Top 10 Network Security experts to follow
Brian Krebs: Formerly with The Washington Post, Krebs now operates the widely respected blog, “Krebs on Security.” He’s renowned for his in-depth analysis and reporting on cyber threats and incidents affecting industries globally.
Mikko Hyppönen: As Chief Research Officer for F-Secure, Hyppönen has made a name for himself by tracking down multiple cyber threats. With over 25 years of experience, his insights into malware and cyber espionage are unmatched.
Tarah Wheeler: Wheeler is a Cybersecurity Policy Fellow at New America. She’s authored “Women in Tech,” shedding light on the challenges faced by women in cybersecurity and offers insights into contemporary network security issues.
Dr. Eric Cole: With a Ph.D. in information technology, Dr. Cole has worked with various organizations, including the CIA, on cybersecurity matters. He’s known for his books on network security and his teachings at SANS.
Bruce Schneier: Often referred to as a “security guru,” Schneier’s expertise lies in cryptography. His blog and books, especially “Data and Goliath,” address the complexities of security and privacy in today’s interconnected era.
Laura Chappell: As the founder of Chappell University, she is one of the top Wireshark experts globally, offering insights into network protocols and security issues using this tool. Chappell’s teachings are fundamental for anyone looking into deep packet analysis.
Joxean Koret: A cybersecurity researcher, Koret’s focus on anti-virus solutions and their potential vulnerabilities offers a unique perspective on network threats. He’s known for demonstrating gaps in many mainstream security products.
Dan Kaminsky: Renowned for discovering fundamental flaws in the internet’s design, Kaminsky’s work has been instrumental in reshaping DNS security standards. His security insights have a profound influence on the broader tech community.
Katie Moussouris: The founder and CEO of Luta Security, Moussouris has been instrumental in developing vulnerability coordination, notably helping the U.S. Department of Defense start the “Hack the Pentagon” initiative.
Charlie Miller: Best known for his pioneering work in finding vulnerabilities in Apple products, Miller has an esteemed career, from hacking iPhones to compromising a Jeep Cherokee. His work highlights the evolving nature of network threats.