{"id":20186,"date":"2023-04-03T11:30:00","date_gmt":"2023-04-03T11:30:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=20186"},"modified":"2024-01-12T19:43:43","modified_gmt":"2024-01-12T19:43:43","slug":"twitter-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/","title":{"rendered":"Top 25 Cybersecurity Experts &amp; Accounts to Follow on Twitter"},"content":{"rendered":"\r\n<p>\u200b\u200b\u200b\u200b\u200b\u200b\u200b\u200bMore than 15 years after the launch of the microblogging social media platform, Twitter remains a dominant public forum for instant communication with individuals and organizations worldwide on a universe of topics, including cybersecurity.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-20198\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/12\/ESP-and-Twitter-1024x299.png\" alt=\"A graphic image showing the eSecurityPlanet logo and the Twitter logo as this article features the top cybersecurity accounts to follow on the major social platform.\" width=\"433\" height=\"127\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/ESP-and-Twitter-1024x299.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/ESP-and-Twitter-300x88.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/ESP-and-Twitter-768x224.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/ESP-and-Twitter-1536x449.png 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/ESP-and-Twitter-2048x598.png 2048w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/ESP-and-Twitter-150x44.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/ESP-and-Twitter-696x203.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/ESP-and-Twitter-1068x312.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/ESP-and-Twitter-1920x561.png 1920w\" sizes=\"(max-width: 433px) 100vw, 433px\" \/><\/figure>\r\n\r\n\r\n\r\n<p>Here are the top Twitter accounts to follow for the latest commentary, research, and much-needed humor in the ever-evolving information security space &#8211; followed by five accounts on the increasingly active Mastodon security community. Our review considered experience in enterprise cybersecurity, contributions to research and real-time developments, and Twitter-specific metrics like following and activity frequency.<\/p>\r\n<p><strong><em>See our picks for the <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-cybersecurity-companies\/\">top cybersecurity companies<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/products\/hot-cybersecurity-startups\/\">startups<\/a><\/em><\/strong><\/p>\r\n\r\n\r\n\r\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_68_1 ez-toc-wrap-left counter-flat ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-66d6fa28df616\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ffffff;color:#ffffff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ffffff;color:#ffffff\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-66d6fa28df616\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#Aleksandra-Doniec\" title=\"Aleksandra Doniec\">Aleksandra Doniec<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#Binni-Shah\" title=\"Binni Shah\">Binni Shah<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#Bruce-Schneier\" title=\"Bruce Schneier\">Bruce Schneier<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#Dave-Kennedy\" title=\"Dave Kennedy\">Dave Kennedy<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#Eugene-Kaspersky\" title=\"Eugene Kaspersky\">Eugene Kaspersky<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#Eva-Galperin\" title=\"Eva Galperin\">Eva Galperin<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#Graham-Cluley\" title=\"Graham Cluley\">Graham Cluley<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#Jason-Haddix\" title=\"Jason Haddix\">Jason Haddix<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#Jeremiah-Grossman\" title=\"Jeremiah Grossman\">Jeremiah Grossman<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#Marcus-J-Carey\" title=\"Marcus J. Carey\">Marcus J. Carey<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#Maria-Markstedter\" title=\"Maria Markstedter\">Maria Markstedter<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#Matthew-Green\" title=\"Matthew Green\">Matthew Green<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#Katie-Moussouris\" title=\"Katie Moussouris\">Katie Moussouris<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#Kevin-Mitnick\" title=\"Kevin Mitnick\">Kevin Mitnick<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#Mikko-Hypponen\" title=\"Mikko Hypp\u00f6nen\">Mikko Hypp\u00f6nen<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#Paul-Asadoorian\" title=\"Paul Asadoorian\">Paul