Recent Posts

Top Cybersecurity News and Information Sources, By The Numbers - UPDATE


(Update:  Astute reader and topic maps (semantic integration) maven Patrick Durusau pointed out to me that I had the New York Times listed twice in an earlier version of this list, once as The New York Times and once as simply New York Times. The new list corrects this glitch.  Not only that but he also pointed out that National Journal and NextGov are different publications, which they indeed are.  But because NextGov publishes so many National Journal pieces, I'm not 100% certain from the data alone which came from which, so I merged the two.  He also kindly went out of his way to put hyperlinks to the relevant publications in my table!)

Starting on March 29, I began to systematically sift through voluminous news articles, blog posts and other sources to pick the most relevant, timely and knowledgeable items on cybersecurity matters to post on Metacurity.com. (See previous post for an introduction to Metacurity and an explanation of the criteria used for selection.) From that date through mid-day on May 6, Metacurity featured 1,220 posts from across well over 100 different publications, mostly traditional consumer interest and trade publications, as well as specialized blogs.

In an effort to better improve the selection and publication process, we’re currently analyzing the data to develop better filters and formulas.  One slice of interesting information is the frequency with which various publications appear across the still-nascent data set – obviously over time the data will change as the database gets bigger, more sources are added and newsworthy developments shift.

Articles Posted in Metacurity, 3/29/2015 to 5/6/2015
Source# Posts% Total
The Register1008.2%
SecurityWeek907.4%
CSOOnline685.6%
ZDNet625.1%
SC Magazine594.8%
Ars Technica483.9%
DarkReading483.9%
ThreatPost*413.4%
NextGov and National Journal413.4%
ComputerWorld322.6%
Hack Read322.6%
The Hill322.6%
Forbes312.5%
Motherboard302.5%
Passcode272.2%
Wired221.8%
WeLiveSecurity211.7%
The Guardian191.6%
New York Times171.4%
Krebs on Security151.2%
The Hackers News110.9%
Hot for Security100.8%
Lawfare Blog100.8%
The Intercept90.7%
Wall Street Journal90.7%
IT World70.6%
Slate60.5%
Just Security50.4%
Politico50.4%
Reuters50.4%
Schneier on Security50.4%
BBC News40.3%
Errata Security40.3%
Network World40.3%
TechTarget40.3%
The Daily Beast40.3%
The Diplomat40.3%
Washington Post40.3%
Bloomberg30.2%
Business Insider30.2%
DailyDot30.2%
Fortune30.2%
Google Security**30.2%
Hackmageddon30.2%
International Business Times30.2%
Telegraph30.2%
USA Today30.2%
FCW***30.2%
Financial Times20.2%
Freedom to Tinker20.2%
Harvard Business Review20.2%
Info World20.2%
Medium20.2%
MIT Technology Review20.2%
Quartz20.2%
The Security Ledger20.2%
Associated Press20.2%
Total99381.4%
*Technically a corporate blog by Kaspersky but features many newsworthy, journalistic-type posts.
**Technically a corporate blog by Google but important because of the nature of the posts.
***Recent resource added.

Of the sources published, 57 or 58 publications (I merged National Journal and NextGov)  received two or more posts, excluding posts from vendor blogs. Of these 57 or 58  sources, The Register grabbed more of the screen time than any other publication, no surprise given its focus on the nitty-gritty reality of IT technology. Likewise, all but one of the other top ten resources have as their main focus information security, IT technology or other specialized subjects where cybersecurity is a main concern.

The appearance of inside-politics publications such as the National Journal (which cross-publishes with NextGov) and The Hill is likewise no surprise given the ascendancy of cybersecurity in Washington and the pendency of cybersecurity legislation. A good deal of excellent coverage of Washington-related cybersecurity matters appears in paid-access-only publications such as Politico, which launched last year its own cybersecurity publication and makes some articles available outside its paywall. Paid-access publications don’t appear on Metacurity because, well, that would be too frustrating for casual visitors.  This may change over time.

For now, this list is interesting but definitely subject to change as time moves on, as more publications beef up their cybersecurity beats and as we refine our methods for pinpointing the best sources and items of information.

Stay tuned and please talk to us. Tell us what resources we're missing that you rely on and what additional types of information you'd like to see in the mix.

0 comments:

Post a Comment

Twitter Delicious Facebook Digg Stumbleupon Favorites More