Authentication

11 Innovative Cybersecurity Thought Leaders to Follow on Twitter


Keeping up with the latest in security and threat news is challenging. We’ve gathered a list, in no particular order, of the 11 most innovative thought leaders making an impact in the fast-paced world of cybersecurity. Their expert and in-depth insights are worth the follow. Not on Twitter? That’s ok, we’ve included their websites too.

Ben Rothke

Ben Rothke’s website: www.rothke.com
Number of Twitter followers: 8,600
Follow Ben Rothke on Twitter: @benrothke

About Ben Rothke

Ben is a senior cybersecurity consultant working in information security at Nettitude. He gives talks and writes articles and book reviews on security, privacy, risk management, social media and other interesting topics.

 

Brian Krebs

Brian Krebs‘ website: krebsonsecurity.com
Number of Twitter followers: 230,000
Follow Brian Krebs on Twitter: @briankrebs

About Brian Krebs

Brian is an independent investigative security journalist with a deep insight into security trends, cybersecurity challenges, and the latest thinking and technologies. He reports on data breaches and other criminal activities, innovation and trends in security technology, and various other security-related events.

 

Bruce Schneier

Bruce Schneier’s website: www.schneier.com
Number of Twitter followers: 109,000
Follow Bruce Schneier on Twitter: @schneierblog

About Bruce Schneier

Bruce is the Chief Technology Officer at IBM’s Resilient and is one of the most important “people to listen to” in IT security. He is an internationally renowned security technologist and has written 13 books on technology, lectures at Ivy League universities, and has given expert testimony before Congress.

 

Dan Goodin

Dan Goodin’s website: arstechnica.com/author/dan-goodin
Number of Twitter followers: 32,000
Follow Dan Goodin on Twitter: @dangoodin001

About Dan Goodin

Dan Goodin is the Security Editor at Ars Technica. He covers a multitude of cybersecurity topics including hardware hacking, malware, espionage, and botnets. In his 15 plus years on the job, he’s chronicled the exploits of hackers wearing all shades of hats (black, white, and gray) and reported for the Associated Press and The Register.

 

Daniel Miessler

Daniel Miessler’s website: danielmiessler.com
Number of Twitter followers: 67,000
Follow Daniel Miessler on Twitter: @DanielMiessler

About Daniel Miessler

Daniel is an information security professional and writer. His website contains over 2,500 essays, posts, tutorials, articles, and other types of content on all aspects of cybersecurity.

 

Dave Shackleford

Dave Shackleford’s website: daveshackleford.com
Number of Twitter followers: 14,000
Follow Dave Shackleford on Twitter: @daveshackleford

About Dave Shackleford

Dave Shackleford is the founder and principal consultant of Voodoo Security, a firm that takes a high-level analytical approach to security projects. He has a deep interest in topics including malware, bots, virtualization security, intrusion detection and packet analysis, auditing and compliance, penetration testing and vulnerability assessment, honeypots, and log management.

 

Graham Cluley

Graham Cluley’s website: www.grahamcluley.com
Number of Twitter followers: 76,000
Follow Graham Cluley on Twitter: @gcluley

About Graham Cluley

Graham is an Information Security expert who’s worked for McAfee and was the Senior Technology Consultant at Sophos. He is an independent blogger, speaker, and researcher, and has given talks around the world at Microsoft Future Decoded, RSA, Infosec, Web Summit, EICAR, AVAR, ICSA, ISSA, Virus Bulletin, Ja.net, Campus Party, and the European Internet Security Forum.

 

Katie Moussouris

Katie Moussouris’ website: lutasecurity.com
Number of Twitter followers: 60,000
Follow Katie Moussouris on Twitter: @k8em0

About Katie Moussouris

Katie is a cybersecurity trailblazer. She was the creator of the first “bug bounty” programs for Microsoft and the U.S. government. Today, as the founder and CEO of Luta Security, Katie is an in-demand consultant advising companies, lawmakers, and governments on the benefits of hacking and security research to help make the internet safer for everyone.

 

Mathew Schwartz

Mathew Schwartz’s website: www.databreachtoday.com
Number of Twitter followers: 3,200
Follow Mathew Schwartz on Twitter: @euroinfosec

About Mathew Schwartz

Mathew is the Executive Editor of DataBreachToday. He has two decades of experience of writing on information security in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career.

 

Kevin Mitnick 

Kevin Mitnick’s website: www.mitnicksecurity.com
Number of Twitter followers: 222,000
Follow Kevin Mitnick on Twitter: @kevinmitnick

About Kevin Mitnick

Kevin Mitnick is the world’s most famous hacker, bestselling author, and a top cybersecurity speaker. Once one of the FBI’s Most Wanted because he hacked into 40 major corporations just for the challenge! He is now a trusted security consultant to Fortune 500 businesses and governments worldwide.

 

Dr. Ant Allan

Dr. Ant Allan’s website: www.gartner.com/analyst/17792/Ant-Allan
Number of Twitter followers: 2,500
Follow Dr. Ant Allan on Twitter: @G_ant

About Dr. Ant Allan

Dr. Ant is a Research VP in Gartner’s Identity and Access Management (IAM) team and has a particular interest in authentication technologies. He specializes in user authentication and other identity corroboration technologies, along with supporting processes, policies, and best practices.

Jeff Carpenter is Director of Identity and Access Management solutions at Crossmatch. In this role, he is responsible for evangelizing Crossmatch’s DigitalPersona® solution. In his 10+ years in cybersecurity, Jeff has held positions with a number of top tier cybersecurity and technology companies, most recently he was with RSA, a Dell Technologies company. Jeff earned a Bachelor of Science degree in Business Administration from Creighton University in Omaha, Nebraska. He holds both a Certified Information Systems Security Professional (CISSP) and a Certified Cloud Security Professional (CCSP) designation.

Authentication
Digital Transformation with Business-First, Multi-factor Authentication
Authentication
The New Security Perimeter in a Borderless Enterprise
Authentication
Podcast: Barriers to Adopting Multi-factor Authentication