Asadoorian<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#Parisa-Tabriz\" title=\"Parisa Tabriz\">Parisa Tabriz<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#Rachel-Tobac\" title=\"Rachel Tobac\">Rachel Tobac<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#Robert-M-Lee\" title=\"Robert M. Lee\">Robert M. Lee<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#Runa-Sandvik\" title=\"Runa Sandvik\">Runa Sandvik<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#Samy-Kamkar\" title=\"Samy Kamkar\">Samy Kamkar<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#SwiftOnSecurity\" title=\"SwiftOnSecurity\">SwiftOnSecurity<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#Tavis-Ormandy\" title=\"Tavis Ormandy\">Tavis Ormandy<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#Thaddeus-Grugq\" title=\"Thaddeus Grugq\">Thaddeus Grugq<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#Troy-Hunt\" title=\"Troy Hunt\">Troy Hunt<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-26\" href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#Accounts-to-follow-on-Mastodon\" title=\"Accounts to follow on Mastodon\">Accounts to follow on Mastodon<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Aleksandra-Doniec\"><\/span>Aleksandra Doniec<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p><em>@hasherezade<\/em><br \/>One of Europe\u2019s top <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\" target=\"_blank\" rel=\"noreferrer noopener\">malware<\/a> analysts thanks to her work for places like Malwarebytes, Aleksandra Doniec has provided a number of in-depth <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">ransomware<\/a> analyses and security tools throughout her career. Her contributions were significant enough to have her included in Forbes\u2019 2018 <a href=\"https:\/\/www.forbes.com\/30-under-30-europe\/2018\/technology\/#14a75bf4c04b\" target=\"_blank\" rel=\"noreferrer noopener\">\u201c30 Under 30 Europe\u201d<\/a> in the Technology category. Her private account offers a host of cybersecurity insights, particularly related to malware and ransomware, along with personal tweets. Her <a href=\"https:\/\/hasherezade.github.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">website<\/a> also provides links to some of the useful cybersecurity tools and scripts she has created over the years, many of them open source.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\">\r\n<div class=\"wp-block-embed__wrapper\">https:\/\/twitter.com\/hasherezade\/status\/1637614885621096449<\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Binni-Shah\"><\/span>Binni Shah<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p><em>@binitamshah<\/em><br \/>Security enthusiast and <a href=\"https:\/\/www.esecurityplanet.com\/threats\/lemonduck-malware-linux-microsoft\/\" target=\"_blank\" rel=\"noreferrer noopener\">Linux<\/a> evangelist Binni Shah consistently offers valuable tutorials, guides, and insights for the cybersecurity community. Shah provides her expertise in hacking, software development, and kernel development and advocates for open source initiatives. This is an account to watch for developers working in Linux environments.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\">\r\n<div class=\"wp-block-embed__wrapper\">https:\/\/twitter.com\/binitamshah\/status\/1638197681108418565<\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Bruce-Schneier\"><\/span>Bruce Schneier<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p><em>@schneierblog<\/em><br \/>Security technologist Bruce Schneier was respected long before the launch of Twitter. His 1994 book detailing<a href=\"https:\/\/www.esecurityplanet.com\/products\/best-encryption-software\/\" target=\"_blank\" rel=\"noreferrer noopener\"> cryptographic<\/a> algorithms (<em>Applied Cryptography<\/em>) was just the beginning of his contributions to technical perspectives on system design, cybersecurity, privacy, and more. His Twitter updates are short, newsy, and to the point. They include links to his blog posts, which expand on the mentioned topic.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\">\r\n<div class=\"wp-block-embed__wrapper\">https:\/\/twitter.com\/schneierblog\/status\/1633445222624681985<\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Dave-Kennedy\"><\/span>Dave Kennedy<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p><em>@HackingDave<\/em><br \/>Dave Kennedy started as a <a href=\"https:\/\/www.esecurityplanet.com\/products\/digital-forensics-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">forensic analysis<\/a> and cyber warfare specialist in the US Marine Corps before entering the enterprise space. Kennedy founded cybersecurity-focused TrustedSec and Binary Defense Systems and co-authored Metasploit: The Penetration Tester\u2019s Guide. He retweets multiple experts&#8217; posts on different security topics and also participates in industry conversations and events.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\">\r\n<div class=\"wp-block-embed__wrapper\">https:\/\/twitter.com\/HackingDave\/status\/1635990706366889985<\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Eugene-Kaspersky\"><\/span>Eugene Kaspersky<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p><em>@e_kaspersky<\/em><br \/>Russian software engineer Eugene Kaspersky\u2019s frustration with the malware of the 80s and 90s led to the founding of antivirus and cybersecurity vendor <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/kaspersky-vs-symantec-endpoint-security-platforms-compared\/\" target=\"_blank\" rel=\"noreferrer noopener\">Kaspersky Lab<\/a>. Kaspersky currently serves as CEO and a distinguished cybersecurity expert in the international community. He discusses both consumer and business security on his Twitter feed and covers a wide variety of cybersecurity topics.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\">\r\n<div class=\"wp-block-embed__wrapper\">https:\/\/twitter.com\/e_kaspersky\/status\/1620317049376411649<\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Eva-Galperin\"><\/span>Eva Galperin<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p><em>@evacide<\/em><br \/>Starting with her first desktop on a Unix machine at age 12, Eva Galperin\u2019s contributions to cybersecurity include research on malware and privacy. Galperin is the current Director of Cybersecurity at the Electronic Frontier Foundation (EFF) and noted free speech advocate.\u00a0Note that Galperin&#8217;s current Twitter discussions now center more around politics rather than cybersecurity.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\">\r\n<div class=\"wp-block-embed__wrapper\">https:\/\/twitter.com\/evacide\/status\/1629204223165620224<\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Graham-Cluley\"><\/span>Graham Cluley<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p><em>@gcluley<\/em><br \/>Graham Cluley started as a videogame developer and <a href=\"https:\/\/www.esecurityplanet.com\/products\/antivirus-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">antivirus<\/a> programmer three decades ago before serving in senior roles at <a href=\"https:\/\/www.esecurityplanet.com\/products\/sophos-xg-firewall-utm\/\" target=\"_blank\" rel=\"noreferrer noopener\">Sophos<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/products\/mcafee-data-center-security-suite\/\" target=\"_blank\" rel=\"noreferrer noopener\">McAfee<\/a>. In recent years, Cluley has been well-known for his cybersecurity analysis, blog, and award-winning podcast Smashing Security. The podcast takes a lighter approach to major cybersecurity topics, for those who want a more humorous look at the industry.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\">\r\n<div class=\"wp-block-embed__wrapper\">https:\/\/twitter.com\/gcluley\/status\/1638869551772319744<\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Jason-Haddix\"><\/span>Jason Haddix<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p><em>@Jhaddix<\/em><br \/>Through tenures at Citrix, HP, and Bugcrowd, Jason Haddix offers his expertise in the areas of <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-penetration-testing\/\" target=\"_blank\" rel=\"noreferrer noopener\">penetration testing<\/a>, web application testing, static analysis, and more. Haddix continues to provide his insights on Twitter while occasionally appearing on podcasts. Consider following Haddix if you want to learn more about security testing news and trends.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\">\r\n<div class=\"wp-block-embed__wrapper\">https:\/\/twitter.com\/Jhaddix\/status\/1514933567159033858<\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Jeremiah-Grossman\"><\/span>Jeremiah Grossman<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p><em>@jeremiahg<br \/><\/em>With deep industry experience, Jeremiah Grossman was the Information Security Officer for Yahoo!, founder and CTO of WhiteHat Security, and Chief of Security Strategy for <a href=\"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/\" target=\"_blank\" rel=\"noreferrer noopener\">SentinelOne<\/a>. Grossman is an innovative industry leader. He currently works in security strategy at Tenable. Grossman&#8217;s tweets are short and straightforward, covering both enterprise tips and nationwide security news.