Our daily mission here at Last Watchdog is to keep the public usefully informed about emerging cybersecurity and privacy exposures.
Related article: The road to a Pulitzer
Though we don’t spend any time seeking it out, one measure of our success is peer recognition. So I’m happy to let our audience know that Last Watchdog has been recognized for the fourth time in recent months as a trusted source of useful intelligence.
Threat Stack, a Boston-based security startup that helps companies stay protected in the cloud, and publisher of the informative Threat Stack Blog, has just included LastWatchdog.com on its lists of 50 Essential Cloud Security Blogs for IT Professionals and Cloud Enthusiasts.
Earlier, Watchdog Reviews selected LastWatchdog.com as one of its Top 10 Online Security Blogs; Netwrix polled system administrators who selected LastWatchdog.com as the No. 1 Best IT Security Blog of 2018; and Reciprocity Labs included LastWatchdog.com as one of the 69 Information Security Blogs You Should Be Reading.
We’re grateful for this recognition and will strive to keep delivering quality content. We consider it our small part to help make digital commerce and our digital lives as safe as they ought to be.
*** This is a Security Bloggers Network syndicated blog from The Last Watchdog authored by bacohido. Read the original post at: https://www.lastwatchdog.com/last-watchdogs-coverage-of-cybersecurity-and-privacy-earns-4th-top-blog-award/
Digital+ Partners Leads Continuation Funding Round in Growing Automated Threat Analysis & Detection Provider, Closing its Series B Round at…
For three years OpenWRT had a severe validation problem with its download package manager, until a fuzz tester found and…
It’s time to say a final “Goodbye” to Flash. (Or should that be “Good riddance”?) With earlier this week seeing…
This is the second in a series of blog posts that discuss how smart DNS resolvers can enhance ongoing network…
Security researchers detected a new spear-phishing attack that’s using an exact domain spoofing tactic in order to impersonate Microsoft. On…
Welcome back to the last part of our three-part blog series on how to leverage analytics to deliver an exceptional…