Clario’s offering free tech support during COVID-19 outbreak. Learn more.

10 Cybersecurity Experts You Should Follow on Social Media

In today’s ever-evolving digital landscape, our personal privacy and security are facing more challenges than expected.

 

With data leaks affecting one in five people globally and tech companies taking too long to respond, it’s always better to seek advice from those who spot the news first.

 

We have compiled a list of the 10 top cybersecurity experts. Spoiler: it is okay if you don’t understand all of their articles - just follow their Twitter accounts to help you stay ahead of the digital security curve.

Bob Sullivan

Bob Sullivan is an experienced journalist who spent almost 20 years working at MSNBC.com and NBC News. He has also written five books including Stop Getting Ripped Off and Gotcha Capitalism - both New York Times best-sellers. Bob was also one of the first journalists to tackle ID theft with his book Your Evil Twin: Behind the Identity Theft Epidemic. These days Bob hosts a podcast called “So, Bob”, dedicated to untangling the world of tech and shedding light on its darker side.

 

👋Follow Bob on Twitter

Mikko Hypponen

Mikko is a Chief Research Officer at F-Secure, a corporation that has been shaping the cybersecurity landscape for almost three decades and protecting tens of thousands of businesses and millions of people around the world. Mikko's writing can be seen in The New York Times, Wired and Scientific America. He has also held lectures at Oxford, Stanford and Cambridge universities, and even has his own TED Talk. Keep on top of emerging trends by checking out his webinar on Covid-19's impact on cybersecurity.

 

👋Follow Mikko on Twitter

Bill Brenner

Tech writer and podcaster Bill Brenner is a well known expert in the cybersecurity sector and works as a Director of Research at the Institute for Applied Network Security (IANS). With Bill Brenner’s expertise, IANS provides experience-based security insights for Chief Information Security Officers in a world of rapidly evolving cybersecurity threats. Bill has built up his expertise working as a content strategist at security software companies including Sophos and PKWARE.

 

👋Follow Bill on Twitter

Jack Rhysider

Everyone who is interested in digital security should definitely keep an eye on Jack Rhysider. A well-known security expert, Jack hosts Darknet Diaries, a podcast dedicated to highlighting the dark underbelly of the internet. In each episode, Jack interviews a guest on all the hidden parts of the network. Guests range from hackers to cybercrime experts discussing hacktivism, data breaches and advanced persistent threats (APTs) at length.

 

👋Follow Jack on Twitter

Lesley Carhart

Regularly named as one of the top female professionals in the cybersecurity sector, Lesley has been specializing in information security for more than a decade. She currently works as a threat analyst at cybersecurity company Dragos, Inc. Her vast knowledge of digital threats is widely recognized, and she regularly speaks on the topic at conferences and universities.

 

👋Follow Lesley on Twitter

Brian Krebs

Brian is best known for his security investigations on profit-seeking cyber criminals. He has written more than 1300 articles for The Washington Post’s Security Fix blog and his New York Times best-seller, Spam Nation uncovers the shady world of cybercrime. Brian tackles complex cybersecurity issues on his website, including megabreaches and malware crime networks. You can also follow him for the latest cybercrime news on Twitter.

 

👋Follow Brian on Twitter

Charlie Miller

Charlie is one of the most famous cybersecurity influencers in the world, appearing on the likes of CNN, Forbes and ABC World News Tonight. He has spent a considerable amount of time in the automotive sector, with one of his research pieces revealing how Fiat Chrysler vehicles could be infiltrated and controlled remotely by an attacker. His investigation led to 1.4 million vehicles being recalled in order to fix the bug.

 

👋Follow Charlie on Twitter

Josephine Wolff

Josephine is a cybersecurity researcher and professor. Her book, You’ll See this Message when It’s Too Late draws from her in-depth understanding of all the nuances of cybersecurity. Covering the aftermath that follows after some of the biggest online scams and data breaches, it delves into how our technical, social and political lives are all affected by cybercrime. As a contributing opinion writer, she shares her insights as a contributing opinion writer for The New York Times, and has also written for The Washington Post, The Atlantic, and Wired.

 

👋Follow Josephine on Twitter

Troy Hunt

It is impossible to create a list of the most trusted cybersecurity experts in the world without mentioning Troy Hunt. Troy is most famous for his Have I Been Pwned (HIBP) project. The HIBP website provides you with a unique opportunity to check up of your accounts for data breaches and data leaks. Troy travels the world as a cybersecurity speaker, visiting events and training technology professionals to strengthen their lines of defense.

 

👋Follow Troy on Twitter

Shira Rubinoff

Shira is an influencer, keynote speaker and thought leader for women in technology, with expertise in digital security and blockchain. She has built two cybersecurity product companies from the ground up and is currently president and co-founder of Prime Tech Partners, a NYC-based startup incubator. As a consultant and an advisor, Shira provides guidance to numerous Fortune 100 companies in areas related to cybersecurity and company thought leadership.

 

👋Follow Shira on Twitter

 

* * *

 

Stay cyber-savvy and keep an eye on these cybercrime experts. In return, they will always be on the lookout for all the things that put our digital privacy at risk.

 

Disclaimer: The list of top cybersecurity experts was compiled based on Clario’s inner opinion.

Read more:

Columns

We’d like to stay in touch.

We’ve got something special to share! Enter your contact details below to be among the first to find out about the exciting changes we’ve got in the works as well as to receive special promotions.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. ReCaptcha verification failed

More Related Articles

arrow

Run Application

Double-Click on MacKeeper.pkg

Click Continue