Skip to main content

The Top 15 Cyber Security Influencers to Follow


Want to stay in-the-know when it comes to all matters regarding your safety and security online? Then be sure to check our selection of the Top 15 Cyber Security Influencers.

It’s not easy to stay up-to-date with all the security news in today’s rapidly changing tech world, but with all the on-going threats that arise , it is extremely important to stay current! With that being said, we’ve gone ahead and done the research for you, and put together a list of the 15 top cyber security influencers.
Follow them for the latest industry news and to always stay safe and secure online!

The Top Cyber Security Influencers:

1. Kim Zetter – @KimZetter

Kim Zetter is a Senior staff writer at Wired and author of “Countdown to Zero Day”- a book that reveals the story behind  Stuxnet, a virus that sabotaged Iran’s nuclear efforts. Kim has written over 100 articles for Wired and has also appeared as a guest on NPR and CNN. If you’re a Mr. Robot fan, be sure to check out her piece on the accuracy of the TV series. Very cool indeed.

2. Brian Krebs- @briankrebs

Brian has become increasingly well known as an independent investigative journalist of absolutely everything security related. Often times he is the one to break the story, and provide a calm and rational insight.  If you are interested in learning more about Mr. Krebs’ views and insights, you can read Spam Nation: The Inside Story of Organized Cybercrime.

3. Nicole Perlroth- @nicoleperlroth

As the cybersecurity writer for the New York Times, Nicole Perlroth has covered some major industry news including the NSA’s efforts to crack down on encryption and Chinese cyber espionage (which involved uncovering the military units responsible for thousands of attacks on U.S. institutions!). And, a fun fact: her 2014 Times profile of Brian Krebs has been optioned by Sony Pictures. Be sure to keep a lookout for her new book “This is How They Tell Me the World Ends,” slated to hit the shelves in 2017.

4. Bill Brenner- @billbrenner70

Bill Brenner is Senior Program Manager for Editorial, Information Security Group at Akamai Technologies. Bill has contributed much to our online security  industry, writing for numerous tech websites and publications, and has served as member of the Board of Directors for NAISG (National Information Security Group). In addition to often sharing his thoughts, opinions and recommendations on cybersecurity matters, he also writes a blog dedicated to overcoming anxiety.

5. Gene Kim- @realgenekim

Gene Kim is the founder and original author of Tripwire. Ever since founding the Advanced Threat solutions company, Kim’s influence in the Infosec community has grown and continues to rise. These days, Kim writes regularly on DevOPs and other topics in the Infosec field. You can stay up to date with his work by checking out Real Gene Kim.

6. Leigh Honeywell-@hypatiadotca

Leigh Honeywell, leader of the security response team at Slack, offers a very different and fresh perspective on online security. Not only does she keep us updated on the current stage and breakthroughs of so many security-related events, her perspective on geek feminism is refreshing and very much needed in our field. Her influence can only be expected to grow. You can check out her blog here.

7. Paul Asadoorian- @securityweekly

Paul Asadoorian is the Founder and CEO of Security Weekly, a multimedia blog dedicated to the latest information on security news, hacker techniques, vulnerabilities, technical how-to’s and more. Every Thursday at 6:00PM EST, his blog features live broadcasts with the latest industry stories. A true innovator, Paul is also the CEO of Offensive Countermeasures, a developer of new and cutting-edge products to proactively nip cybersecurity breaches in the bud.

8. Joseph Steinberg – @josephsteinberg

The founder and CEO of SecureMySocial, a company that protects businesses from information leaks and reputational damage, Josheph Steinberg is a cyber and entrepreneurship expert. He’s the inventor of several popular cybersecurity technologies (his work is  cited in over 100 published patents!) and author of  several information security books. Thankfully for all of us, Steinberg currently contributes his wisdom via his column in Inc. magazine.

9. Dan Goodin –  @dangoodin001

Dan Goodin is the Security Editor at Ars Technica where he oversees coverage of everything under the cybersecurity sink – from hardware hacking and malware, to computer espionage and botnets. In his 15 plus years on the job, he’s chronicled the exploits of hackers wearing all shades of hats (black, white and gray) and reported for the Associated Press and The Register. If there’s any major hack – Dan has covered it.

10. Pierluigi Paganini – @securityaffairs

Pierluigi Paganini is a security connoisseur and self-described ethical hacker. He’s the CIO at Bit4Id, member of the European Union Agency for Network and Information Security, and Editor-in-Chief at Cyber Defense Magazine. In addition to all of this, he’s the founder of Security Affairs,  a leading security blog that covers all aspects of internet security, including cyber warfare, cyber crime, hacktivism, the Internet of Things and more.

