All Resources

Akamai :: Real-time Web Monitor

Akamai monitors global Internet conditions around the clock. With this real-time data we identify the global regions with the greatest attack traffic, cities with the slowest Web connections (latency), and geographic areas with the most Web traffic (traffic density).

AnubisNetworks :: Cyberfeed

Live global botnet visualizer

Apache Hadoop

Apache Hadoop Homepage

Apache Hive

Apache Hive Query Language Manual

Apache Tomcat

Apache Tomcat Homepage

Arbor Networks :: Digital Attack Map

Top daily DDoS attacks worldwide

AVG ThreatLabs

Not sure if a website's safe? Look up any website - Check its reputation - See what others say

BrightCloud URL / IP Lookup

Presents historical reputation data about the website


Increasing expectations for good governance, effective risk management and complex demands for legislative and regulatory compliance are presenting a growing challenge for organizations of all sizes. Tune in to live and recorded presentations by respected luminaries in the fields of governance, risk and compliance. Their thought leadership will provide you with practical advice on how to implement successful GRC strategies and processes for your organization.

California SB 1386 Personal information: privacy.

This bill, operative July 1, 2003, would require a state agency, or a person or business that conducts business in California, that owns or licenses computerized data that includes personal information, as defined, to disclose in specified ways, any breach of the security of the data, as defined, to any resident of California whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person.


Common Attack Pattern Enumeration and Classification - A Community Resource for Identifying and Understanding Attacks

CareerBuilder :: Security Engineer Jobs

Search of Security Engineer jobs at

Cisco Sender Base

Presents historical reputation data about the website

Common Vulnerabilities and Exposures

International in scope and free for public use, CVE is a dictionary of publicly known information security vulnerabilities and exposures.

Comodo Web Inspector

Examines the URL in real-time

Compliance Week

A Weekly Newsletter On Corporate Governance, Risk And Compliance

Computer Network Defense Ltd. :: Security Wizardry Radar

The "Computer Network Defence Operational Picture", better known as The Radar Page has proved extremely popular, especially during periods of heightened tension where we experience hit rates of 12K/hour. It is a useful resource that illustrates all of the latest Information Security Threats and News, updated by staff in Europe and the US. The Radar Page is always complete with live information as it develops.


Computerworld is a source of technology news and information for IT influencers worldwide providing in-depth technical analysis on key products, solutions, and technologies for sound buying decisions and business gain.


Common Vulnerabilities and Exposures - The Standard for Information Security Vulnerability Names


Cyber Observable eXpression - A Structured Language for Cyber Observables


Presents data from various threat intel feeds

Data Center Research

DCR is an online service designed to provide its users with easier access to data center related research. Tracking relevant articles and reports from all the leading global industry news sources (media, research firms/analysts, bloggers and more), DCR offers users a convenient, 'one-stop-shop' portal that features thousands of industry relevant white papers and re-sell reports from the top research/analyst firms, and publishers working within the data center and hosting space.


DataLossDB is a research project aimed at documenting known and reported data loss incidents world-wide.


Offers historical threat intel data about IPs, domains, etc.

Deutsche Telekom :: Current Cyber Attacks

This Portal shows statistics of the early warning system of Deutsche Telekom. The corresponding sensors are operated from Deutsche Telekom and Partners. Attacks on the different sensors (Honeypots) will be displayed in realtime on the world map. Additionally the countries are marked in relation of the overall number of attacks.


DMOZ is the largest, most comprehensive human-edited directory of the Web. It is constructed and maintained by a passionate, global community of volunteers editors. It was historically known as the Open Directory Project (ODP).

Enigma Software: Threat Database

Malware, Spyware and Trojan analysis and removal information.


Esper and Event Processing Language (EPL) provide a highly scalable, memory-efficient, in-memory computing, SQL-standard, minimal latency, real-time streaming-capable Big Data processing engine for historical data, or medium to high-velocity data and high-variety data.