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\">\r\n<div class=\"wp-block-embed__wrapper\">https:\/\/twitter.com\/jeremiahg\/status\/1599932128875417600<\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Marcus-J-Carey\"><\/span>Marcus J. Carey<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p><em>@marcusjcarey<\/em><br \/>Marcus J. Carey started his cybersecurity career assisting federal agencies with pen testing, incident response, and<a href=\"https:\/\/www.esecurityplanet.com\/products\/digital-forensics-software\/\" target=\"_blank\" rel=\"noreferrer noopener\"> digital forensics<\/a>. Two decades later, the information security expert is a distinguished author (Tribe of Hackers), entrepreneur, and speaker. Occasionally he posts security career information for those in the job field.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\">\r\n<div class=\"wp-block-embed__wrapper\">https:\/\/twitter.com\/marcusjcarey\/status\/1606018667879272450<\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Maria-Markstedter\"><\/span>Maria Markstedter<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p><em>@Fox0x01<\/em><br \/>As <a href=\"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/\" target=\"_blank\" rel=\"noreferrer noopener\">managing vulnerabilities<\/a> in embedded systems become increasingly crucial to cybersecurity, Maria Markstedter offers her expertise as an independent security researcher and founder of Azeria Labs. Markstedter actively contributes to filling the infosec education gap.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\">\r\n<div class=\"wp-block-embed__wrapper\">https:\/\/twitter.com\/Fox0x01\/status\/1576907613387706368<\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Matthew-Green\"><\/span>Matthew Green<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p><em>@matthew_d_green<br \/><\/em>Matthew Green is a renowned expert in cryptographic engineering. Green\u2019s contributions to applied cryptography are profound, and his other research includes <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/data-storage-security-best-practices-for-security-teams\/\" target=\"_blank\" rel=\"noreferrer noopener\">securing storage<\/a> and payment systems. He is currently an Associate Professor at John Hopkins University.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\">\r\n<div class=\"wp-block-embed__wrapper\">https:\/\/twitter.com\/matthew_d_green\/status\/1637035201535590404<\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Katie-Moussouris\"><\/span>Katie Moussouris<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p><em>@k8em0<\/em><br \/>Katie Moussouris\u2019 resume includes studying at MIT and Harvard, enterprise experience at <a href=\"https:\/\/www.esecurityplanet.com\/products\/symantec-endpoint-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">Symantec<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft<\/a>, and years of promoting <a href=\"https:\/\/www.esecurityplanet.com\/applications\/bug-bounty-program-guide\/\" target=\"_blank\" rel=\"noreferrer noopener\">bug bounty programs<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/\" target=\"_blank\" rel=\"noreferrer noopener\">white hat hacking<\/a>. Today, Moussouris is the founder and CEO of cybersecurity consultancy Luta Security.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\">\r\n<div class=\"wp-block-embed__wrapper\">https:\/\/twitter.com\/k8em0\/status\/1637465815711891458<\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<p><strong>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\" target=\"_blank\" rel=\"noreferrer noopener\">Top Next-Generation Firewall (NGFW) Vendors<\/a><\/strong><\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Kevin-Mitnick\"><\/span>Kevin Mitnick<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p><em>@kevinmitnick<\/em><br \/>Formerly on the FBI\u2019s <em>Most Wanted<\/em> list, Kevin Mitnick is a crucial figure in the history of information security, including approaches to social engineering and penetration testing. Today, Mitnick operates his consultancy and serves as Chief Hacking Officer for <a href=\"https:\/\/www.esecurityplanet.com\/products\/cybersecurity-training\/\" target=\"_blank\" rel=\"noreferrer noopener\">KnowBe4<\/a>. He also participates in educational sessions hosted by other major tech companies, covering cybersecurity topics.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\">\r\n<div class=\"wp-block-embed__wrapper\">https:\/\/twitter.com\/kevinmitnick\/status\/1525111447654924290<\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Mikko-Hypponen\"><\/span>Mikko Hypp\u00f6nen<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p><em>@mikko<\/em><br \/>Mikko Hypp\u00f6nen is the veteran chief research officer of Finish cybersecurity company <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-mdr-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">WithSecure<\/a>. After three decades of experience analyzing and following the latest security threats, Hypp\u00f6nen continues to offer his perspective on privacy, cybersecurity, and so-called \u201csmart\u201d devices.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\">\r\n<div class=\"wp-block-embed__wrapper\">https:\/\/twitter.com\/mikko\/status\/1636749889211101184<\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Paul-Asadoorian\"><\/span>Paul Asadoorian<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p><em>@securityweekly<\/em><br \/>Once a penetration tester, Paul Asadoorian has been the founder and CEO of Security Weekly and host of a weekly show since 2005. Asadoorian has built a cybersecurity media force while also serving as a partner for Offensive Countermeasures. He is currently a security evangelist at Eclypsium.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\">\r\n<div class=\"wp-block-embed__wrapper\">https:\/\/twitter.com\/securityweekly\/status\/1638192695674896386<\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Parisa-Tabriz\"><\/span>Parisa Tabriz<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p><em>@laparisa<\/em><br \/>Google\u2019s Security Princess is Parisa Tabriz, one of the technology giant\u2019s most esteemed hackers. Tabriz has led Google Chrome\u2019s security since 2013, which extends to managing product, engineering, and UX today. Tabriz is a tireless advocate for <a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-to-hire-an-ethical-hacker\/\" target=\"_blank\" rel=\"noreferrer noopener\">ethical hacking<\/a>.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\">\r\n<div class=\"wp-block-embed__wrapper\">https:\/\/twitter.com\/laparisa\/status\/1578475355765059584<\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Rachel-Tobac\"><\/span>Rachel Tobac<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p><em>@RachelTobac<\/em><br \/>Three-time winner of DEF CON\u2019s Social Engineering Capture the Flag Contest, Rachel Tobac is a hacker and CEO of SocialProof Security. Tobac\u2019s expertise in <a href=\"https:\/\/www.esecurityplanet.com\/threats\/social-engineering-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">social engineering<\/a> and spreading awareness provides excellent insight into today\u2019s sophisticated threats.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\">\r\n<div class=\"wp-block-embed__wrapper\">https:\/\/twitter.com\/RachelTobac\/status\/1636481960221765632<\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Robert-M-Lee\"><\/span>Robert M. Lee<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p><em>@RobertMLee<\/em><br \/>Dragos founder and CEO Robert M. Lee started his career as a Cyber Warfare Operations Officer for the U.S. Air Force before building the SANS Institute\u2019s first dedicated ICS monitoring courses. Lee continues to be a leading voice in the <a href=\"https:\/\/www.esecurityplanet.com\/trends\/colonial-pipeline-ransomware-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">critical infrastructure<\/a> cybersecurity space.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\">\r\n<div class=\"wp-block-embed__wrapper\">https:\/\/twitter.com\/RobertMLee\/status\/1593337606518951936<\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Runa-Sandvik\"><\/span>Runa Sandvik<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p><em>@Runasand<\/em><br \/>Runa Sandvik was a hacker and early developer of the Tor network before her rise to senior director of information security for the <em>New York Times<\/em>. Today Sandvik is an independent researcher and consultant and advocate for strengthening freedom of the press and privacy. Her Twitter feed often addresses international security news.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\">\r\n<div class=\"wp-block-embed__wrapper\">https:\/\/twitter.com\/runasand\/status\/1628000824495419398<\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Samy-Kamkar\"><\/span>Samy Kamkar<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p><em>@Samykamkar<\/em><br \/>Hacker, researcher, and entrepreneur Samy Kamkar launched a unified communications company as a teen before setting off an <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/prevent-xss-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">XSS attack<\/a> against MySpace. Lesson learned, Kamkar continues to test security integrity years later as co-founder and CSO of Openpath Security.