Top 10 Network Security experts to follow

Brian Krebs: Formerly with The Washington Post, Krebs now operates the widely respected blog, “Krebs on .” He’s renowned for in-depth analysis and reporting on cyber threats and incidents affecting industries globally.

Mikko Hyppönen: As Chief Officer for F-Secure, Hyppönen has made a name for himself by tracking down multiple cyber threats. With 25 years of experience, his insights into malware and cyber espionage are unmatched.

Tarah Wheeler: Wheeler is a Cybersecurity Policy Fellow at New America. She’s authored “Women in Tech,” shedding light on the challenges faced by women in cybersecurity and offers insights into contemporary network security issues.

Dr. Eric Cole: With a Ph.D. in information technology, Dr. Cole has worked with various organizations, including the CIA, on cybersecurity matters. He’s known for his books on network security and his teachings at SANS.

Bruce Schneier: Often referred to as a “security guru,” Schneier’s expertise lies in cryptography. His blog and especially “Data and Goliath,” address the complexities of security and privacy in today’s interconnected era.

Laura Chappell: As the of Chappell University, she is of the top Wireshark experts globally, offering insights into network protocols and security issues using this tool. Chappell’s teachings are fundamental for anyone looking into deep packet analysis.

Joxean Koret: A cybersecurity researcher, Koret’s focus on anti-virus solutions and their potential vulnerabilities offers a perspective on network threats. He’s known for demonstrating gaps in many mainstream security products.

Dan Kaminsky: Renowned for discovering fundamental flaws in the internet’s design, Kaminsky’s work has been instrumental in reshaping DNS security standards. His security insights have a profound influence on the broader tech community.

Katie Moussouris: The founder and CEO of Luta Security, Moussouris has been instrumental in developing vulnerability coordination, notably helping the U.S. Department of Defense start the “Hack the Pentagon” initiative.

Charlie Miller: Best known for his pioneering work in vulnerabilities in Apple products, Miller has an esteemed career, hacking iPhones to compromising a Jeep Cherokee. His work highlights the evolving nature of network threats.

Top 10 Zero Trust Security experts to follow

John Kindervag: The originator of the Zero Trust model, Kindervag’s during time at Forrester Research has laid the foundation for the concept, emphasizing “never trust, always verify.”

Dr. Chase Cunningham: An influential figure in cybersecurity, Cunningham has extended his expertise at Forrester Research, delving deeper into Zero Trust and its across enterprises.

Wendy Nather: As the head of Advisory CISOs at Duo Security (part of Cisco), Nather’s work focuses on democratizing security, emphasizing the accessibility and feasibility of the Zero Trust model for organizations of all sizes.

Palo Alto Networks Team: As pioneers in next-generation firewalls, their vision and have continually aligned with Zero Trust security principles, reinforcing a boundary-less security approach.

Alex Weinert: Director of Security at Microsoft, Weinert’s insights on identity and access management are fundamental in the Zero Trust ecosystem, stressing on the importance of robust authentication mechanisms.

Diana Kelley: As Cybersecurity Field CTO for Microsoft, Kelley regularly delves into the intersections of Zero Trust with other cybersecurity models and its implications for the modern enterprise.

Pitt: As the CIO of LogMeIn, Pitt emphasizes the role of Zero Trust in remote work, particularly relevant in the backdrop of increasing work-from-home scenarios.

Steve Martino: Cisco’s CISO and a proponent of Zero Trust, Martino’s real-world implementations offer insights into the challenges and solutions when deploying Zero Trust architectures in large enterprises.

Akamai Technologies Team: As global content delivery network (CDN) providers, their emphasis on Zero Trust principles, especially for web security and , is shaping enterprise-level implementations.

Dr. Eric Cole: A recognized figure in the cybersecurity realm, Cole’s research and training programs often incorporate and reinforce Zero Trust principles for organizational security.

You are enjoying this content on Ian Khan's Blog. Ian Khan, AI Futurist and technology Expert, has been featured on CNN, Fox, BBC, Bloomberg, Forbes, Fast Company and many other global platforms. Ian is the author of the upcoming AI book "Quick Guide to Prompt Engineering," an explainer to how to get started with GenerativeAI Platforms, including ChatGPT and use them in your business. One of the most prominent Artificial Intelligence and emerging technology educators today, Ian, is on a mission of helping understand how to lead in the era of AI. Khan works with Top Tier organizations, associations, governments, think tanks and private and public sector entities to help with future leadership. Ian also created the Future Readiness Score, a KPI that is used to measure how future-ready your organization is. Subscribe to Ians Top Trends Newsletter Here