Cybersecurity is a topic that concerns everyone, from individuals through to major corporations and government. With the rapid proliferation of new threats appearing globally, it makes sense to stay on top of the latest news and advice on cybersecurity matters. IT Chronicles has compiled a list of the top thirty influencers in the cybersecurity space, if you want to keep up with the current state of play in this important area, we recommend you follow these accounts.
Table of Contents
Toggle1.ย ย ย ย Danny Palmer
Danny Palmer ย is a senior reporter at ZDNet. Based in London, he writes about issues including cyber-security, hacking and malware threats
2.ย ย ย ย Eugene Kaspersky
Eugene Kaspersky began his career in cybersecurity accidentally when his computer became infected with the โCascadeโ virus in 1989. Eugeneโs specialized education in cryptography helped him analyze the encrypted virus, understand its behavior, and develop a removal tool for it. After successfully removing the virus, Eugeneโs curiosity and passion for computer technology drove him to start analyzing more malicious programs and developing disinfection modules for them.
3.ย ย ย ย Richard Bejtlich
Since 1998 Richard Bejtlich has defended Western interests from advanced digital intruders. Richard promotes Network Security Monitoring solutions to help global organizations stay in business by detecting and responding to digital threats.
4.ย ย ย ย Kevin Mitnick
Kevin Mitnick is the world’s most famous hacker,ย bestselling author, and theย top cyber security speaker. Once one of the FBI’s Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide.
5.ย ย ย ย Eva Galperin
Eva Galperin is EFF’s Director of Cybersecurity. Prior to 2007, when she came to work for EFF, Eva worked in security and IT in Silicon Valley and earned degrees in Political Science and International Relations from SFSU. Her work is primarily focused on providing privacy and security for vulnerable populations around the world.
6.ย ย ย ย Chaouki Bekrar
Chaouki Bekrar was described as The Wolf of Vuln Street & ‘Darth Vader of Cybersecurity’ by to a journalist. He is the founder ofย @Zerodiumย and VUPEN
7.ย ย ย ย Joseph Steinberg
Joseph Steinberg is a recognizedย cybersecurity thought leader, CEO, and technology influencer. Steinberg is also one of the best-read columnists in the cybersecurity field, and a respected authority on other โcool techโ products โ having amassed millions of readers as a regular columnist for Forbes and Inc. magazines. He serves as an expert witness and consultant on matters related to information security and emerging technologies, and has advised businesses and the US government on such issues.
8.ย ย ย ย Alan Woodward
Alan Woodward ย has been at the leading edge of technology development for many years, he is primarily a particularly good communicator. He is known for his ability to communicate complex ideas in a simple, yet passionate manner. He not only publishes in the academic and trade journals but has articles in the national press and comments on TV and radio. Despite the length of his experience, his hands-on ability with emerging technologies contributes significantly to the respect he is repeatedly shown when he leads teams where technology is involved.
9.ย ย ย ย Thomas Fox-Brewster
Thomas Fox Brewster covers security and privacy for Forbes. He has been breaking news and writing features on these topics for major publications since 2010. As a freelancer, he worked for The Guardian, Vice Motherboard, Wired and BBC.com, amongst many others. Thomas was named BT Security Journalist of the year in 2012 and 2013 for a range of exclusive articles, and in 2014 was handed Best News Story for a feature on US government harassment of security professionals.
10.ย Sara Sorcher
Sara Sorcher is the White House editor at USA Today. She joined the Washington bureau in April 2017 and runs a team of five reporters covering the Trump administration. Previously, she was deputy editor of Passcode, a section of The Christian Science Monitor covering digital security and privacy.
11.ย Graham Cluley
Graham Cluley is an award-winning computer security expert, writer and public speaker. Graham has been fighting cybercrime since early 1990s. Co-host of theย @SmashinSecurity podcast
12.ย William H Saito
William H Saito is a Cybersecurity expert, board member, author, speaker and Special Adviser to the Cabinet Office – Government of Japan. William was named by Nikkei as one of the 100 Most Influential People for Japan, Saito began software programming in elementary school and started his own company while still in high school. He was named Entrepreneur of the Year in 1998 (by Ernst & Young, NASDAQ and USA Today), and is recognized as one of the worldโs leading authorities on cybersecurity.
13.ย Dan Kaminsky
Dan Kaminsky ย has been a noted security researcher for over a decade, and has spent his career advising Fortune 500 companies such as Cisco, Avaya, and Microsoft.ย Dan spent three years working with Microsoft on their Vista, Server 2008, and Windows 7 releases. Dan is best known for his work finding a critical flaw in the Internetโs Domain Name System (DNS), and for leading what became the largest synchronized fix to the Internetโs infrastructure of all time.
14.ย Troy Hunt
Troy Hunt is an Australianย Microsoft Regional Directorย and also aย Microsoft Most Valuable Professionalย for Developer Security. Troy doesnโt work for Microsoft, but they recognise his community contributions by way of their award programs which he has been an awardee of since 2011.
15.ย Kim Zetter
Kim Zetter ย is the Author of the book Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. Kim is an award-winning investigative journalist who specializes in cybersecurity and national security, as well as privacy and civil liberties issues.
16.ย Dave Lewis
Dave Lewis is a security practitioner who has been in computer, network & information security for almost two decades. He has worked in multiple industries including financial, military, government, critical infrastructure and health care verticals.
17.ย Dave Kennedy
Dave Kennedy is the founder and senior principal security consultant at TrustedSec. Dave is a Security expert, keynote speaker, avid gamer and the go-to for protecting companies from threats.ย Prior to starting TrustedSec, David was the Chief Security Officer (CSO) for Diebold Incorporated, a Fortune 1000 company, with locations in over 80 countries. He developed a global security program that tackled all aspects of information security and risk management. Kennedy started his professional career as a member of the United States Marine Corps (USMC), and was deployed to Iraq twice for intelligence related missions.