Since 1983, eWEEK has been a trusted information resource in the IT industry, delivering technology news, in-depth analysis of enterprise IT trends, and reviews of new products. Originally called PC Week.

FBI Cyber's Most Wanted

Wanted by the FBI. FBI Cyber's Most Wanted

FortiGuard URL / IP Lookup

Displays the URL's history and category

F-Secure Sample Analysis System

Submit suspicious files or URLs to F-Secure Labs for analysis. Please note that you will not get a reply or scan results for samples submitted anonymously.

Health Information Technology for Economic and Clinical Health Act

top management must individually certify the accuracy of financial information.

Health Insurance Portability and Accountability Act

An Act To amend the Internal Revenue Code of 1986 to improve portability and continuity of health insurance coverage in the group and individual markets, to combat waste, fraud, and abuse in health insurance and health care delivery, to promote the use of medical savings accounts, to improve access to long-term care services and coverage, to simplify the administration of health insurance, and for other purposes.

Honeynet Project :: HoneyMap

IBM X-Force Exchange

Search by Application Name, IP address, URL, Vulnerability, MD5...

Identity Theft Resource Center

Identity Theft Resource Center® (ITRC) is a nonprofit, nationally respected organization dedicated exclusively to the understanding and prevention of identity theft. The ITRC provides consumer and victim support as well as public education. The ITRC also advises governmental agencies, legislators, law enforcement, and businesses about the evolving and growing problem of identity theft.

Indeed :: Security Engineer Jobs

Search of Security Engineer jobs at


InfoWorld is a leading source of information on emerging enterprise technologies.

Internet Crime Complaint Center (IC3)

The IC3 accepts online Internet crime complaints from either the actual victim or from a third party to the complainant. The Internet Crime Complaint Center (IC3) is a partnership between the Federal Bureau of Investigation (FBI), and the National White Collar Crime Center (NW3C).

Internet Exchange Points

Data Center Map is a free web service acting as the link between providers and clients in the data center industry, making it easier for clients to find potential providers matching their needs. The service focuses on colocation and IP transit, but also covers a lot of other data center services such as wholesale space, dedicated servers, remote hands, internet exchanges and much more.


IPVoid is a free service used to scan an IP address through multiple DNS-based blacklists and IP reputation services, to facilitate the detection of IP addresses involved in malware incidents and spamming activities.

Is It Hacked

Will check to see if a site is cloaked to GoogleBot, has spammy links, funny redirects, or otherwise appears to be hacked. Works on Joomla, Drupal, WordPress, Magento, Prestashop, Laravel, Codeigniter, Symfony or any other backend technologies.

Is It Phishing

Assesses the specified URL in real-time

Joe Sandbox URL Analyzer

Free Automated Malware Analysis - Url Analyzer

Junk Email Filter

Front end spam filtering and virus blocking service for your existing email server.

Kaspersky :: CyberThreat Real-Time Map


Kroll is the market leading provider of solutions that help clients comply with the myriad of anti-money laundering (AML) and anti-bribery and corruption (AB&C) regulations worldwide. Through a combination of in-depth subject matter expertise, global research capabilities, and flexible technology tools Kroll can help clients.

Logic Manager

All-in-One ERM Software.

The Methodology, Software, and Support You Need to Manage Tomorrow's Surprises Today®


Malware Attribute Enumeration and Characterization - A Structured Language for Attribute-Based Malware Characterization

Malware Domain List

Looks up recently-reported malicious websites

Malware Experts

MalwareExperts is a passionate, dedicated group of computer security professionals with over 30 years of computer security experience under our belts. We have devoted our lives (our spouses are not happy about this) to helping current and past victims of Malware.

Malware URL

Check a suspicious web site or IP address against a database of known malicious websites


MapR Homepage

Massachusetts 201 CMR 17.00 statute

Requires that any companies or persons who store or use personal information (PI) about a Massachusetts resident develop a written, regularly audited plan to protect personal information.

