Top Cybersecurity Influencers to Follow in 2026

Cybersecurity is one of the noisiest content spaces on the internet. Every vendor has a blog. Every conference has a keynote. And LinkedIn is full of hot takes dressed up as thought leadership.

Finding voices worth actually following takes work. The top influencers in cybersecurity aren't just the ones with the most followers. They're the ones who help practitioners make better decisions, understand real threats, and stay ahead in a constantly shifting landscape.

This list was built for CISOs, security engineers, marketers, and GTM teams who want signal, not noise. Whether you're looking to learn, build your network, or identify credible voices for brand partnerships, this is where to start.

How We Defined "Top Cybersecurity Influencers"

Follower count alone doesn't make someone worth following. A large audience built on viral posts and recycled takes doesn't translate into trust with buyers or practitioners.

This list was curated for professionals and decision-makers who need real insights. That means prioritizing voices with actual practitioner experience, consistent output, and a track record of being right, not just loud.

Selection Criteria Used for This List

  • Signal quality over noise. Each person on this list publishes content that informs decisions, not just generates engagement.

  • Consistency and depth. Not one-hit wonders. These are voices that show up regularly with substantive analysis.

  • Practitioner or operator credibility. Most have worked in the field, built something, or researched something that matters.

  • Educational value vs. hot takes. The emphasis is on people who teach you something, not just provoke a reaction.

  • Relevance to modern security challenges. AI, cloud security, ransomware, zero trust, and identity are all represented here.

CISO Leaders & Executive Security Voices

1. Troy Hunt

Current Role: Founder of Have I Been Pwned; Independent Security Researcher

Primary Platforms: X/Twitter (approx. 260K followers), Blog

Core Expertise: Data breaches, identity security, security education

Why Follow: Troy turns breach data into clear, public insight. His blog posts are detailed, sourced, and genuinely useful. He's one of the most trusted independent voices in the space and isn't beholden to any vendor narrative.

2. Rinki Sethi

Current Role: VP and CISO at Bill.com (previously CISO at Twitter/X)

Primary Platforms: LinkedIn (approx. 20K+ followers), X/Twitter

Core Expertise: Cloud security leadership, security org scaling, board communication

Why Follow: Rinki brings a strategic, people-first lens to security leadership. Her content is practical for CISOs navigating board relationships and scaling security teams inside fast-moving companies.

3. Alyssa Miller

Current Role: CISO and Security Advocate; Author

Primary Platforms: LinkedIn (approx. 30K+ followers), X/Twitter

Core Expertise: AppSec, business-aligned security

Why Follow: Alyssa bridges the gap between technical security work and business outcomes. She's a strong voice for making AppSec accessible and connecting security priorities to executive decision-making.

Cybersecurity Researchers & Threat Intelligence Influencers

4. Jadee Hanson

Current Role: CISO and CIO at Code42

Primary Platforms: LinkedIn

Core Expertise: Compliance, SaaS security

Why Follow: Jadee focuses on insider risk and data protection in SaaS environments. Her perspective is grounded in real operational experience, which makes her content useful for security and compliance teams inside growing companies.

5. Wendy Nather

Current Role: Head of Advisory CISOs at Cisco

Primary Platforms: X/Twitter (approx. 20K followers), LinkedIn

Core Expertise: Security leadership, culture

Why Follow: Wendy has spent years working with CISOs across industries and brings nuance to topics that often get oversimplified. She's particularly strong on the human and organizational side of security.

6. George Kurtz

Current Role: Co-Founder, President, and CEO at CrowdStrike

Primary Platforms: LinkedIn (approx. 200K+ followers), X/Twitter

Core Expertise: Threat landscape, market signals

Why Follow: George offers a macro view of the threat environment backed by CrowdStrike's intelligence infrastructure. His commentary on nation-state threats and adversary behavior carries genuine weight.

Cybersecurity Researchers & Threat Intelligence Experts

7. Katie Nickels

Current Role: Director of Intelligence at Red Canary

Primary Platforms: X/Twitter (approx. 20K+ followers), LinkedIn

Core Expertise: Ransomware, adversary tracking

Why Follow: Katie is one of the clearest voices in threat intelligence. She helped develop MITRE ATT&CK content and consistently produces analysis that helps defenders understand adversary behavior at a practical level.

