If you’re looking for some thought leadership in the information security space, searching #cybersecurity on Twitter isn’t going to give you clear advice or direction.
But if you follow these seven cybersecurity managers, influencers, and thought leaders (organized alphabetically by last name) you’re sure to gain some new insights and perspectives daily.

Andrew Hay is the chief information security officer for Data Gravity, a storage security startup. Previously, Hay held positions as a director of research, a senior security analyst, and an information security officer—so he brings a great deal of industry knowledge to his Twitter account. He tweets “suggested readings” on cybersecurity-related topics to his 11,000 followers regularly, making his account a great follow.
Mikko Hypponen is the chief research officer of Helsinki-based cybersecurity firm F-Secure. He and his team have worked for over twenty years debugging some of the largest viruses in the world, including the SoBig.F worm. His work has appeared in numerous large publications (like the New York Times and Wired magazine), and he has given several noteworthy TED talks on cybersecurity. His number of followers—over 132,000—speaks for itself!.
Michael Kaiser is the executive director of the National Cyber Security Alliance (NCSA). The NCSA leads StaySafeOnline, which helps businesses, schools, and individuals learn more about cybersecurity and data privacy best practices. Kaiser regularly retweets information from the the NCSA, opinion pieces he’s authored, and other bits of cybersecurity news.
Author, researcher, and DevOps-devotee Gene Kim is the founder and former chief technology officer of technology solutions provider Tripwire. He’s also a cybersecurity researcher who has written numerous texts on IT operations, security, and compliance, including “The Phoenix Project: A Novel About IT.” Take a look at his website for more information about him, and follow him on Twitter for his tweets about DevOps and IT operations.
Wendy Nather is the research director at the Retail Cyber Intelligence Sharing Center. She brings over 30 years of experience in IT and cybersecurity to the Twitterverse, and her Twitter feed is chock-full of her own opinions as well as industry retweets. She also writes on her personal blog at Idoneous Security, and the infrequent entries are worth the read.
See Also: The Top 22 IT Security Blogs Of 2015
Bruce Schneier is true veteran in the information security community. Schneier is an expert on cryptography and has written numerous books on network security. Currently, Schneier is chief technology officer for Resilient Systems, and IBM-owned incident response company. Follow himto get the latest on his blog and to see what he’s currently reading.
Have you heard that international superstar Taylor Swift is also an InfoSec expert? Well, she isn’t, but this Twitter account is still a hilarious parody on that topic. SwiftOnSecurity has over 137,000 followers—the most of anyone on this list—and is well-known for satirical, cantankerous tweets and GIFs on everything from IT security to today’s political climate.
Parisa Tabriz manages Google’s information security team and has been dubbed the company’s “Security Princess.” Her job—detailed in this CNN article—“is to hack into the most popular web browser on the planet, trying to find flaws in the system before the ‘black hats’ do.” She’s very active on Twitter, so her 15,000+ followers gain a good deal of real-time information about hacking and IT security.
We know this list is just the tip of the iceberg as far as thought leaders in the cybersecurity space are concerned. If you know someone that should appear on the next iteration of this list, tweet us @BitSight and let us know!
Data breaches that originate through third parties are more commonplace than organizations are used to. The SolarWinds hack and Kaseya ransomware attack are two recent examples of threat actors exploiting the security practices of...
Organizations rely on third-parties to keep competitive in the marketplace. The EY global third-party risk management survey highlights that in 2019–20, over 33% of the 246 global companies surveyed were managing and monitoring third-party...
Third parties are essential to helping your business grow and stay competitive. But if you’re not careful, your trusted partnerships can introduce unwanted cyber risk and overhead into your organization.
© 2026 BitSight Technologies. All Rights Reserved. | Privacy Policy | Security | For Suppliers
Contact Us | BitSight Technologies | 111 Huntington Ave, Suite 2010, Boston, MA 02199 | +1-617-245-0469