chat
expand_more

14 Cybersecurity Influencers to Follow This Year

Stay up to date on the latest cybersecurity trends, industry news, and best practices by following these 14 innovative and influential thought leaders on social media.
June 22, 2023

With new cyber threats emerging almost daily, staying up to date on the latest cybersecurity trends, industry news, and best practices can be challenging.

Browsing Twitter and Linked is certainly an effective way to view valuable insights in aggregate. But one of the downsides of social media is that because anyone can declare themselves a “cybersecurity expert”, identifying consistent sources of reliable and accurate information can be difficult.

To help make things easier, we’ve curated a list of some of the most innovative cybersecurity thought leaders. Each security influencer on this list offers a unique perspective on a broad range of topics and regularly shares helpful content on Twitter/X, LinkedIn, or both.

1. Brian Krebs

For more than two decades, Brian Krebs has channeled his self-described obsession with cybersecurity into hundreds of Washington Post articles, more than 1,000 blog posts, and a New York Times bestseller. Now an independent investigative journalist, Brian regularly publishes cybersecurity insights on his website, Krebs on Security, as well as his social media accounts.

What He Shares: Industry updates, content from fellow security experts, and stories about recent cyberattacks

Follow Brian: Twitter/X, LinkedIn

2. Chris Krebs

As Director of the Cybersecurity and Infrastructure Security Agency (CISA) from 2018 to 2020, Krebs led the national effort to keep the United States safe from cyberattacks in all forms. Following his departure from CISA, Krebs co-founded Krebs Stamos Group, a cybersecurity consultancy, with Alex Stamos, formerly the CISO at Facebook.

What He Shares: Commentary on the latest cybersecurity news and career opportunities for security professionals

Follow Chris: Twitter/X, LinkedIn

3. Graham Cluley

No list of security influencers would be complete without Graham Cluley, an award-winning cybersecurity expert, writer, and researcher who was inducted into the Infosecurity Europe Hall of Fame. He has held senior roles at Sophos and McAfee and is now an independent blogger and analyst, world-renowned public speaker, and host of the Smashing Security podcast.

What He Shares: Candid commentary about recent security incidents, cyberattacks, and online privacy

Follow Graham: Twitter/X, LinkedIn

Previous Work with Abnormal: Gone Phishing? Catching the Phish Before Your Employees Bite

4. Rachel Tobac

Rachel Tobac is undoubtedly an authority on social engineering. As an ethical hacker and CEO of SocialProof Security, Rachel helps companies keep their data safe by executing penetration tests and educating employees on socially-engineered attacks. She is also the Chair of the Board for the nonprofit Women in Security and Privacy (WISP), where she offers support and guidance to other women in the cybersecurity community.

What She Shares: Digestible advice and recommendations for blocking socially-engineered attacks

Follow Rachel: Twitter/X, LinkedIn

Previous Work with Abnormal: Hacking with Hackers: Uncovering the Human Element of Cybercrime

5. Dave Kennedy

After serving five years in the US Marine Corps focusing on cyber warfare and forensics analysis activities, Dave Kennedy entered the private sector and has been on a 15+ year mission to make the world more secure. He’s founded two large-scale cybersecurity firms, co-founded the Penetration Testing Execution Standard (the industry standard for penetration tests), and created several open-source security tools.

What He Shares: Coding advice, attack insights, and upcoming cybersecurity events

Follow Dave: Twitter/X, LinkedIn

6. Eugene Kaspersky

Eugene Kaspersky began creating his first antivirus programs in the early 1990s. In 1997, he founded Kaspersky Lab, heading up the company's research efforts and helping identify instances of government-sponsored cyberwarfare. Kaspersky Lab is now one of the largest consumer IT security software companies in the world, with more than 400 million users.

What He Shares: News on recent security vulnerabilities and interesting takes on InfoSec in the Star Wars universe

Follow Eugene: Twitter/X, LinkedIn

7. Katie Moussouris

Katie Moussouris was instrumental in building the first bug bounty program at the US Department of Defense, leveraging her experience from leading Vulnerability Research at Microsoft. Now CEO of Luta Security, she advises governments and higher education institutions on potential vulnerabilities and bug bounty programs.

What She Shares: An unfiltered view of the life of an entrepreneur and ethical hacker along with advice for other female cybersecurity professionals

Follow Katie: Twitter/X, LinkedIn

8. Michael Coates

Michael Coates has been at the forefront of InfoSec for more than two decades, protecting hundreds of millions of users while leading security at global organizations like Mozilla and Twitter. Earlier in his career, he evaluated and fortified networks for some of the largest banks in the world and is now CISO at CoinList, a digital asset and cryptocurrency exchange.

