, & others by Calculator.net
- @ Brighttalk: 5 Ways to Risk Ranking Your Vulnerabilities
- @ Cisco IPv6 Guide & IPv4
- @ Cloud Computing Compliance, Audit and Data Governance via Techtarget
- @ Continuous Security & Compliance, and other ebooks via Evident
- @ Cybersecurity Specializations & 2018 IT Skills Survey Report via GlobalKnowledge
- @ Data Science for Security Professionals: O’Reilly
- @ Hack-ed tools & resources
- @ IP Address Lookup & Subnet Calculator
- @ IT Security Guru
- @ Linux command cheat sheets via It’s Foss
- @ Password difficulty via Raja Agarwal
- @ Software Testing Help
- @ TechPapers UK Archive
- @ Threat Hunting Basics 2018 via Security Weekly
- @ WordPress Security via Kinsta Hosting
- @ Dark Net: Inside the Digital Underworld (excerpt) by Jamie Bartlett for the American Scientist (2015)
BLOGS & PODCASTS
- @ CYBER
- @ The 443
- @ Security Now
- @ Malicious Life
- @ Darknet Diaries
- @ Hacking Humans
- @ Smashing Security
- @ Unsupervised Learning
- @ Security Weekly Podcasts
- @ SANS: Offensive Operations
- @ BrightTalk Security Channel
- @ Akamai Cloud Security Blog
- @ The Social Engineering Podcast
- @ Trail of Bits: Blog and YouTube Channel
- @ TaoSecurity Blog by Richard Berjtlich et al.
- @ Feedspot Top 100 Cyber Security Blogs and Websites in 2020 For IT Security Pros
LIBRARIES
- @ TechTarget: Security Resources
- @ Downdetector: outage monitoring
- @ GlobalKnowledge: Resource Library
- @ COBIT 5 Foundation via IT preneurs
- @ Creative Common: Open Licensing
- @ Palo Alto Networks: Education Resources
- @ HyperProof: Ebooks, Guides, and Reports
- @ Evident (Palo Alto): Continuous Compliance
- @ Lifewire: Everyday networking and security resources
- @ TechTarget: Compliance, Audit, GDPR, PCI DSS, HIPAA, etc
COMMENTARY
- @ Shayan Eskandari/C4: Security By Design & Smart Contract Audits
- @ BHIS/Beau Bullock: Getting Started in Blockchain Security and Smart Contract Auditing
- @ Tedx: Nick Espinosa, The Five Laws of Cybersecurity
- @ TEDxVancouver: James Bond is Technology, Confessions of a cyber spy hunter | Eric Winsborrow
- @ AusCERT2013: Dmitri Alperovitch – Offense as the Best Defense
- @ Cyber Tech & Risk: AI in Cybersecurity Use Cases (AI in Cybersecurity)
B.I.G.
CHAMPIONS MADE HERE