Most Popular Cybersecurity Blog Posts from 2018

What happened in cybersecurity last year?

There are many ways to answer that question, but most cyber discussions about 2018 quickly get complex.

From GDPR to critical infrastructure attacks to government policy changes to data breaches (big and small) to cyberthreats seen (new and old) to staff turnover, simple explanations don’t do justice to our global security challenges. Quick stories or fun cyber analogies can help, but most inquiring minds want more.

So without going down an infinite number of cybersecurity rabbit holes, I know of no better way to summarize cybersecurity or critical infrastructure developments each year (in under 1,300 words) than to take a quantitative look at readership numbers — with a spice of qualitative analysis (and personal commentary) thrown in annually about various technology and security topics.

Tip: Use the headlines and blog summaries below to help navigate through the cyberfog, and dive in deeper when intrigued.

Quick Top Blog Post Recap     

But before we list the top 2018 cybersecurity blogs, I want to remind you about top posts from previous years. Here is my list of the most popular cybersecurity blogs posts from 2017, as well as the top posts from 2016.

Also, these are the top individual blog posts from each year still getting lots of clicks (page views) in 2018:

2014: Ten Recommendations for Security Awareness Programs

2015: 7 Essential IT Infrastructure Strategies that Customers Need Now

2016: The Trouble with Recounts in the Name Of Hacking

2016 (runner-up): Cyberterrorism: How Dangerous is the ISIS Cyber Caliphate Threat?

2017: What Election Technology Actions Are Needed Now?

2017 (runner-up): Analytics, AI and Orchestration Are Top New Security Topics

Also, the year-end summaries and security predictions reports for the upcoming year always do very well, with the recap numbers always bleeding across multiple years. (Read more...)

*** This is a Security Bloggers Network syndicated blog from Lohrmann on Cybersecurity authored by Lohrmann on Cybersecurity. Read the original post at: