Vulnerability Information

Security Focus
www.securityfocus.com
Covers all aspects of technical security.  Best know for its vulnerability databases.

SANS/FBI Top Twenty List
www.sans.org/top20
A SANS/FBI list of the ten most commonly exploited security vulnerabilities in Windows and Unix. The overwhelming majority of successful attacks target one or more of the Top Twenty. Especially intended for organizations without technically-advanced security administrators.

SCORE - Security Consensus Operational Readiness Evaluation
www.sans.org/score
Rate your site using SANS/CIS developed minimum standards and best practices.

Center for Internet Security
www.cisecurity.org
Provides methods and tools to measure, improve and monitor the security status of your Internet-connected systems and appliances, plus those of your business partners.

Internet Storm Center
isc.incidents.org
Provides authoritative data on the types of attacks that are being mounted against computers in various industries and regions around the globe, by gathering millions of intrusion detection log entries every day.