8. John Hammond

Current Role: Principal Security Researcher at Huntress

Primary Platforms: YouTube (approx. 700K subscribers), X/Twitter

Core Expertise: Malware analysis, education

Why Follow: John makes malware analysis and CTF challenges accessible to a wide audience. His YouTube channel is one of the best free resources for hands-on security learning, especially for students and early-career practitioners.

9. Lesley Carhart

Current Role: Principal Threat Analyst at Dragos

Primary Platforms: X/Twitter (approx. 85K followers)

Core Expertise: Incident response, OT security

Why Follow: Lesley is a recognized expert in industrial control systems and OT security. Her posts on incident response and critical infrastructure threats are grounded in real casework and hard to find elsewhere.

Educators, Writers & Community Builders

10. Marcus Hutchins

Current Role: Independent Security Researcher (known for stopping WannaCry)

Primary Platforms: X/Twitter (approx. 130K followers), Blog

Core Expertise: Malware, botnets

Why Follow: Marcus has done some of the most consequential malware research in recent memory. His technical breakdowns are detailed and credible, and his blog remains one of the better free resources for deep malware analysis.

11. Kevin Beaumont

Current Role: Independent Security Researcher

Primary Platforms: X/Twitter (approx. 100K+ followers), Blog

Core Expertise: Cloud security, vulnerability analysis

Why Follow: Kevin was an early and consistent voice on major vulnerabilities like ProxyLogon, PrintNightmare, and others. He's known for calling out real risks before they're widely acknowledged, which makes him worth watching closely.

12. SwiftOnSecurity

Current Role: Anonymous security professional

Primary Platforms: X/Twitter (approx. 380K followers)

Core Expertise: Security culture, ops insight

Why Follow: SwiftOnSecurity has built a massive audience through sharp, often humorous commentary on security operations and culture. The account cuts through vendor marketing and offers a ground-level operational perspective.

13. Chad Loder

Current Role: Cybersecurity Researcher and Founder

Primary Platforms: LinkedIn

Core Expertise: OSINT, threat actor monitoring

Why Follow: Chad brings an OSINT-driven approach to tracking threat actors and emerging risks. His research tends to surface before it hits mainstream security news, making him a useful early signal source.

Founders, Operators & Security Entrepreneurs

14. Haroon Meer

Current Role: Founder at Thinkst (makers of Canary deception tools)

Primary Platforms: X/Twitter (approx. 15K followers)

Core Expertise: Deception tech, product thinking

Why Follow: Haroon thinks differently about security product design. His writing challenges conventional wisdom on what security tools should actually do and why most don't work as advertised.

15. Adam Shostack

Current Role: Independent Consultant; Author of Threat Modeling: Designing for Security

Primary Platforms: LinkedIn, Blog

Core Expertise: Threat modeling

Why Follow: Adam literally wrote the book on threat modeling. His content is structured, actionable, and useful for engineers and security architects who want to build security into products rather than bolt it on afterward.

16. Brian Krebs

Current Role: Investigative Journalist and Founder of KrebsOnSecurity

Primary Platforms: Blog, X/Twitter (approx. 400K followers)

Core Expertise: Cybercrime investigation

Why Follow: Brian is the gold standard for cybercrime reporting. His investigations go deep into criminal infrastructure, fraud ecosystems, and vendor accountability. If a breach matters, he's usually among the first to explain how it happened and why.

17. Rachel Tobac

Current Role: CEO at SocialProof Security

Primary Platforms: X/Twitter (approx. 60K followers), LinkedIn

Core Expertise: Social engineering, human risk

Why Follow: Rachel demonstrates social engineering attacks in real time and translates them into awareness content that non-technical audiences actually understand. Her work is directly useful for security awareness programs and executive communications.

18. Sam Curry

Current Role: VP and CISO at Zscaler

Primary Platforms: LinkedIn (approx. 40K+ followers), X/Twitter

Core Expertise: Bug bounties, offensive security

Why Follow: Sam brings an attacker's mindset to security leadership. His posts on vulnerability disclosure and offensive research are grounded in hands-on experience and offer a perspective you don't often get at the executive level.

19. Eva Galperin

Current Role: Director of Cybersecurity at the Electronic Frontier Foundation (EFF)

Primary Platforms: X/Twitter (approx. 100K+ followers)

Core Expertise: Surveillance, nation-state threats

Why Follow: Eva focuses on the intersection of technology, surveillance, and civil liberties. Her work on stalkerware and targeted digital attacks is important for anyone thinking about the human impact of security failures.

