Blogs: another tool in the security pro's toolkit (part two)

Thursday, 7 August 2003, 8:59 AM EST

In my last column, I introduced you to blogging and blogs, and some of the issues that security professionals should consider before starting their own blogs. In this column we continue the discussion, and focus on blogs that specialize in security.

Our starting point is the usefulness of blogs to professionals. Blogs are not a replacement for mailing lists or visits to trusted Web sites. However, they can be an excellent source of information and perspectives that you can't find elsewhere. But how can you tell that the information on a blog is accurate? The same way you validate the information from any resource: by asking questions. What is the source of the information? What do you know about the author? What do other folks say about the author and the information? Do the statements made fit in with other information you know? Does it pass your personal "gut check"?

Ask those questions as you check out blogs. If you find a blog that provides you with useful knowledge, then it can be a real treasure. Subscribe to its RSS feed, read it regularly, and make it another tool in your toolkit.

[ Read more ]

Related items




Spotlight

USBdriveby: Compromising computers with a $20 microcontroller

Posted on 19 December 2014.  |  Security researcher Samy Kamkar has devised a fast and easy way to compromise an unlocked computer and open a backdoor on it: a simple and cheap ($20) pre-programmed Teensy microcontroller.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Dec 19th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //