diff --git a/streamers-and-youtube/README.md b/streamers-and-youtube/README.md index d40f0b5..6ee7b15 100644 --- a/streamers-and-youtube/README.md +++ b/streamers-and-youtube/README.md @@ -3,33 +3,33 @@ ## Cyber Security Blogs to Follow (sorted alphabetically) -- [Ars Technica ](http://arstechnica.com) -- [Bruce Schneier's Blog: https://www.schneier.com) -- [CIO ](http://www.cio.com/category/security) -- [Cisco Security Blog: http://blogs.cisco.com/security) +- [Ars Technica ](https://arstechnica.com) +- [Bruce Schneier's Blog](https://www.schneier.com) +- [CIO](https://www.cio.com/category/security) +- [Cisco Security Blog](https://blogs.cisco.com/security) - [Continuum: https://continuum.cisco.com) -- [CSO Online ](http://www.csoonline.com) -- [Cyber Defense Magazine ](http://www.cyberdefensemagazine.com/) +- [CSO Online ](https://www.csoonline.com) +- [Cyber Defense Magazine ](https://www.cyberdefensemagazine.com/) - [cyberscoop ](https://www.cyberscoop.com/) - [Darknet ](https://www.darknet.org.uk/) - [Dark Reading ](http://www.darkreading.com/) - [Data Breaches ](https://www.databreaches.net/) - [Didier Stevens Blog ](https://blog.didierstevens.com/) - [Epic ](https://epic.org/) -- [Errata Security ](http://blog.erratasec.com/) +- [Errata Security ](https://blog.erratasec.com/) - [Exploit Databse ](https://www.exploit-db.com/) - [F-Secure Safe & Savvy Blog ](http://safeandsavvy.f-secure.com) - [FireEye Blog ](https://www.fireeye.com/blog.html) - [Fox IT Security Blog ](http://blog.fox-it.com) -- [Google Online Security Blog ](http://googleonlinesecurity.blogspot.ro) +- [Google Online Security Blog ](https://googleonlinesecurity.blogspot.ro) - [Graham Cluley ](https://www.grahamcluley.com) - [Hack Read ](https://www.hackread.com/) - [Heimdal Security Blog ](https://heimdalsecurity.com/blog/) -- [Help Net Security ](http://www.net-security.org) -- [Information Security Buzz ](http://www.informationsecuritybuzz.com/) +- [Help Net Security ](https://www.net-security.org) +- [Information Security Buzz ](https://www.informationsecuritybuzz.com/) - [InfoSecurity Magazine ](http://www.infosecurity-magazine.com) - [Kaspersky Lab’s Securelist ](https://securelist.com) -- [Kaspersky Lab’s ThreatPost ](http://threatpost.com) +- [Kaspersky Lab’s ThreatPost ](https://threatpost.com) - [KnowBe4 Blog ](https://blog.knowbe4.com/) - [Krebs on Security: http://krebsonsecurity.com) - [Malware Must Die: http://blog.malwaremustdie.org) @@ -47,11 +47,11 @@ - [Peerlyst ](https://www.peerlyst.com) - [Phish Labs Blog ](https://info.phishlabs.com/blog/) - [SANS Blogs ](https://www.sans.org/security-resources/blogs) -- [SC Magazine ](http://www.scmagazine.com) -- [Security Affairs ](http://securityaffairs.co/wordpress/) +- [SC Magazine ](https://www.scmagazine.com) +- [Security Affairs ](https://securityaffairs.co/wordpress/) - [Security Magazine ](https://www.securitymagazine.com/) -- [Security Week ](http://www.securityweek.com/) -- [Softpedia ](http://www.softpedia.com/) +- [Security Week ](https://www.securityweek.com/) +- [Softpedia ](https://www.softpedia.com/) - [Spiceworks Security ](https://community.spiceworks.com/security/general/) - [SpiderLabs Security Blog ](https://www.trustwave.com/Resources/SpiderLabs-Blog) - [Symantec's Blog: https://www.symantec.com/connect/blogs)