BIG Security Privacy

“Those who would trade freedom for security deserve neither”

Ben Franklin

PRIVACY / SECURITY RESOURCES

Click @ for links

OVERVIEWS

  • @ ETH page
  • @ BTC  Security/Scale page
  • @ Blackhat Panels via BrightTALK
  • @ Cloud Security Topics via Techtarget
  • @ Cybersecurity Technology Landscape via Optiv (2022)
  • @ Enterslice: Cybersecurity in digital banking: Threats/Challenges
  • @ Credit Card Processing Overview via Centurion Payment Services

SMART CONTRACTS

  • @ Smart Contract Research Forum
  • @ Smart Contract Security Alliance
  • @ Ethereum.org: Smart Contract Security
  • @ Dexaran: ERC-20 Vulnerabilities (2022)
  • @ Populus: Solidity & Smart Contract Gotchas
  • @ BlockGeeks: How to Audit a Smart Contract
  • @ Trail of Bits: Ethereum Security Suite, YT Channel
  • @ Trail of Bits: Assurance, Blockchain Security (2021)
  • @ OpenZeppelin Blog/Smart Contract Security Workshops
  • @ OpenZeppelin: Security audits for distributed systems
  • @ Sm4rty: Roadmap for Web3/Smart Contract Hacking (2022)
  • @ Consensys Diligence: Ethereum Smart Contract Best Practices
  • @ ConsenSys Diligence: Blockchain Security & Ethereum Smart Contract Audits
  • @ Blaize.Tech: How to Conduct a Smart Contract Security Audit of Your Project
  • @ Yuriy Sannikov: Solidity Smart Contract Audit and Best Practices
  • @ R. Ravindran, EattheBlocks: Smart Contract Security Roadmap
  • @ DASP Top 10: Decentralized Application Security Project (2018)
  • @ bloctrax: Philosophy of a Smart Contract Security Audit (2018)
  • @ Etherchain.org: Proof-of-work issuance until Casper is ready (2018)
  • @ Sigmaprime: Solidity known attack vectors & anti-patterns (2018)
  • @ New Alchemy: History of smart contract hacks on Ethereum (2018)
  • @ Nomadic Labs: Malicious backdoors in Ethereum Proxies (2018)
  •  
  • Security Tools

  • @ MythX
  • @ Oyente
  • @ ToB Manticore
  • @ Pentestwiki: Smart Contract Security Tools
  • @ Chainlink: Smart Contract Security & Audit Tools

AI

  • @ Security Intelligence: Artifical Intelligence Topics (2023)
  • @ V7 Labs: AI in Cybersecurity, 5 Crucial Applications (2023)
  • @ Artificial Intelligence and Cybersecurity For Dummies, IBM Limited Edition (2022)
  • @ Artificial Intelligence for Cyber Security: XenonStack (2019)
  • @ AI in Cybersecurity Startups Landscape: WhatstheBigData
  • @ Eight leading AI/ML cybersecurity companies in 2020: ZDNet
  • @ Why AI Is The Future Of Cybersecurity: Enterprise Irregulars (2019)
  • @ UC Berkeley Center for Long-Term Cybersecurity: AI Security Initiative
  • @ 4 Ways to Integrate Cyber Security Automation Within Your Enterprise by the SSL Store (2019)
  • @ Why 2020 Will Be the Year Artificial Intelligence Stops Being Optional for Security by SecurityIntelligence

GROUPS

  • @ OWASP Foundation
  • @ Open Cybersecurity Alliance
  • @ Top 50 InfoSec Networking Groups: The Digital Guardian (2019)
  • @ Cybersecurity Industry Associations: Cybercrime Magazine (2020)
  • @ 32+ organizations for Cybersecurity students: CyberInternAcademy’s org list