Monster :: Security Engineer Jobs

Search of Security Engineer jobs at


The blacklist check will test a mail server IP address or domain against over 100 DNS based email blacklists

NetworkWorld: Compliance & Regulation

Compliance news, analysis, research, how-to, opinion, and video.

Norse Corp :: Dark Intelligence

Norton Safe Web

Look up a site. Get our rating.

numbrX Security Beat

numbrX keeps an online record of reported personal, private and confidential data breaches which can lead to identity theft and credit fraud.

Open Compliance & Ethics Group

OCEG is the only nonprofit offering comprehensive guidance, standards, benchmarks and tools for integrating governance, risk and compliance (GRC) processes. Our unique platform and organizational structure helps you take advantage of contributions from thousands of experts and companies - many of them just like yours. Our guidance, benchmarking, custom tools and communities of practice help you perform - not just comply. OCEG offers value you can exploit today, tomorrow and as your company grows.

Open Threat Exchange

At the heart of Open Threat Exchange is the pulse, an investigation of an online threat. Pulses describe any type of online threat including malware, fraud campaigns, and even state sponsored hacking.
Pulses are comprised of indicators of compromise (or IoCs), which describe the infrastructure of that threat - including IPs, file hashes, e-mail addresses affiliated with the threat, etc.


Open Vulnerability and Assessment Language - A Community-Developed Language for Determining Vulnerability and Configuration Issues on Computer Systems

Payment Card Industry Data Security Standard

The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e-purse, ATM, and POS cards.

PayScale :: Security Engineer Salary Metrics

Security Engineer salary metrics at


Looks up the URL in its database of known phishing websites


Pivotal Homepage

Privacy Rights Clearinghouse

A Chronology of Data Breaches

Project Honey Pot

Project Honey Pot is the first and only distributed system for identifying spammers and the spambots they use to scrape addresses from websites.


RabbitMQ Homepage

Recorded Future :: Cyber Crime Speculation

Cyber crime speculation and key dates the rest of the year.

Recorded Future: Intelligence Analysis

Open source intelligence analysis using Recorded Future.

Reputation Authority

Has your reputation been compromised? Check your Domain/IP behavior score

RSA Archer

Harness Risk, Fuel Your Enterprise

In today's competitive market, risks are changing dramatically and are increasingly more complex. RSA Archer empowers organizations to manage multiple dimensions of risk on one configurable, integrated platform.

RSA Security Analytics

RSA Security Analytics Documentation

SalaryList :: Security Engineer Salaries

List of Security Engineer salaries at

Sarbanes-Oxley Act

top management must individually certify the accuracy of financial information.

SecurityFocus: BugTraq

BugTraq is a high volume, full disclosure mailing list for the detailed discussion and announcement of computer security vulnerabilities. BugTraq serves as the cornerstone of the Internet-wide security community.

SecurityFocus: Vulnerabilities

The SecurityFocus Vulnerability Database provides security professionals with the most up-to-date information on vulnerabilities for all platforms and services.

SimplyHired :: Security Engineer Jobs

Search of Security Engineer jobs at

Sophos :: Threat Dashboard

Our SophosLabs analysts monitor and research malware, spam and web threats as they happen, around the globe. We collect what we know in these dashboards, and update them constantly as we detect new threats. You'll find threats itemized by country, volume and prevalence.

Spam and Open Relay Blocking System (SORBS)

The SORBS (Spam and Open Relay Blocking System) provides free access to its DNS-based Block List (DNSBL) to effectively block email from more than 12 million host servers known to disseminate spam, phishing attacks and other forms of malicious email. The list typically includes email servers suspected of sending or relaying spam, servers that have been hacked and hijacked, and those with Trojan infestations. In an attempt to provide preemptive protection, SORBS also lists servers with dynamically allocated IP addresses.


Spamhaus maintains a number of security intelligence databases and realtime spam-blocking databases ('DNSBLs') responsible for keeping back the vast majority of spam and malware sent out on the Internet. These include the Spamhaus Block List (SBL), the Exploits Block List (XBL), the Policy Block List (PBL) and the Domain Block List (DBL). Spamhaus DNSBLs are today used by the majority of the Internet's Email Service Providers, Corporations, Universities, Governments and Military networks.


