Vulnerabilities / Threats

4/7/2016
03:35 PM
Sean Martin
Sean Martin
Slideshows
Connect Directly
LinkedIn
RSS
E-Mail
100%
0%

10 Cybersecurity Twitter Profiles To Watch

If you're responsible for an information security program, check out these influencers to follow.
Previous
1 of 11
Next

Image Credit: Twitter/imsmartin

Image Credit: Twitter/imsmartin

As is the case with security challenges and technologies, the Twittersphere is full of cybersecurity experts sharing their thoughts, research and news on a wide range of topics: vulnerabilities, viruses, malware, application security, DevOps, data breaches, privacy, bug bounties, responsible disclosure, threat intelligence, privacy and more.

This Top 10 of Cybersecurity Twitter profiles was selected based on their inclusion in many, many lists over the past few years. The more lists they were on, the higher up the stack they were placed. Once on the list, they were ranked by number of Twitter followers.

In this round-up, we find the following:

  • 9 people, 1 "personality"
  • 8 men, 1 woman, 1 unspecified
  • 7 reference their personal blogs, 3 reference company blogs

Most, if not all of the “people” on this list are regular public speakers as well - so chances are, you've seen them somewhere, even if in an online video.

Collectively, they have tweeted more than 282,572 times and reach three quarters of a million followers. We've captured their most popular tweets in this collection.

 

Sean Martin is an information security veteran of nearly 25 years and a four-term CISSP with articles published globally covering security management, cloud computing, enterprise mobility, governance, risk, and compliance—with a focus on specialized industries such as ... View Full Bio

Previous
1 of 11
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
rgertig680
100%
0%
rgertig680,
User Rank: Strategist
4/9/2016 | 10:19:26 AM
Twitter Feeds
Lawrence,

I think that reply was uncalled for.  Some people ARE better at Twitter and FB than others.  I'm looking as well and have used twitter and FB for quite a while.  What I did was type in all 11 "@..." and clik follow.  If there is an easier way, I'd be game to know also.  Please be a mentor, not a venter.
LawrenceC206
50%
50%
LawrenceC206,
User Rank: Apprentice
4/8/2016 | 9:00:14 AM
Re: It's unbelievable but true
Evidently you do not possess the skills needed to follow someone on Twitter or you require spoonfeeding. After 15 seconds of work, I am able to follow each of the profile persons.
JCxx
100%
0%
JCxx,
User Rank: Apprentice
4/8/2016 | 12:57:33 AM
It's unbelievable but true
You manage to write an article about 10 Twitter profiles I should watch without including a single link to any of their Twitter profiles!

 
Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
5 Reasons Why Threat Intelligence Doesn't Work
Jonathan Zhang, CEO/Founder of WhoisXML API and TIP,  11/7/2018
Why Password Management and Security Strategies Fall Short
Steve Zurier, Freelance Writer,  11/7/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-16470
PUBLISHED: 2018-11-13
There is a possible DoS vulnerability in the multipart parser in Rack before 2.0.6. Specially crafted requests can cause the multipart parser to enter a pathological state, causing the parser to use CPU resources disproportionate to the request size.
CVE-2018-16471
PUBLISHED: 2018-11-13
There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to 'http' or 'https' and do not escape the return value could be vulnerable to a...
CVE-2018-6980
PUBLISHED: 2018-11-13
VMware vRealize Log Insight (4.7.x before 4.7.1 and 4.6.x before 4.6.2) contains a vulnerability due to improper authorization in the user registration method. Successful exploitation of this issue may allow Admin users with view only permission to perform certain administrative functions which they...
CVE-2018-17614
PUBLISHED: 2018-11-13
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Losant Arduino MQTT Client prior to V2.7. User interaction is not required to exploit this vulnerability. The specific flaw exists within the parsing of MQTT PUBLISH packets. The issue results from th...
CVE-2018-8009
PUBLISHED: 2018-11-13
Apache Hadoop 3.1.0, 3.0.0-alpha to 3.0.2, 2.9.0 to 2.9.1, 2.8.0 to 2.8.4, 2.0.0-alpha to 2.7.6, 0.23.0 to 0.23.11 is exploitable via the zip slip vulnerability in places that accept a zip file.