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\">\r\n<div class=\"wp-block-embed__wrapper\">https:\/\/twitter.com\/samykamkar\/status\/1354102556461436928<\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"SwiftOnSecurity\"><\/span>SwiftOnSecurity<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p><em>@SwiftOnSecurity<\/em><br \/>The pseudonymous information security expert known as SwiftOnSecurity is a prominent voice in the universe of cybersecurity. They continually offer a balanced dose of genuine insight into systems and security with the funniest and hardest-hitting memes for SysAdmin.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\">\r\n<div class=\"wp-block-embed__wrapper\">https:\/\/twitter.com\/SwiftOnSecurity\/status\/1286855769732845568<\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Tavis-Ormandy\"><\/span>Tavis Ormandy<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p><em>@taviso<\/em><br \/>Tavis Ormandy is an ethical hacker and an information security engineer for Google Project Zero. Ormandy\u2019s expertise includes <a href=\"https:\/\/www.esecurityplanet.com\/threats\/threat-hunting\/\" target=\"_blank\" rel=\"noreferrer noopener\">vulnerability hunting<\/a>, research, and software development with a bundle of GitHub contributions and published research. His tweets often discuss older technology or ask interactive questions of other experts.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\">\r\n<div class=\"wp-block-embed__wrapper\">https:\/\/twitter.com\/taviso\/status\/1581682151531028480<\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Thaddeus-Grugq\"><\/span>Thaddeus Grugq<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p><em>@thegrugq<\/em><br \/>Commonly known as just the Grugq, Thaddeus Grugq is a security researcher and hacker known for publications and commentary regarding forensic analysis, international espionage, and cybersecurity. In recent years, Grugq has talked openly about high-end exploit brokering.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\">\r\n<div class=\"wp-block-embed__wrapper\">https:\/\/twitter.com\/thegrugq\/status\/839471981120495616<\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Troy-Hunt\"><\/span>Troy Hunt<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p><em>@troyhunt<\/em><br \/>Troy Hunt is an Australian web security consultant and perhaps best known for his project Have I Been Pwned (HIBP), which helps users confirm if their data was compromised due to a breach. After 14 years of enterprise experience at Pfizer, Hunt offers his expertise in a weekly vlog. He&#8217;s also written infosec courses for Pluralsight.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\">\r\n<div class=\"wp-block-embed__wrapper\">https:\/\/twitter.com\/troyhunt\/status\/1636225195919970305<\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<h2><span class=\"ez-toc-section\" id=\"Accounts-to-follow-on-Mastodon\"><\/span>Accounts to follow on Mastodon<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p>Some popular security leaders have shifted their focus to Mastodon, an open source social media platform, in the wake of recent turmoil at Twitter. Mastodon&#8217;s infosec.exchange platform is specifically geared toward the security industry. Check out these accounts if you prefer not to use Twitter.<\/p>\r\n<h3>Brian Krebs<\/h3>\r\n<p><a href=\"https:\/\/infosec.exchange\/@briankrebs\" target=\"_blank\" rel=\"noopener\">Brian Krebs<\/a> still has a Twitter account (@krebsonsecurity), but he posts more regularly about security on Mastodon. He is known for his strong background in journalism, writing often about cybercrime.<\/p>\r\n<h3>Marcus Hutchins<\/h3>\r\n<p><a href=\"https:\/\/infosec.exchange\/@malwaretech\" target=\"_blank\" rel=\"noopener\">Marcus Hutchins<\/a> is a security researcher. He frequently posts about artificial intelligence, Twitter, and politics on his Mastodon feed.<\/p>\r\n<h3>Jake Williams<\/h3>\r\n<p><a href=\"https:\/\/infosec.exchange\/@malwarejake\" target=\"_blank\" rel=\"noopener\">Jake Williams<\/a> is a security researcher and IANS faculty member. He posts about a variety of international security topics, and also maintains a presence on Twitter.<\/p>\r\n<h3>Kevin Beaumont<\/h3>\r\n<p><a href=\"https:\/\/cyberplace.social\/@GossiTheDog\" target=\"_blank\" rel=\"noopener\">Kevin Beaumont<\/a> is a head of security operations in the United Kingdom. He has over 20 years of experience in the cybersecurity industry and also has a security-focused website, <a href=\"https:\/\/doublepulsar.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">doublepulsar.com<\/span><\/a>.