Top Cybersecurity Experts You Should Follow on Twitter

0
2770
"This topic is for educational purposes. We do not encourage or support any illegal actions."

Cybersecurity is now becoming a serious and crucial concern for brands and governments all over the world. Data theft and breaching have become lethally a usual. More than 15 data breaches, including Bell’s data breach that resulted in 1.9 million customers’ records stolen has already witnessed in the year of 2017. The Wannacry attack will always be mentioned whenever data breaches will be discussed.

SaleNordVPN On Cyber Monday Deal

ExpressVPN is the leading provider it offers a huge number of servers – Kill Switch – P2P Optimized Servers & Great for unblocking sites and content, also working with Netflix. Available apps for Mac, Windows, iPhone, Android
30 Day Refund PolicyNordVPN 78% OFF

Fortunately for us, Twittersphere is full of cybersecurity experts who are keen and ambitious to share their thoughts, news, and researches on a wide range of topics such as vulnerabilities, IoT, viruses, malware, application security, DevOps, data breaches, threat intelligence, privacy and more.

Cybersecurity Experts and Journalist on Twitter

There is a compiled list of cybersecurity experts who assist people’s concern with their cybersecurity to stay one step ahead of hackers and digital tyrants.

@evacide

Eva Galperin is a Director of EFF’s cybersecurity and tech advisor at Freedom of the Press. Before to working for EFF, she served to security and IT in Silicon Valley. Her work is mainly focused on security and privacy for susceptible populations all over the world. To that end, she has functionalized the combination of her political science and technical academic background to everything from organizing EFF’s Tor Relay Challenge to writing and training on security and privacy materials and publishing her researches on malware in Syria, Vietnam, Kazakhstan.

@e_kaspersky

eugene kasperskyEugene Kaspersky is the Russian cybersecurity expert and the CEO Kaspersky Lab which was set up in 1997. He is performing his duties of fighting malware and combatting other cyber threats since 28 years in the field of cybersecurity. In 1965 Kaspersky first, build up his ardor for cyber security. He has written numerous articles on computer virology and also speaks at many privacy and security seminars and conferences. Kaspersky Lab is now functioning in more than 200 countries with almost 30 regional and country offices all over the world.

@schneierblog

bruce schneierBruce Schneier is an internationally famous and renowned cybersecurity technologist and he was named a ‘security guru’ by The Economist. Schneier has written almost 13 books and numerous articles, researches and academic papers. His notable works are including Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. He has more than 250,000 readers in his newsletter, Crypto-Gram, and blogs. He is also serving as the Chief Technology Officer at IBM’s Resilient.

@mikko

mikko hypponenMikko Hypponen is the Chief Research Officer at F-Secure and serving for the company for more than two decades, he is a columnist and a well-known TED speaker and has received several awards and tributes. Recently he was included in the list of the top 50 most influencers on the web by PCWorld. Hypponen has led loads of efforts to overcome on disreputable viruses and security breaches. Also, he is an advisor to a number of governments on information security. His tweets are on IT security news relevant to both governments and enterprises.

@briankrebs

brian krebsBrian Krebs is an American journalist and investigative reporter and he has a decade’s experience of authoring cybersecurity related blogs and articles. His blog mainly focuses on cybercrime and computer security. He has served as a reporter for The Washington Post, writing more than 1,300 blog posts for the Security Fix blog, having an NYT bestselling author and has won many awards. Most recently, he has set an “Ask Me Anything” discussion on Reddit about investigative reporting.

@gcluley

graham cluleyGraham Cluley is a famous award-winning security researcher, blogger, and public speaker. He has been serving in the cybersecurity industry since the 1990s. He has spoken at events such as Web Summit, InfoSec, Virus Bulletin, Microsoft Future Decoded, and the European Internet Security Forum. Cluley has also assisted law enforcement agencies investigating hacking groups, and he often appears on Television and radio elucidating about computer security attacks and threats.

