12 Cybersecurity Experts You Should Be Following
Great leaders know their limitations. They have a good sense of what their own areas of expertise are and what their ...
Great leaders know their limitations. They have a good sense of what their own areas of expertise are and what their own blind spots may be.
Cybersecurity as a whole is evolving rapidly – if for no other reason than to keep up with the increasing instances and sophistication of cybercrime – and it can be hard to stay up to date.
With that in mind, here are some cybersecurity experts you should be following and listening to.
12 Cybersecurity Experts To Watch This Year
Kevin Mitnick
He bills himself as the world’s most famous hacker, a prolific cybercriminal in the early “Wild West” days of the internet. He was first breaking into networks as a teenager (his hacking into NORAD provided the inspiration for the movie WarGames), cloning cell phones and even spending a couple years on the lam as a fugitive from the FBI. Since paying his debt to society, he uses his powers for good, as a security consultant as well as a best-selling author and prolific public speaker.
Graham Cluley
In the days when computers used five-inch floppy disks, Cluley was a game designer. From there, Cluley started writing security programs, and has since established himself as a well-respected cybersecurity expert, an active author, blogger, speaker and podcaster, with a breezy yet informational style. He even has an award-winning Twitter account.
Check out this episode where he covers cybercrime “unicorns” and NFT piracy.
Jeremiah Grossman
The founder of WhiteHat Security and CEO of attack surface mapping company Bit Discovery is an established cybersecurity expert and a Brazilian Jiu-Jitsu black belt, which has led the media to describe him as “the embodiment of converged IT and physical security.”
Grossman has received awards for identifying vulnerabilities for some of the largest companies, including Microsoft, Mozilla, Google and Facebook. He’s also been featured in hundreds of media interviews and serves on several advisory boards.
Until software security adopts a culture of accountability we can only expect repeat incidents like #log4jRCE — just like we’ve seen over the last 20 years.
— Jeremiah Grossman (@jeremiahg) December 13, 2021
Bruce Schneier
For decades, Schneier has written at length about security issues, on his blog and in a monthly newsletter. He’s a cybersecurity expert, specifically in the field of cryptography (but a cryptocurrency skeptic ), having literally written the book on it. The first of his over a dozen works, Applied Cryptography, was published in 1994.
In a recent blog post, he covers the NSO Group’s use of Pegasus spyware against US State Department employees.
Shira Rubinoff
As president of technology incubator Prime Tech Partners and social media security firm SecureMySocial, Rubinoff shares her expertise on a variety of topics, including artificial intelligence, blockchain, business development, cybersecurity and organizational dynamics. She is the author of Cyber Minds, a strategic briefing on the emerging cybersecurity threats facing our companies, governments and militaries, and has been named a Woman of Influence by CSO Magazine.
Thrilled to have my book CYBER MINDS listed as a top book to read in 2021! TY @thinkers360! Great interviews incl ones with @TAKellermann @ajohnsocyber @mclynd @JosephSteinberg @Kevin_Jackson @sallyeaves... #CyberSecurity #blockchain #ai #iot 👇👇👇👇👇👇🛑https://t.co/wGLIRIVtRO pic.twitter.com/aXg0W74Jpu
— Shira Rubinoff (@Shirastweet) January 25, 2021
Paul Asadoorian
In addition to his work as a researcher and analyst for a variety of cybersecurity companies, Asadoorian is the founder of Security Weekly, a network of podcasts featuring himself and other cybersecurity experts, talking about data protection and encryption. (He’s also a cigar fan, podcasting about them at stogiegeeks.) As CEO of Offensive Countermeasures, he doesn’t just analyze security systems, he helps test them. In a recent video, he talks about how Internet of Things devices, such as printers, medical devices, impacts enterprise security.
Reed Taussig
Hired at the end of 2020 as the CEO of RSA’s Anti-Fraud Business Unit (spun off in Summer 2021 as Outseer), Taussig brings a wealth of experience in cybersecurity. He’s the founder and CEO of Threatmetrix, a company that helped establish and safeguard digital identity, and in his current role, he’s continuing that work, identifying and guarding against potential online fraud.
Gabriel Gumbs
As chief product officer for Myota, Gumbs is tasked with staying one step ahead of hackers and cybercriminals. A technologist at heart, he’s on the forefront of digital innovation, with an eye toward the potential the future brings. Prior to Myota, he worked for Spirion, White Hat Security and Pfizer. He’s also the host of the Privacy Please podcast with Cameron Ivey, which features best practices, interviews, and real stories about data privacy with plenty of laughter along the way.
Greg Day
A regular contributor to RSA’s annual conference, Day is the vice president and chief security officer for Palo Alto Group in Europe, the Middle East and Asia. Prior to Palo Alto, Day spent 13 years at McAfee, and worked in cybersecurity before it was even identified as its own industry. He maintains an active presence on social media, outlining best practices and the latest issues facing businesses at large.
It's so easy to focus on the new digital challenges, adding into your cyber security strategy, but when did you stop, to look at how you could consolidate the legacy to free up resources to do more exciting new things?#cybersecur…https://t.co/BEKWUKEaT8 https://t.co/TWnlb7iEO7
— Greg Day (@GregDaySecurity) October 21, 2021
Jordan Rae Kelly
Formerly the chief of staff of the FBI’s cyber division and the director for cyber incident response for the National Security Council, where she helped author the national cyber strategy, Kelly is now the senior managing director of cybersecurity for FTI Consulting, advising clients on responses to breaches and ways to protect and secure data.
‘A proud day for the good guys’ - Former FBI chief Jordan Rae Kelly tells @jonsnowC4 how intelligence services secretly set-up an encrypted app to ensnare hundreds of criminals across the globe. https://t.co/jEi6UQtJJO
— Channel 4 News (@Channel4News) June 8, 2021
Joseph Steinberg
Steinberg writes on a variety of topics, including ransomware attacks and the intersection of artificial intelligence and cybersecurity. He’s also the founder of Secure My Social, a company dedicated to keeping people’s social media accounts safe and secure. In addition to speaking engagements and book and article writing, Steinberg also serves as a cybersecurity expert witness.
Happy to announce that in 2022 I will continue to serve as a member of the Newsweek Expert Forum...https://t.co/wkfXD8TM3a #CyberSecurity #InfoSec #Tech #ArtificialIntelligence #USA #Security #Privacy #ExpertWitness #TechNews #Seguridad #Ransomware #Hacking #AI #News #Magazine
— Joseph Steinberg (@JosephSteinberg) January 4, 2022
Brian Krebs
An investigative journalist, Krebs has an origin story that rivals any Marvel superhero, actually getting interested in cybersecurity after being locked out of his own computer. He worked for the Washington Post, investigating Eastern European cyber crime to the point where he got swatted. After his position at the Post was eliminated, Krebs went independent. His website, Krebs on Security, contains useful information, and updates on the latest developments in cyber crime.
Prosecutors with the REACT task force, which specializes in prosecuting SIM swapping & training law enforcement to do so, said SIM swappers have largely moved on from targeting "fat cat" early crypto investors to middle-income investors who are financially devastated when hit. pic.twitter.com/KTVSyudkF2
— briankrebs (@briankrebs) December 16, 2021
Stay Up To Date With The Latest Cybersecurity Trends
At a time when cybersecurity is moving at a breakneck pace just to keep up with the widespread, almost inevitable threat of ransomware, Myota can help you stay up to date on the latest developments.
Subscribe to our blog to find out the latest cybersecurity trends, technologies and use cases.