TRAINING

  • @ IBM: Cost of a Breach (2022)
  • @ B9 Lab Academy Courses
  • @ Certified Ethical Hacker Tracks
  • @ Cisco Security Certification
  • @ CompTIA Security+
  • @ EC-Council University
  • @ Fortinet Certification
  • @ ISACA Website (CISM, CISA, CRISC)
  • @ (ISC)² (CISSP, SSCP, CCSP, CAP, CSSLP)
  • @ NIST Cybersecurity Framework
  • @ RSA Security University
  • @ SANs Training Courses
  • @ Singularity University Resources
  • @ Yu: Cyber Defense Matrix (NIST CSF extension)
  • @ ISO/IEC 27001 Information security management
  • @ 10 Hot Cybersecurity Certifications For IT Professionals To Pursue In 2020 Cybercrime Mag

TOOLS

  • @ 24 Free Security Tools via CSO
  • @ Eldam: 116 Best Cybersecurity Toos & Tactics
  • @ Art of Path Manipulation via RJ!
  • @ Bandwidth Calculator, & others by Calculator.net
  • @ Brighttalk: 5 Ways to Risk Ranking Your Vulnerabilities
  • @ Cisco IPv6 Guide & IPv4
  • @ Cloud Computing Compliance, Audit and Data Governance via Techtarget
  • @ Continuous Security & Compliance, and other ebooks via Evident
  • @ Cybersecurity Specializations & 2018 IT Skills Survey Report via GlobalKnowledge
  • @ Data Science for Security Professionals: O’Reilly
  • @ Hack-ed tools & resources
  • @ IP Address Lookup & Subnet Calculator
  • @ IT Security Guru
  • @ Linux command cheat sheets via It’s Foss
  • @ Password difficulty via Raja Agarwal
  • @ Software Testing Help
  • @ TechPapers UK Archive
  • @ Threat Hunting Basics 2018 via Security Weekly
  • @ WordPress Security via Kinsta Hosting
  • @ Dark Net: Inside the Digital Underworld (excerpt) by Jamie Bartlett for the American Scientist (2015)

BLOGS & PODCASTS

  • @ CYBER
  • @ The 443
  • @ Security Now
  • @ Malicious Life
  • @ Darknet Diaries
  • @ Hacking Humans
  • @ Smashing Security
  • @ Unsupervised Learning
  • @ Security Weekly Podcasts
  • @ SANS: Offensive Operations
  • @ BrightTalk Security Channel
  • @ Akamai Cloud Security Blog
  • @ The Social Engineering Podcast
  • @ Trail of Bits: Blog and YouTube Channel
  • @ TaoSecurity Blog by Richard Berjtlich et al.
  • @ Feedspot Top 100 Cyber Security Blogs and Websites in 2020 For IT Security Pros 

LIBRARIES

  • @ TechTarget: Security Resources
  • @ Downdetector: outage monitoring
  • @ GlobalKnowledge: Resource Library
  • @ COBIT 5 Foundation via IT preneurs
  • @ Creative Common: Open Licensing
  • @ Palo Alto Networks: Education Resources
  • @ HyperProof: Ebooks, Guides, and Reports
  • @ Evident (Palo Alto): Continuous Compliance
  • @ Lifewire: Everyday networking and security resources
  • @ TechTarget: Compliance, Audit, GDPR, PCI DSS, HIPAA, etc

NEWSLETTERS

  • @ CSO Online: Security news and more via IDG
  • @ Dark Reading: Cybersecurity threats, vulnerabilities and trends
  • @ The Hacker News: current and future trends in Infosec

COMMENTARY

  • @ Shayan Eskandari/C4: Security By Design & Smart Contract Audits
  • @ BHIS/Beau Bullock: Getting Started in Blockchain Security and Smart Contract Auditing
  • @ Tedx: Nick Espinosa, The Five Laws of Cybersecurity
  • @ TEDxVancouver:  James Bond is Technology, Confessions of a cyber spy hunter | Eric Winsborrow
  • @ AusCERT2013: Dmitri Alperovitch – Offense as the Best Defense
  • @ Cyber Tech & Risk: AI in Cybersecurity Use Cases (AI in Cybersecurity)

B.I.G.

CHAMPIONS MADE HERE