18.ย Josh Corman
Josh Corman is the director of the Cyber Statecraft Initiative at the Atlantic Council’s Brent Scowcroft Center and a founder of I am The Cavalry (dot org). He co-foundedย @RuggedSoftwareย andย @IamTheCavalryย to encourage new security approaches in response to the worldโs increasing dependence on digital infrastructure. Josh’s unique approach to security in the context of human factors, adversary motivations, and social impact has helped position him as one of the most trusted names in security.
19.ย Lenny Zeltser
Lenny Zeltser isย aย seasoned business and tech leader with extensive information security expertise. He builds innovative endpoint defense solutions as VP of Products atย Minerva. Lenny helpsย shape global infosec practices by teaching incident response and malware defenses atย SANS Instituteย and by sharing knowledge through writing, public speaking and community projects.
20.ย Lee Munson
Lee Munson isย BH Consultingโs Social Media Managerย and a contributor to theย Sophos Naked Securityย blog. Coming from a retail background his huge amount of passion for the topic of information security has been gained through his research, self-education and writing on various aspects of the discipline. Through this work he has gained a unique insight into security and brings the ability to translate the highly technical field that is information security into plain language that business people and other non-technical folks can better understand.
21.ย Katie Moussouris
Kate Moussouris is ย an American computer security researcher and writer who is best known for her ongoing work advocating responsible security research. She created the bug bounty program at Microsoft.
22.ย ย J Wolfgang Goerlich
J Wolfgang Goerlich is a cyber security strategistย andย an active part of the Michigan security community. He co-founded the OWASP Detroit chapter and organizes the annual Converge and BSides Detroit conferences. Wolfgang has held roles such as the Vice President of Consulting, Security Officer, and Vice President of Technology Services. He regularly advises clientsย on topics ranging from risk management, incident response, business continuity, secure development life cycles, and more.
23.ย Dan Tentler
Dan Tentler is the founder of the Phobos group, a lean, committed organization providing attack, defensive and intelligence services to their clients.
24.ย Dr. Anton Chuvakin
Dr. Anton Chuvakin is a Research Vice President at Gartner’sย Gartner for Technical Professionals (GTP) Security and Risk Management Strategiesย team.
Anton is a recognized security expert in the field of log management, SIEM and PCI DSS compliance. Anton has publishedย dozens of papersย on log management, SIEM, correlation, security data analysis, PCI DSS, security management. His blogย “Security Warrior”ย is one of the most popular in the industry.
25.ย Matthieu Suiche
Matthieu Suiche is aย Frenchย hackerย and entrepreneur widely known as the founder of MoonSols, and co-founder ofย CloudVolumesย before it was acquired[1]ย byย VMWareย in 2014. In March 2014, Suiche was highlighted as one of the 100 key French developers in a report[2]ย for French ministerย Fleur Pellerin.
26.ย Per Thorsheim
Per Thorsheim has a self-described โinsaneโ interest in passwords. As one of the worldโs foremost security consultants focused solely on passwords, Per is the founder ofย PasswordsCon, the respected academic conference where international password security experts gather twice per year in Las Vegas and Europe.
27.ย Eric Vanderburg
Eric Vanderburg is a Christian cybersecurity leader, consultant, author, and thought leader. Vanderburg leads the cybersecurity consulting division at TCDI. TCDI’s cybersecurity division provides companies with peace of mind in our digital world by protecting the confidentiality, integrity, and availability of data and critical systems. TCDI security practitioners, analysts, engineers and forensic investigators apply their unique skills to create confidence in your information systems and policies.
28.ย Nicolas Brulez
Nicolas Brulez joined Kaspersky Lab as a senior malware researcher in 2009. His responsibilities include analyzing malware and carrying out security research. Over the last 15 years, Nicolas has authored numerous articles and papers on reverse engineering. He is a regular speaker at computer engineering schools and international security conferences.
29.ย Dave Whitelegg
Dave Whitelegg is the founder of ย the IT Security Expert website. Dave has held the world’s leading Information Security Certification, theย Certified Information Systems Security Professional (CISSP)ย byย ISC2ย for over 10 years, which broadly covers just about everything Information Security you can think of, from Biometrics to Encryption, from Legalย complianceย to Security Management and even Physical Security, a kind of jack of all trades of all aspects of Information Security.
30.ย Costin Raiu
Costin Raiu specializes in analyzing advanced persistent threats and high-level malware attacks. He leads the Global Research and Analysis Team at Kaspersky that researched the inner workings of Stuxnet, Duqu, Flame, Gauss and more recently, Red October, MiniDuke and the Mask. Costinโs work includes analyzing malicious websites, exploits and online banking malware.
To make it easier for you to follow all these accounts, here is the list of Twitter handles:
@dannyjpalmer
@e_kaspersky
@taosecurity
@kevinmitnick
@evacide
@cbekrar
@josephsteinberg
@profwoodward
@iblametom
@sarasorcher
@gcluley
@whsaito
@dakami
@troyhunt
@kimzetter
@gattaca
@hackingdave
@joshcorman
@lennyzeltser
@security_faqs
@k8em0
@jwgoerlich
@viss
@anton_chuvakin
@msuiche
@thorsheim
@evanderburg
@nicolasbrulez
@securityexpert
@craiu
If you think we are missing anyone from this list, please comment below and let us know.
Check out our list of the top IoT Influencers here