11. Dr. Angela Oerbauch – @angelaorebaugh

Dr. Angela Oerbauch is a Professor and Director of Cybersecurity and IT programs at the University of Virginia. She currently leads research in the security of cyber physical systems and the Internet of Things. A remarkable technology futurist and thought leader, Dr. Orebaugh has worked with a wide range of companies, from Internet startups to Fortune 500 companies, to help them grow multi-million dollar technology businesses.

12. Brian Honan – @BrianHonan

Brian Honan is known as an industry expert and pioneer in the Infosec field. He founded the Irish Reporting and Information Security Service (IRISS), Ireland’s first Computer Emergency Response Team, and is the founder and CEO of BH Consulting. Quite a few institutions have relied upon Brian’s advice including the European Commission and government security agencies in Ireland, Europe and the UK.  Brian is an active blogger and the European Editor for SANS NewsBites, a bi-weekly newsletter sent to half a million security experts worldwide.

13.  Swati Khandelwal – @Swati_THN

Swati Khandelwal is the Senior cyber security and privacy reporter for The Hacker News, a leading source on cybersecurity threats. A social media enthusiast covering all topics IT & online security, she consistently keeps us updated on the latest cyberspace developments.

14. Robin Wauters –@robinwauters

Robin Wauters is a European Tech Journalist and  the founder and editor of Tech.eu, a digital publication covering European technology news and market intelligence. Prior to this, he was the European Editor of The Next Web and Tech Crunch. Wauters lends his vast tech know-how as an advisor to budding startups and extends his knowledge to the greater community with monthly meet ups.

15. InfoSec Taylor Swift-@swiftonsecurity

Last but not least, InfoSec Taylor Swift, puts a unique twist on what she does, by providing cybersecurity news and insights, and combines that with references to Taylor Swift’s songs and lifestyle, helping make the news much lighter and entertaining. Keep yourself updated and have a laugh simply by following her blog here.

Comments

  1. I follow a few of these guys/gals. Checking out the rest now. Thanks for the info. So important to remain current with the tech that these influencers put out there.

    Fred H | https://www.amazingsupport.co.uk

    ReplyDelete

  2. Cloud Ace Technologies is offering Implementation Services on Cloud Computing, Cloud Services, IT Security, Storage solutions
    IT Security Solutions

    ReplyDelete

Post a Comment

Popular posts from this blog

Here Are 7 Brilliant Cheat Sheets For Linux/Unix

There's nothing better than a cheatsheet when you are stuck and need a reference. So here bringing to you 7 brilliant free cheat sheets.  1. Unix Tool Box : An incredibly exhaustive reference for all things Linux. This document is a collection of Unix/Linux/BSD commands and tasks which are useful for IT work or for advanced users. 2. One page Linux Manual : Great one page reference to the most popular Linux commands, it is a summary of useful Linux commands. 3. Linux Reference Card : One great reference published by FOSSwire. 4. Linux Command Line Cheat Sheet : This is an interestingly sorted and helpful cheat sheet by cheatography. 5. Linux Command Line Tips : This is a linux command line reference for common operations. Cleanly sorted and well described. 6. Treebeard’s Unix Cheat Sheet : A great reference that shows command comparisons with that of DOS. So if you are someone who was a DOS user and has switched to Linux, this is the best one too have! 7. Linux Shor

Extracting Administrator Passwords Using LCP

Extracting Administrator Passwords Using LCP Link Control Protocol (LCP) is part of the Point-to-Point (PPP) protocol In PPP communications, both the sending and receiving devices send out LCP packets to determine specific information required for data transmission. ■ Use an LCP tool ■ Crack administrator passwords Tools Needed ■ A computer running Windows Server 2012 ■ A web browser with an Internet connection ■ Administrative privileges to run tools                ■ You can also download the latest version of LCP from the link         http: / www.lcpsoft.com/engl1sh/1ndex.htm ■ If you decide to download the latest version, then screenshots shown     might differ ■ Follow the wizard driven installation instructions ■ Run this tool in Windows Server 2012 ■ Administrative privileges to run tools ■ TCP/IP settings correctly configured and an accessible DNS server Overview of LCP LCP program mainly audits user account passwords and

Ten Important Rules Of Ethical Hacking

The world of ethical hacking too is bound by a set of rules and principles, here are 10 crucial ones!   Time and again we have been bringing you valuable resources on ethical hacking since we know and understand the nature of things as far as security goes. Ethical hacking is picking up steam each day with more and more organisations spending heftily to maintain the sanctity of their systems and data. As such, ethical hacking is a glorious career option in the current scheme of things. 1.Set your goals straight To begin with, an ethical hacker must start thinking like the intruder. He must be able to identify the loopholes on the target access points or networks that are prone to attack, he must be aware of the repercussions of these loopholes and how the intruder can use it against the same. An ethical hacker then has to find out if anyone at the target notice the intruder's attempts to carry out his/her acts. Finding out and eliminating unauthorised wireless access point