<\/p>\r\n<h3>Lesley Carhart<\/h3>\r\n<p>IT industry veteran and former Hacker of the Year <a href=\"https:\/\/infosec.exchange\/@hacks4pancakes\" target=\"_blank\" rel=\"noopener\">Lesley Carhart<\/a> is another security researcher who has made the move to Mastodon. She consistently contributes to research and dialogue around <a href=\"https:\/\/www.esecurityplanet.com\/networks\/best-incident-response-tools-services\/\" target=\"_blank\" rel=\"noreferrer noopener\">incident response<\/a>, digital forensics, <a href=\"https:\/\/www.esecurityplanet.com\/networks\/critical-infrastructure-protection-physical-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">industrial control system<\/a> security, and more. Carhart is currently the Director of Incident Response at Dragos.<\/p>\r\n<p><strong>To learn more about security, read about our picks for the <a href=\"https:\/\/www.esecurityplanet.com\/trends\/top-cybersecurity-podcasts\/\" target=\"_blank\" rel=\"noreferrer noopener\">best cybersecurity podcasts<\/a>.<\/strong><\/p>\r\n<p><em><a href=\"https:\/\/www.esecurityplanet.com\/author\/jphipps\/\">Jenna Phipps<\/a> updated this article on April 3, 2023.<\/em><\/p>\r\n\n\n<div id=\"ta-campaign-widget-66d6fa28dc597-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6fa28dc597\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6fa28dc597\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6fa28dc597\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6fa28dc597\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6fa28dc597\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6fa28dc597\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Keep up with the latest cybersecurity news and trends. Check out our list of the top cybersecurity Twitter accounts to follow now.<\/p>\n","protected":false},"author":250,"featured_media":20190,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[16],"tags":[1923,3790],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[143,375,376,519,496,68,379,513,148],"class_list":["post-20186","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trends","tag-collaboration","tag-cybersecurity","b2b_audience-awareness-and-consideration","b2b_product-security","b2b_product-security-management","b2b_product-security-services","b2b_product-security-training-certifications","b2b_product-social-media","b2b_product-staffing-training-and-certifications","b2b_product-threats-and-vulnerabilities","b2b_product-training-and-certification-events","b2b_product-web"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Top 25 Cybersecurity Experts &amp; Accounts to Follow on Twitter<\/title>\n<meta name=\"description\" content=\"Keep up with the latest cybersecurity news and trends. Check out our list of the top cybersecurity Twitter accounts to follow now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 25 Cybersecurity Experts &amp; Accounts to Follow on Twitter\" \/>\n<meta property=\"og:description\" content=\"Keep up with the latest cybersecurity news and trends. Check out our list of the top cybersecurity Twitter accounts to follow now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-03T11:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-12T19:43:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/ESP.CybersecurityTwitter-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sam Ingalls\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/SamIngalls\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sam Ingalls\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/\"},\"author\":{\"name\":\"Sam Ingalls\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2\"},\"headline\":\"Top 25 Cybersecurity Experts &amp; Accounts to Follow on Twitter\",\"datePublished\":\"2023-04-03T11:30:00+00:00\",\"dateModified\":\"2024-01-12T19:43:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/\"},\"wordCount\":1793,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/ESP.CybersecurityTwitter-scaled.jpg\",\"keywords\":[\"collaboration\",\"cybersecurity\"],\"articleSection\":[\"Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/\",\"name\":\"Top 25 Cybersecurity Experts & Accounts to Follow on Twitter\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/ESP.CybersecurityTwitter-scaled.jpg\",\"datePublished\":\"2023-04-03T11:30:00+00:00\",\"dateModified\":\"2024-01-12T19:43:43+00:00\",\"description\":\"Keep up with the latest cybersecurity news and trends. Check out our list of the top cybersecurity Twitter accounts to follow now.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/ESP.CybersecurityTwitter-scaled.