diff --git a/streamers-and-youtube/README.md b/streamers-and-youtube/README.md
index d40f0b5..6ee7b15 100644
--- a/streamers-and-youtube/README.md
+++ b/streamers-and-youtube/README.md
@@ -3,33 +3,33 @@
 ## Cyber Security Blogs to Follow
 (sorted alphabetically)
 
-- [Ars Technica ](http://arstechnica.com)
-- [Bruce Schneier's Blog: https://www.schneier.com)
-- [CIO ](http://www.cio.com/category/security)
-- [Cisco Security Blog: http://blogs.cisco.com/security)
+- [Ars Technica ](https://arstechnica.com)
+- [Bruce Schneier's Blog](https://www.schneier.com)
+- [CIO](https://www.cio.com/category/security)
+- [Cisco Security Blog](https://blogs.cisco.com/security)
 - [Continuum: https://continuum.cisco.com)
-- [CSO Online ](http://www.csoonline.com)
-- [Cyber Defense Magazine ](http://www.cyberdefensemagazine.com/)
+- [CSO Online ](https://www.csoonline.com)
+- [Cyber Defense Magazine ](https://www.cyberdefensemagazine.com/)
 - [cyberscoop ](https://www.cyberscoop.com/)
 - [Darknet ](https://www.darknet.org.uk/)
 - [Dark Reading ](http://www.darkreading.com/)
 - [Data Breaches ](https://www.databreaches.net/)
 - [Didier Stevens Blog ](https://blog.didierstevens.com/)
 - [Epic ](https://epic.org/)
-- [Errata Security ](http://blog.erratasec.com/)
+- [Errata Security ](https://blog.erratasec.com/)
 - [Exploit Databse ](https://www.exploit-db.com/)
 - [F-Secure Safe & Savvy Blog ](http://safeandsavvy.f-secure.com)
 - [FireEye Blog ](https://www.fireeye.com/blog.html)
 - [Fox IT Security Blog ](http://blog.fox-it.com)
-- [Google Online Security Blog ](http://googleonlinesecurity.blogspot.ro)
+- [Google Online Security Blog ](https://googleonlinesecurity.blogspot.ro)
 - [Graham Cluley ](https://www.grahamcluley.com)
 - [Hack Read ](https://www.hackread.com/)
 - [Heimdal Security Blog ](https://heimdalsecurity.com/blog/)
-- [Help Net Security ](http://www.net-security.org)
-- [Information Security Buzz ](http://www.informationsecuritybuzz.com/)
+- [Help Net Security ](https://www.net-security.org)
+- [Information Security Buzz ](https://www.informationsecuritybuzz.com/)
 - [InfoSecurity Magazine ](http://www.infosecurity-magazine.com)
 - [Kaspersky Lab’s Securelist ](https://securelist.com)
-- [Kaspersky Lab’s ThreatPost ](http://threatpost.com)
+- [Kaspersky Lab’s ThreatPost ](https://threatpost.com)
 - [KnowBe4 Blog ](https://blog.knowbe4.com/)
 - [Krebs on Security: http://krebsonsecurity.com)
 - [Malware Must Die: http://blog.malwaremustdie.org)
@@ -47,11 +47,11 @@
 - [Peerlyst ](https://www.peerlyst.com)
 - [Phish Labs Blog  ](https://info.phishlabs.com/blog/)
 - [SANS Blogs ](https://www.sans.org/security-resources/blogs)
-- [SC Magazine ](http://www.scmagazine.com)
-- [Security Affairs ](http://securityaffairs.co/wordpress/)
+- [SC Magazine ](https://www.scmagazine.com)
+- [Security Affairs ](https://securityaffairs.co/wordpress/)
 - [Security Magazine ](https://www.securitymagazine.com/)
-- [Security Week ](http://www.securityweek.com/)
-- [Softpedia ](http://www.softpedia.com/)
+- [Security Week ](https://www.securityweek.com/)
+- [Softpedia ](https://www.softpedia.com/)
 - [Spiceworks Security ](https://community.spiceworks.com/security/general/)
 - [SpiderLabs Security Blog ](https://www.trustwave.com/Resources/SpiderLabs-Blog)
 - [Symantec's Blog: https://www.symantec.com/connect/blogs)