Educators, Writers & Community Builders

20. Daniel Miessler

Current Role: Founder of Unsupervised Learning; Security and AI Researcher

Primary Platforms: Substack/Newsletter, X/Twitter (approx. 50K+ followers)

Core Expertise: Security thinking, AI

Why Follow: Daniel's newsletter is one of the best weekly reads at the intersection of AI and security. He synthesizes complex developments into clear frameworks and doesn't chase trends for engagement.

21. Gerald Auger

Current Role: Founder at Simply Cyber; Security Educator and YouTuber

Primary Platforms: YouTube (approx. 180K subscribers), LinkedIn

Core Expertise: Security education, career growth

Why Follow: Gerald is one of the most accessible educators in the space. His content is designed for people entering or advancing in cybersecurity careers, and he covers both technical skills and the professional side of the industry.

22. Josh Corman

Current Role: Senior Strategist at CISA (previously); Independent Advisor

Primary Platforms: X/Twitter (approx. 20K followers), LinkedIn

Core Expertise: Product security, safety

Why Follow: Josh has been a consistent voice on software safety, healthcare security, and policy. His work connecting security failures to real-world harm is important context for anyone working on critical systems or regulated industries.

23. Kelly Shortridge

Current Role: Senior Principal Engineer at Fastly

Primary Platforms: X/Twitter (approx. 30K followers), Substack

Core Expertise: Security economics, resilience

Why Follow: Kelly applies behavioral economics and systems thinking to security decisions. Her work challenges lazy assumptions about how security programs are built and measured, making her useful to leaders rethinking their approach.

24. Steve Gibson

Current Role: Security Researcher; Founder of Gibson Research Corporation

Primary Platforms: Podcast: Security Now (one of the longest-running security podcasts), X/Twitter

Core Expertise: Security fundamentals

Why Follow: Steve has been explaining security concepts clearly for decades. Security Now is essential listening for anyone who wants to understand the fundamentals and keep up with protocol-level developments without drowning in jargon.

25. Allison Nixon

Current Role: Chief Research Officer at Unit 221B

Primary Platforms: X/Twitter (approx. 20K followers), LinkedIn

Core Expertise: Cybercrime ecosystems

Why Follow: Allison investigates criminal networks and the communities that sustain them. Her research on SIM swapping, cybercrime infrastructure, and threat actors offers a level of depth that's rare in public-facing security content.

Why Following the Right Cybersecurity Influencers Matters

There is no shortage of content in cybersecurity. The challenge is finding voices that consistently deliver a real signal rather than recycled vendor talking points.

Following the right top cybersecurity influencers gives you a faster, cleaner view of what's actually happening. New attack techniques, regulatory changes, and emerging tools surface in these feeds before they hit mainstream press. That matters for practitioners making tool decisions, security leaders advising boards, and marketers trying to understand what buyers actually care about.

The value also compounds over time. Trust is built through repeated, accurate insight. When a voice you've followed for years flags something as a priority, it carries weight. That's the kind of credibility that shapes purchasing decisions, hiring decisions, and organizational priorities.

For B2B marketers and GTM teams, this list also has a second use. These are the types of voices that already have your buyers' trust. That trust is not easily manufactured. It's earned through consistency, technical depth, and real experience, which is exactly what makes top influencers in cybersecurity worth partnering with.

How Cybersecurity Brands Earn Buyer Trust Through the Right Voices

Cybersecurity buyers are skeptical by nature. They've seen too many vendor claims, too many sponsored posts, and too many generic endorsements from people who've never run a SOC or built a security program. Cold outreach and display ads don't move them.

What moves them is trust earned through credible, practitioner-led voices. That's where B2B influencer marketing services come in, and specifically where Cherry Lane Media is different from generic influencer platforms.

Cherry Lane specializes in B2B influencer marketing for SaaS and tech companies. The work goes far beyond connecting a brand with a name and walking away. Cherry Lane designs the strategy, handpicks creators based on audience fit and practitioner credibility, manages campaigns end-to-end, and measures real business impact: awareness, trust, traffic, and pipeline, not just impressions and likes.

If you're a CISO, a security startup founder, or a GTM leader trying to reach technical buyers, the top cybersecurity influencers on this list represent the kind of credibility you want associated with your brand. Cherry Lane can help you build that bridge the right way.

Next
Next

Top HR Influencers to Follow in 2026