Abstract White Hills

12 Cybersecurity Influencers to Follow This Year

Stay up to date on the latest cybersecurity trends, industry news, and best practices by following these 12 innovative and influential thought leaders on social media.

September 8, 2022

With new cyber threats emerging almost daily, staying up to date on the latest cybersecurity trends, industry news, and best practices can be challenging.

Browsing Twitter and Linked is certainly an effective way to view valuable insights in aggregate. But one of the downsides of social media is that because anyone can declare themselves a “cybersecurity expert”, identifying consistent sources of reliable and accurate information can be difficult.

To help make things easier, we’ve curated a list of some of the most innovative cybersecurity thought leaders. Each security influencer on this list offers a unique perspective on a broad range of topics and regularly shares helpful content on Twitter, LinkedIn, or both.

Brian Krebs

For more than two decades, Brian Krebs has channeled his self-described obsession with cybersecurity into hundreds of Washington Post articles, more than 1,000 blog posts, and a New York Times bestseller. Now an independent investigative journalist, Brian regularly publishes cybersecurity insights on his website, Krebs on Security, as well as his social media accounts.

What He Shares: Industry updates, content from fellow security experts, and stories about recent cyberattacks

Follow Brian: Twitter, LinkedIn

Chris Krebs

As Director of the Cybersecurity and Infrastructure Security Agency (CISA) from 2018 to 2020, Krebs led the national effort to keep the United States safe from cyberattacks in all forms. Following his departure from CISA, Krebs co-founded Krebs Stamos Group, a cybersecurity consultancy, with Alex Stamos, formerly the CISO at Facebook.

What He Shares: Commentary on the latest cybersecurity news and career opportunities for security professionals

Follow Chris: Twitter, LinkedIn

Dave Kennedy

After serving five years in the US Marine Corps focusing on cyber warfare and forensics analysis activities, Dave Kennedy entered the private sector and has been on a 15+ year mission to make the world more secure. He’s founded two large-scale cybersecurity firms, co-founded the Penetration Testing Execution Standard (the industry standard for penetration tests), and created several open-source security tools.

What He Shares: Coding advice, attack insights, and upcoming cybersecurity events

Follow Dave: Twitter, LinkedIn

Eugene Kaspersky

Eugene Kaspersky began creating his first antivirus programs in the early 1990s. In 1997, he founded Kaspersky Lab, heading up the company's research efforts and helping identify instances of government-sponsored cyberwarfare. Kaspersky Lab is now one of the largest consumer IT security software companies in the world, with more than 400 million users.

What He Shares: News on recent security vulnerabilities and interesting takes on InfoSec in the Star Wars universe

Follow Eugene: Twitter, LinkedIn

Graham Cluley

No list of security influencers would be complete without Graham Cluley, an award-winning cybersecurity expert, writer, and researcher who was inducted into the Infosecurity Europe Hall of Fame. He has held senior roles at Sophos and McAfee and is now an independent blogger and analyst, world-renowned public speaker, and host of the Smashing Security podcast.

What He Shares: Candid commentary about recent security incidents, cyberattacks, and online privacy

Follow Graham: Twitter, LinkedIn

Katie Moussouris

Katie Moussouris was instrumental in building the first bug bounty program at the US Department of Defense, leveraging her experience from leading Vulnerability Research at Microsoft. Now CEO of Luta Security, she advises governments and higher education institutions on potential vulnerabilities and bug bounty programs.

What She Shares: An unfiltered view of the life of an entrepreneur and ethical hacker along with advice for other female cybersecurity professionals

Follow Katie: Twitter, LinkedIn

Michael Coates

Michael Coates has been at the forefront of InfoSec for more than two decades, protecting hundreds of millions of users while leading security at global organizations like Mozilla and Twitter. Earlier in his career, he evaluated and fortified networks for some of the largest banks in the world and is now CISO at CoinList, a digital asset and cryptocurrency exchange.

What He Shares: Thoughts about innovative technologies like AI and ML and tips for both security leaders and consumers

Follow Michael: Twitter, LinkedIn

Mikko Hypponen

Named Cybersecurity Person of the Year for 2020 by CISO MAG, Mikko Hypponen has led his team at F-Secure Corporation in Finland through some of the largest computer virus outbreaks in history. His research has been shared on CNN, Scientific American, and The New York Times, and he’s given multiple TED talks. In 2014, Mikko was thanked by Twitter for improving the company’s security.