What He Shares: Thoughts about innovative technologies like AI and ML and tips for both security leaders and consumers

Follow Michael: Twitter/X, LinkedIn

9. Mikko Hypponen

Named Cybersecurity Person of the Year for 2020 by CISO MAG, Mikko Hypponen has led his team at F-Secure Corporation in Finland through some of the largest computer virus outbreaks in history. His research has been shared on CNN, Scientific American, and The New York Times, and he’s given multiple TED talks. In 2014, Mikko was thanked by Twitter for improving the company’s security.

What He Shares: Wisdom from other security experts as well as his insights on recent malware attacks

Follow Mikko: Twitter/X, LinkedIn

10. Shira Rubinoff

Regarded as one of the top female cybersecurity influencers, Shira Rubinoff is an expert in the human element of cybersecurity. She co-founded Prime Tech Partners, an NYC-based technology incubator, and is the president of the social media security firm, SecureMySocial. Shira holds several patents and patents pending for systems and methods intended to enhance security on social media by preventing certain information from being posted publicly.

What She Shares: Valuable research and guidance on data security and online privacy best practices

Follow Shira: Twitter/X, LinkedIn

11. Theresa Payton

Theresa Payton made history as the first woman to serve as White House CIO. Following her tenure in the Bush administration, she went on to co-found Dark3, a cybersecurity solution, and is now CEO of Fortalice Solutions, a provider of cybersecurity consulting services. She was also named 2019 Woman Cybersecurity Leader of the Year as well as one of the “Top 25 Most Influential People in Security” by Security Magazine.

What She Shares: Advice for protecting privacy alongside breaking security stories

Follow Theresa: Twitter/X, LinkedIn

Previous Work with Abnormal: Malware as an Ongoing Email Issue

12. Troy Hunt

Australian web security consultant Troy Hunt has made education and outreach the focus of his career. A data breach expert, he’s best known for creating “Have I Been Pwned?”, a website that allows users to see if their personal information has been compromised. As an Information Security Author & Instructor at Pluralsight, Troy has created dozens of courses on a range of cybersecurity topics.

What He Shares: Informative data security and InfoSec content that is easy to understand

Follow Troy: Twitter/X, LinkedIn

Previous Work with Abnormal: Account Takeovers as the Hidden Threat

13. Jessica Barker

Best-selling author and international keynote speaker, Jessica Barker is at the forefront of the human side of cyber security. She has delivered face-to-face awareness sessions to over 50,000 people in over 25 countries and has been named one of the top 20 most influential UK women in cyber security. She is the co-founder of the cyber security company Cygenta and her bestselling books, 'Confident Cyber Security' and 'Cybersecurity ABCs', help audiences around the world understand why people are at the heart of cybersecurity.

What She Shares: Industry news, commentary on the human side of cybersecurity, advice, and awareness tips.

Follow Jessica: Twitter/X, LinkedIn

14. FC (Freaky Clown)

FC (Freaky Clown) is an experienced ethical hacker and social engineer with over 20 years of experience in the infosec field. His work has helped organizations to improve their security by demonstrating weaknesses in physical, personnel, and digital controls. As Co-Founder and Head of Ethical Hacking at Cygenta, he continues to perform valuable research into vulnerabilities for major high-street banks.

What He Shares: Industry insights, cybersecurity best practices, and commentary on the latest developments in AI.

Follow FC: Twitter/X, LinkedIn

Previous Work with Abnormal: ChatGPT Exposed: Protecting Your Organization Against the Dark Side of AI

If you’re looking for another great source of information on new attacks, the latest trends in cybercrime, and actionable advice for how to stay one step ahead of cybercriminals, we invite you to visit Abnormal Intelligence.

Or if you're ready to learn more about the Abnormal platform, schedule a demo today!

Schedule a Demo
14 Cybersecurity Influencers to Follow This Year

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

 
Integrates Insights Reporting 09 08 22

Related Posts

B Convergence S2 Recap Blog
Season 2 of our web series has come to a close. Explore a few of the biggest takeaways and learn how to watch all three chapters on demand.
Read More
B 1500x1500 Adobe Acrobat Sign Attack Blog
Attackers attempt to steal sensitive information using a fraudulent electronic signature request for a nonexistent NDA and branded phishing pages.
Read More
B 4 15 24 RBAC
Discover how a security-driven RBAC design pattern allows Abnormal customers to maximize their user setup with minimum hurdles.
Read More
B 4 10 24 Zoom
Learn about the techniques cybercriminals use to steal Zoom accounts, including phishing, information stealers, and credential stuffing.
Read More
Social Images for next Cyber Savvy Blog
Explore how Alex Green, the CISO of Delta Dental, safeguards over 80 million customers against modern cyber threats, and gain valuable insights into the cybersecurity landscape.
Read More
B Images for EDB Blog from Sanjay
Abnormal is excited to announce the establishment of a strategic partnership with the Singapore Economic Development Board (EDB).
Read More