<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1018517621595528&amp;ev=PageView&amp;noscript=1">
How to
The Barkly Team
Nov 2017

10 InfoSec Experts We're Thankful For

It's the time of year for taking stock and expressing thanks, and we're celebrating by acknowledging 10 remarkably generous infosec experts we're grateful for. Not only are they incredibly talented and hard-working at what they do, they're also passionate about helping others and driving the entire infosec community forward.

  troy-hunt-headshot.png

 

1) Troy Hunt @troyhunt

Why we're thankful: Hunt has a knack for distilling complex security topics without dumbing them down. In addition to a fantastic blog, he authors top-rated Pluralsight courses on web security. But we're especially thankful for his creation and tireless management of Have I been pwned?, a free service that aggregates data breaches and helps people discover where their personal data has been compromised on the web. 

 

Lesley-Carhart-headshot.png

2) Lesley Carhart @hacks4pancakes

Why we're thankful: In addition to being one of the most active and engaging security experts on Twitter, Carhart is heavily involved in the Chicago infosec community and shares her thoughts and expertise regularly on her blog, tisiphone.net. She's an incredible go-to source of information and encouragement for anyone interested in breaking into infosec or developing their career — she's even written a must-read blog series on the subject

 

pete-herzog.png

3) Pete Herzog @peteherzog

Why we're thankful: Herzog is Managing Director and co-founder of the Institute for Security and Open Methodologies (ISECOM), a non-profit, open research organization focused on all things related to security and hacking. In addition to sharing his expertise though free guides like the Open Source Security Testing Methodology Manual (OSSTMM) and The Open Source Cybersecurity Playbook, Pete is also the creator of Hacker Highschool, an amazing program designed to teach cybersecurity to teens.

javvad-malik-headshot.png

4) Javvad Malik @J4vv4D

Why we're thankful: AlienVault's outspoken security advocate in residence always has a fresh take on the latest infosec news or issue of the day. Malik is a prolific speaker and blogger, and he always knows just how to frame a topic to make it approachable and engaging to both technical and non-technical people, alike. You can see his signature enthusiasm for security on display in his series of weekly blog posts and videos

 

Wendy-Nather-headshot.png 

5) Wendy Nather @wendynather

Why we're thankful: There are plenty of times when infosec can feel like the world's most wearying echo chamber, and during those times you should stop what you're doing and read or watch Nather explain something. As a former CISO, she brings a healthy dose of real-world practicality and business perspective to security topics, and she stirs it together with a strong pour of empathy, collegiality, humor, and an utterly fantastic way with words. See her take on why she takes an anti-FUD approach to security here

 

dave-kennedy-headshot.png

6) Dave Kennedy @HackingDave

Why we're thankful: Dave Kennedy is kind of a big deal. He's served as CSO at a Fortune 1000 company, written countless penetration testing tools and guides, and has even had his name used by a character in Mr. Robot. But what's truly a big deal is that he's committed to using any accomplishments or experience he's gathered to help and encourage others to further good work in the infosec community 

 

jessy_irwin_circle.png

7) Jessy Irwin @jessysaurusrex

Why we're thankful: Irwin is a self-described "human-centric" security expert who strives at making security more relatable and urgent. A passionate advocate of all things crypto (and dino), she's guaranteed to be the best new reason for you to check your Twitter feed. Especially on Fridays, when she invites her followers to share their wins of the week — yes, even the small stuff. As Irwin puts it, "Everything counts."

 

Michael-Gillespie-headshot.png

8) Michael Gillespie @demonslay335

Why we're thankful: One of the most active malware researchers on Twitter, Gillespie is constantly uncovering new strains of ransomware and sharing his findings with the community for reasons that are more altruistic than academic. Not only is he an active participant on industry forums, offering his help to anyone infected with ransomware, he is also the creator of ID Ransomware, a site that helps victims of ransomware identify and get more information on the strain they've been hit with.

 

lawrence-abrams-headshot.png

9) Lawrence Abrams @LawrenceAbrams

Why we're thankful: As the owner of Bleeping Computer, Abrams runs one of the most timely and informative sources of malware and security news online. Under his direction, the articles on the site provide a great mix of technical and non-technical information, and his "This Week in Ransomware" series in particular provides a fantastic recap of updates on the latest variants and attacks.

 

Lenny-Zeltzer-headshot.png

10) Lenny Zeltser @lennyzeltser

Why we're thankful: Not only can Zeltser reverse engineer malware, he can also help your grandmother understand exactly what it does. That ability to toggle between deeply technical and high-level discussions is rare, but when it comes to providing clarity, context, perspective, and practicality to security issues, Zeltser is one of the best. Cases in point: his blog post on "Mastering 4 Stages of Malware Analysis" and "The History of Fileless Malware — Looking Beyond the Buzzword."

 

Note: We're lucky enough to work in an industry full of incredibly bright, generous people, and the ones we've called out here are obviously just the tip of the iceberg. Have someone else in mind who should be acknowledged? Let us know in the comments below or tweet to us @barklyprotects.

The Barkly Team

The Barkly Team

Providing the latest security alerts and updates with context that makes them useful.

blocks-attack-grey-circle.svg

Close the gaps in your security

See how Barkly blocks attacks other solutions miss.

See a demo

Comments

Stay informed!

Get the latest security news, tips, and trends straight to your inbox.

Stay informed!

Get the latest security news, tips, and trends straight to your inbox.