What He Shares: Wisdom from other security experts as well as his insights on recent malware attacks

Follow Mikko: Twitter, LinkedIn

Rachel Tobac

Rachel Tobac is undoubtedly an authority on social engineering. As an ethical hacker and CEO of SocialProof Security, Rachel helps companies keep their data safe by executing penetration tests and educating employees on socially-engineered attacks. She is also the Chair of the Board for the nonprofit Women in Security and Privacy (WISP), where she offers support and guidance to other women in the cybersecurity community.

What She Shares: Digestible advice and recommendations for blocking socially-engineered attacks

Follow Rachel: Twitter, LinkedIn

Shira Rubinoff

Regarded as one of the top female cybersecurity influencers, Shira Rubinoff is an expert in the human element of cybersecurity. She co-founded Prime Tech Partners, an NYC-based technology incubator, and is the president of the social media security firm, SecureMySocial. Shira holds several patents and patents pending for systems and methods intended to enhance security on social media by preventing certain information from being posted publicly.

What She Shares: Valuable research and guidance on data security and online privacy best practices

Follow Shira: Twitter, LinkedIn

Theresa Payton

Theresa Payton made history as the first woman to serve as White House CIO. Following her tenure in the Bush administration, she went on to co-found Dark3, a cybersecurity solution, and is now CEO of Fortalice Solutions, a provider of cybersecurity consulting services. She was also named 2019 Woman Cybersecurity Leader of the Year as well as one of the “Top 25 Most Influential People in Security” by Security Magazine.

What She Shares: Advice for protecting privacy alongside breaking security stories

Follow Theresa: Twitter, LinkedIn

Troy Hunt

Australian web security consultant Troy Hunt has made education and outreach the focus of his career. A data breach expert, he’s best known for creating “Have I Been Pwned?”, a website that allows users to see if their personal information has been compromised. As an Information Security Author & Instructor at Pluralsight, Troy has created dozens of courses on a range of cybersecurity topics.

What He Shares: Informative data security and InfoSec content that is easy to understand

Follow Troy: Twitter, LinkedIn

If you’re looking for another great source of information on new attacks, the latest trends in cybercrime, and actionable advice for how to stay one step ahead of cybercriminals, we invite you to visit Abnormal Intelligence.

Image

Prevent the Attacks That Matter Most

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

0
Demo 2x 1

See the Abnormal Solution to the Email Security Problem

Protect your organization from the attacks that matter most with Abnormal Integrated Cloud Email Security.

Related Posts

B 09 29 22 CISO Cybersecurity Awareness Month
October is here, which means Cybersecurity Awareness Month is officially in full swing! These five tips can help security leaders take full advantage of the month.
Read More
B Email Security Challenges Blog 09 26 22
Understanding common email security challenges caused by your legacy technology will help you determine the best solution to improve your security posture.
Read More
B 5 Crucial Tips
Retailers are a popular target for threat actors due to their wealth of customer data and availability of funds. Here are 5 cybersecurity tips to help retailers reduce their risk of attack.
Read More
B 3 Essential Elements
Legacy approaches to managing unwanted mail are neither practical nor scalable. Learn the 3 essential elements of modern, effective graymail management.
Read More
B Back to School
Discover how threat group Chiffon Herring leverages impersonation and spoofed email addresses to divert paychecks to mule accounts.
Read More
B 09 06 22 Rearchitecting a System Blog
We recently shared a look at how the Abnormal engineering team overhauled our Unwanted Mail service architecture to accommodate our rapid growth. Today, we’re diving into how the team migrated traffic to the new architecture—with zero downtime.
Read More
B Industry Leading CIS Os
Stay up to date on the latest cybersecurity trends, industry news, and best practices by following these 12 innovative and influential thought leaders on social media.
Read More
B Podcast Engineering 11 08 24 22
In episode 11 of Abnormal Engineering Stories, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, continues his conversation with Zehan Wang, co-founder of Magic Pony.
Read More
B Overhauled Architecture Blog 08 29 22
As our customer base has expanded, so has the volume of emails our system processes. Here’s how we overcame scaling challenges with one service in particular.
Read More