@thegrugq

The Grugq is a world well-known information security researcher with more than 15 years of industry experience. The Grugq is an independent information security counselor and has worked with more than 100 fortune companies, the public sector, leading information security firms and innovative start-ups. The Grugq’s tweets are humorous and highly technical.

@iblametom

Thomas Fox covers the topics on privacy, crime, and security in physical or digital forms. His write-ups are mostly for Forbes which is on security and privacy. He has been breaking news and writing features on these topics for major publications since 2010. Fox also work as a freelancer for The Guardian, Vice Motherboard, Wired, etc, amongst many others and was titled BT Security Journalist of the year in 2012 and 2013 for a range of special articles, and in 2014 was handed Best News Story for a feature on US government harassment of security professionals.

@nakashimae

ellen-nakashimaEllen Nakashima is serving as a national security reporter for The Washington Post and focuses on issues relating to technology, intelligence, and civil liberties. Before that, Nakashima served as a Southeast Asia journalist for the paper and wrote about the presidential candidature of Al Gore and co-authored a biography of Gore, and has also covered federal agencies, Virginia state politics, and local dealings.

@reach2ratan

Ratan Jyoti is a former CISO of Vijaya Bank and now has joined Ujjivan Financial Services Limited in the role of CISO. Jyoti gives his services as AGM & CISO for more than three and half years. As an Ex CISO of Vijaya Bank, Jyoti was active and competent in driving key security correlated projects in the bank that incorporated a Security Operations Centre (SOC), deployment of IT Governance Risk Management & Compliance (GRC) solution and achievement of a dedicated Security Information and Event Management (SIEM) system for boosting cyber forensic capabilities of the bank.

Jyoti is very experienced and has a well-built background in information security with more than 15 years of industry experience, before to joining Vijaya Bank in November 2007, he had served almost five years working in different roles and functions at Oriental Bank of Commerce (OBC) and Corporation Bank.

According to inforightrelevence.com, he ranked 11 on the top connectors with respect to betweenness centrality.

@DanRaywood

Dan Raywood is serving as a contributing editor for Infosecurity Magazine and has written about IT security since 2008, He has a five years experience as news editor of SC Magazine, 20 months as an Editor of IT Security Guru and of six months as an Analyst in the Information Security Practice at 451 research. Raywood has spoken at 44CON, SteelCon, Infosecurity Europe, and SecuriTay as well as a presenter on webcasts and writing numerous vendor blogs.

@georgevhulme

George V. Hulme is an internationally known business technology and information security writer, having more than two decades of experience. Hulme is writing on the topics about IT security, business, and technology. Also, he has served as a senior editor at InformationWeek and has covered the IT security and homeland security beats. His work has come out in ComputerWorld, CSOOnline, Network Computing, Network World, San Francisco Examiner, VARBusiness, TechWeb, and lots of other technology publications.

@shirastweet

Shira Rubinoff is the President of Green Armor Solutions and she is one of the most eminent female cybersecurity expert as well as proficient in human factors of information technology and security. The Executive Women’s Forum and CSO Magazine titled her a ‘Women of Influence’ and honored her with their One-to-Watch award. Rubinoff was also cited as one of New Jersey’s Best 50 Women in Business by NJBIZ. She has lectured and publications on topics related to psychology and cybersecurity.

@nicoleperlroth

nicole perlrothNicole Perlroth covers topics related to cybersecurity and is the receiver of many journalism awards for her reporting on efforts by the Chinese government to pilfer military and industrial trade secrets. She served as a security blogger for the NYT and before joining the Times in 2011, Ms. Perlroth covered venture capital at Forbes Magazine. Perlroth is the author of the forthcoming book “This Is How They Tell Me the World Ends” with Penguin/Portfolio.

@hacks4pancakes

Lesley Carhart has a 17 year of experience in IT industry as well as 8 years in information security. She writes and speaks about digital forensics and incident response, information security careers, and OSINT.

She is highly occupied in the Chicagoland information security community and a staff member at Circle City Con, Indianapolis.

LEAVE A REPLY

Please enter your comment!
Please enter your name here