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/ESP.CybersecurityTwitter-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"A picture of two friends sharing contact details on their phones as this article is about the Top Twitter accounts to follow for cybersecurity expertise, news, and the latest commentary.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 25 Cybersecurity Experts &amp; Accounts to Follow on Twitter\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2\",\"name\":\"Sam Ingalls\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg\",\"caption\":\"Sam Ingalls\"},\"description\":\"Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, Tech Republic, ServerWatch, Webopedia, and Channel Insider.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/singalls\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/SamIngalls\"],\"url\":\"https:\/\/www.esecurityplanet.com\/author\/singalls\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 25 Cybersecurity Experts & Accounts to Follow on Twitter","description":"Keep up with the latest cybersecurity news and trends. Check out our list of the top cybersecurity Twitter accounts to follow now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Top 25 Cybersecurity Experts & Accounts to Follow on Twitter","og_description":"Keep up with the latest cybersecurity news and trends. Check out our list of the top cybersecurity Twitter accounts to follow now.","og_url":"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/","og_site_name":"eSecurity Planet","article_published_time":"2023-04-03T11:30:00+00:00","article_modified_time":"2024-01-12T19:43:43+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/ESP.CybersecurityTwitter-scaled.jpg","type":"image\/jpeg"}],"author":"Sam Ingalls","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/SamIngalls","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Sam Ingalls","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/"},"author":{"name":"Sam Ingalls","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2"},"headline":"Top 25 Cybersecurity Experts &amp; Accounts to Follow on Twitter","datePublished":"2023-04-03T11:30:00+00:00","dateModified":"2024-01-12T19:43:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/"},"wordCount":1793,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/ESP.CybersecurityTwitter-scaled.jpg","keywords":["collaboration","cybersecurity"],"articleSection":["Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/","url":"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/","name":"Top 25 Cybersecurity Experts & Accounts to Follow on Twitter","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/ESP.CybersecurityTwitter-scaled.jpg","datePublished":"2023-04-03T11:30:00+00:00","dateModified":"2024-01-12T19:43:43+00:00","description":"Keep up with the latest cybersecurity news and trends. Check out our list of the top cybersecurity Twitter accounts to follow now.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/ESP.CybersecurityTwitter-scaled.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/ESP.CybersecurityTwitter-scaled.jpg","width":2560,"height":1707,"caption":"A picture of two friends sharing contact details on their phones as this article is about the Top Twitter accounts to follow for cybersecurity expertise, news, and the latest commentary."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/trends\/twitter-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Top 25 Cybersecurity Experts &amp; Accounts to Follow on Twitter"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2","name":"Sam Ingalls","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg","caption":"Sam Ingalls"},"description":"Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, Tech Republic, ServerWatch, Webopedia, and Channel Insider.","sameAs":["https:\/\/www.linkedin.com\/in\/singalls\/","https:\/\/x.com\/https:\/\/twitter.com\/SamIngalls"],"url":"https:\/\/www.esecurityplanet.com\/author\/singalls\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20186"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/250"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=20186"}],"version-history":[{"count":1,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20186\/revisions"}],"predecessor-version":[{"id":33613,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20186\/revisions\/33613"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/20190"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=20186"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=20186"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=20186"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=20186"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=20186"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=20186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}