Looking for top cybersecurity experts worth following? Here are the ten cybersec influencers who’ll make staying on top of things that much easier.
From journalists and programmers to science writers and entrepreneurs, these are the leading cybersecurity experts to follow. Their knowledge can make all the difference when keeping your systems safe this year.
So, make sure to add them on Twitter or bookmark their blogs and websites. And if you have any questions, don’t be afraid to ask them. We’ve picked some of the most approachable cybersecurity experts around – not remote arrogant robots. They’ll surely be happy to help.
To help you get started, we’ve included the best link for each expert along with their bios.
1. Brian Krebs
Brian Krebs, the creator of the popular Krebs on Security blog, is an investigative journalist with an ambition to go well beyond the superficial coverage which characterizes so much of the tech press. An alumnus of the Washington Post, where he wrote the Security Fix blog from 1995-2009, Krebs has focused on security since a traumatic home-hacking event in 2001, and his work continues to set the agenda.
2. Eugene Kaspersky
Eugene Kaspersky is one of the most respected figures in the world of cybersecurity. As the founder of Kaspersky Labs – one of the biggest antivirus companies around – Eugene hasn’t rested on his laurels since 1997. Instead, his online activities make him one of the key influencers in today’s cybersec community, whether that’s via his Twitter account or SecureList, where Kaspersky Labs issues regular threat reports. Eugene Kaspersky is also a knowledgeable voice for anyone interested in cyber espionage and the broader subject of surveillance tech.
3. Bruce Schneier
A prolific author on the subject of digital security with 13 books under his belt, Bruce Schneier makes complex subjects accessible to the layman in a way few cybersecurity experts can. Bruce is a key member of the Electronic Frontier Foundation and has accrued more than 250,000 subscribers to his newsletter. In fact, few cybersecurity experts on our list are so well-connected. With books such as “Click Here to Kill Everybody” (a great read about the dangers posed by smart devices) and countless essays and online talks, Schneier is also a go-to authority on today’s emerging threats. So make sure you bookmark his homepage.
4. Bill Brenner
Former Editorial Head of Akamai Technologies and current Research Director at the Institute for Applied Network Security (IANS), Bill Brenner is always at the cutting edge of today’s security developments. Since 2014, he’s been delivering informative and brilliantly insightful updates on the Naked Security and Liquidmatrix Security blogs where, as well as being a regular on their sacclaimed podcasts.
5. Kevin Mitnick
A formerly incarcerated hacker turned cybersecurity guru, Kevin Mitnick has come a long way since being arrested for wire fraud and cellphone code cloning in 1995. After being released from jail, he’s gathered a cult following, especially among the free software and hacking communities. Not only that, but his consultancy services are in high demand from Fortune 500 companies as well. These days, Kevin himself is regularly featured among guest cybersecurity experts at industry events, and his security consultancy business is paid to hack corporate systems ¬– with a 100% success rate, we might add.
6. Nicole Perlroth
Working on the digital security beat for the New York Times, Nicole Perlroth is one of the most influential cybersecurity experts on this list. She played a key role in unmasking the NSA’s spying activities and has been praised for her coverage of Chinese cyber-espionage. Check out her latest book “This Is How They Tell Me The World Ends” and follow her on Twitter, where Perlroth maintains an active presence. Additionally, look out for an upcoming movie she wrote about Brian Krebs (another star on our list). Not many movies get cybersecurity right, but with Nicole’s expertise on board, this one should do great.
7. Leigh Honeywell
Leigh Honeywell brings a breath of fresh Canadian air to the cybersecurity community, as well as fuses witty geek feminism with on-point tech smarts. She’s been dubbed the “catalyst” for the current wave of activism in the digital sector. On a more everyday level, she’s the brains on Hypatia.ca and Tall Poppy, and a world authority on developing ways to keep employee communications as safe as possible. Moreover, if harassment is an issue at your organization, Honeywell is the person to ask.
8. Adam Levin
Always in demand by major TV networks and IT conferences, Adam Levin is one of the foremost experts on identity theft. As identity theft becomes an ever more pressing issue, Adam’s blog is a must-read resource for anyone who shops online. And it’s not all about fraud. Levin ranges widely, writing about social media in Iran, voting machines, Bitcoin mining, and how the US Department of Defence (mis)uses cybersec. So, there’s something for everyone there – don’t miss out.
9. Kim Zetter
One of the key contributors for Wired, Kim Zetter is a global authority on cryptography, so we had to include her on our top 10 list. From the flaws associated with electronic voting machines to the meaning of the famous Kryptos sculpture outside the CIA’s HQ, Zetter’s work never fails to fascinate. And whenever cybersecurity stories break, she always seems to be on top of them. So make sure to keep tabs on her tweets if you want to stay in-the-know.
10. Dave Kennedy
As the founder of TrustedSec, Dave Kennedy mixes his interests hardcore gaming with everything related to cybersecurity. With years of experience inside the military-industrial complex, Kennedy knows how security is being implemented and potentially abused by the powers that be. What’s more, Dave has piloted TrustedSec to the top of the totem pole among global cybersec consultancy firms. Even so, he still maintains a close relationship with his following via his Twitter persona HackingDave, where Kennedy dispenses up to the minute updates on malware, smart devices, and whatever’s going on in his life.