Structured Threat Information eXpression - A Structured Language for Cyber Threat Intelligence Information

Submarine Cable Map

The Submarine Cable Map is a free resource from TeleGeography. Data contained in this map is drawn from the Global Bandwidth Research Service and is updated on a regular basis.

Sucuri SiteCheck

Free Website Malware and Security Scanner


Trusted Automated eXchange of Indicator Information - Enabling Cyber Threat Information Exchange


Search for Domains, IPs, MD5|SHA1|SHA256, email address or ssl, user-agent, AV Family, Filename, URI, Registry, and MUTEX

Trend Micro :: Global Botnet Threat Activity Map

Trend Micro continuously monitors malicious network activities to identify command-and-control (C&C) servers and help increase protection against botnet attacks. The real-time map below indicates the locations of C&C servers and victimized computers they control that have been discovered in the previous six hours.

Trend Micro Site Safety Center

One of the largest domain-reputation databases in the world

United States Computer Emergency Readiness Team (US-CERT)

The United States Computer Emergency Readiness Team (US-CERT) is a partnership between the Department of Homeland Security and the public and private sectors. Established in 2003 to protect the nation's Internet infrastructure, US-CERT coordinates defense against and responses to cyber attacks across the nation.

United States Department of Homeland Security

Homeland Security leverages resources within federal, state, and local governments, coordinating the transition of multiple agencies and programs into a single, integrated agency focused on protecting the American people and their homeland. More than 87,000 different governmental jurisdictions at the federal, state, and local level have homeland security responsibilities. The comprehensive national strategy seeks to develop a complementary system connecting all levels of government without duplicating effort. Homeland Security is truly a "national mission."

United States House of Representatives

United States House of Representatives Homepage

United States Senate

United States Senate Homepage

United States White House Signed Legislation

Current list of United States legislation signed into law.

Unmask Parasites

Scan a web page for hidden illicit content (invisible spam links, malicious scripts and redirects), in the Google Safe Browsing Site Status database

URL Query

A service for detecting and analyzing web-based malware. It provides detailed information about the activities a browser does while visiting a site and presents the information for further analysis


URLVoid is a free service that analyzes a website through multiple blacklist engines and online reputation tools to facilitate the detection of fraudulent and malicious websites. This service helps you to identify websites involved in malware incidents, fraudulent activities and phishing websites.


Today's Governance, Risk, Compliance (GRC) challenges lie with stifled workflows. VerSprite's hybrid methodology fosters sustainable and repeatable GRC processes that work.

Virus Total

VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware.


This service is completely free and allows you to view the source code within a webpage without your having to visit the site itself. In addition to this, options have been provided to view all links within a page for those of you that wish to do so

Web of Trust (WOT)

WOT is a free add-on for your browser. WOT displays a colored traffic light next to website links to show you which sites people trust for safe searching, surfing and shopping online: green for good, red for bad, and yellow as a warning to be cautious. The icons are shown in popular search engine results, social media, online email, shortened URL's, and lots of other sites.

Web Page Speed Test

Instantly test your website speed in real browsers from 20 locations worldwide

WebPulse Site Review

Check the current URL categorization of a website in the WebPulse (BlueCoat) URL ratings database

Websense Security Labs

Websense Security Labs discovers, investigates and reports on advanced Internet threats that traditional security research methods miss.

Yandex Safe Site Search

Follow the above link, change the IP and search Yandex.
Yandex is one of the largest internet companies in Europe, operating Russia's most popular search engine and its most visited website. According to LiveInternet, as of December 2013, Yandex generated 61.9% of all search traffic in Russia. Yandex also operate in Ukraine, Kazakhstan, Belarus and Turkey.

Zscaler Zulu URL Risk Analyzer

Examines a URL using real-time and historical techniques