5 Must-Read Security Newsletters

Since security is a topic that requires constant vigilance, newsletters are a good way to stay current. Here's a list recently compiled by Campus Technology' sister publication Redmond that lists five good security newsletter resources. Consider subscribing to one or more; all are free.


http://www.counterpane.com/crypto-gram.html
Crypto-Gram is a free monthly newsletter from Bruce Schneier, the field's foremost expert in cryptography. Schneier comments on a host of security topics, covering a broad range of issues. He's never at a loss for a strong opinion on any security-related topic.

2. SANS Critical Vulnerability Analysis Report
http://www.sans.org/newsletters/cva
The SANS Critical Vulnerability Analysis Report is a weekly bulletin of top vulnerabilities. SANS, a security training company, lists the risk levels with each vulnerability, potential damage of each and links to learn more about them.

3. TechNet Flash
http://www.microsoft.com/technet/subscriptions/current/suboserv.asp
TechNet Flash is Microsoft's bi-weekly newsletter covering all things TechNet. Of course, one of its main purposes is to alert you of the newest security vulnerabilities, patches, hotfixes and procedures for securing your network.

4. Security Watch
http://lists.101com.com/nl/main.asp?NL=mcpmag
Security Watch, published by the same folks who produce Microsoft Certified Professional Magazine, provides lots of original content (something often difficult to find in newsletters). Included in each issue is a commentary by Windows security expert Roberta Bragg and a roundup of top security stories by ENTMag.com editor Scott Bekker. If you have security responsibilities on a Windows network, this newsletter is a must-read.

5. Asian School of Cyber Laws
http://www.asianlaws.org/infosec/newsletter/index.htm
The first reaction to the "Asian School of Cyber Laws" is usually, "What the heck is that?" It's a public organization based in India that, among other activities, publishes a bi-weekly security newsletter that's mostly news, but also has sprinklings of opinion scattered throughout. Solid coverage of security news throughout the world, not just the United States.

- Keith Ward
Senior Editor, Redmond Magazine

Note: Only free newsletters were considered for this list. Most of us have enough things to pay for without shelling out for electronic newsletters.

Featured

  • an online form with checkboxes, a shield icon for security, and a lock symbol for privacy, set against a clean, monochromatic background

    Educause HECVAT Vendor Assessment Tool Gets an Upgrade

    Educause has announced HECVAT 4, the latest update to its Higher Education Community Vendor Assessment Toolkit.

  • illustration of a football stadium with helmet on the left and laptop with ed tech icons on the right

    The 2025 NFL Draft and Ed Tech Selection: A Strategic Parallel

    In the fast-evolving landscape of collegiate football, the NFL, and higher education, one might not immediately draw connections between the 2025 NFL Draft and the selection of proper educational technology for a college campus. However, upon closer examination, both processes share striking similarities: a rigorous assessment of needs, long-term strategic impact, talent or tool evaluation, financial considerations, and adaptability to a dynamic future.

  • university building surrounded by icons for AI, checklists, and data governance

    Improving AI Governance for Stronger University Compliance and Innovation

    AI can generate valuable insights for higher education institutions and it can be used to enhance the teaching process itself. The caveat is that this can only be achieved when universities adopt a strategic and proactive set of data and process management policies for their use of AI.

  • DeepSeek on AWS

    AWS Offers DeepSeek-R1 as Fully Managed Serverless Model, Recommends Guardrails

    Amazon Web Services (AWS) has announced the availability of DeepSeek-R1 as a fully managed serverless AI model, enabling developers to build and deploy it without having to manage the underlying infrastructure.