Top Authors

Summary

Some top cybersecurity authors include investigative journalist Brian Krebs, security technologist Bruce Schneier, and security expert Troy Hunt. Other highly regarded figures are Mikko Hyppönen, Katie Moussouris, and Kevin Mitnick, known for their work in malware research, vulnerability disclosure, and ethical hacking, respectively.

These authors range from technical practitioners to journalists and national security experts, covering diverse areas within the field of cybersecurity.

OnAir Post: Top Authors

About

Gemini AI Overview

  • Brian Krebs: An investigative journalist who focuses on uncovering data breaches and cybercrime through his blog, Krebs on Security.
  • Bruce Schneier: A renowned security technologist, author, and cryptographer known for his books on cybersecurity and privacy, such as Schneier on Security.
  • Troy Hunt: A security expert who created the well-known data breach notification service, Have I Been Pwned.
  • Mikko Hyppönen: A global security expert and author who serves as Chief Research Officer for WithSecure, with a focus on malware research.
  • Katie Moussouris: A hacker and founder/CEO of Luta Security, who specializes in vulnerability disclosure and bug bounty programs.
  • Kevin Mitnick: A former hacker who became a security consultant and author, with notable works like Ghost in the Wires and The Art of Invisibility.
  • Chris Wysopal: A co-founder and CTO of Veracode, a company focused on software security.
  • Joseph Steinberg: An author of books like Cybersecurity for Dummies and a cybersecurity consultant.
  • Daniel Suarez: Known for writing fiction related to cybersecurity, such as the novel Daemon.
  • Jane Frankland: An author, speaker, and leadership coach in the cybersecurity field, recognized by platforms like Wikipedia and UNESCO. 

Source:

Gemini AI Deep Dive Overview

Notable Cybersecurity Authors and Their Works

  • Bruce Schneier: A renowned cryptographer and security specialist, his works often explore the broader implications of technology on society and privacy.
    • Notable WorksApplied CryptographySecurity Engineering: A Guide to Building Dependable Distributed SystemsData and Goliath.
  • Kevin Mitnick: A famous former hacker who became a security consultant and author, known for his personal narratives and insights into social engineering.
    • Notable WorksGhost in the Wires: My Adventures as the World’s Most Wanted HackerThe Art of InvisibilityThe Art of Deception.
  • Kim Zetter: An investigative journalist recognized for her deep dives into major cyber events and cyber warfare.
    • Notable WorksCountdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon.
  • Andy Greenberg: A senior writer for Wired, he writes gripping, journalistic accounts of state-sponsored hacking and cyber threats.
    • Notable WorksSandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers.
  • Jon Erickson: Known for a foundational technical book in the field of ethical hacking and exploitation.
    • Notable WorksHacking: The Art of Exploitation.
  • Ross Anderson: An expert in security engineering, known for a seminal, advanced-level guide to designing secure systems.
    • Notable WorksSecurity Engineering: A Guide to Building Dependable Distributed Systems.
  • Brian Krebs: An investigative reporter and author who focuses on organized cybercrime.
    • Notable WorksSpam Nation: The Inside Story of Organized Cybercrime.
  • Christopher Hadnagy: Specializes in the human element of security and social engineering.
    • Notable WorksSocial Engineering: The Science of Human HackingPhishing Dark Waters.

Source: Gemini AI Deep Dive Overview – 11/9/2025

Substacks

Source: Other

Some of the most popular Substack cybersecurity newsletters include Venture in Security for industry trends, The Cybersecurity Pulse for news and analysis, Ransomware for threats and developments, and Detection at Scale for technical details on detection engineering. Other popular options cover specific niches, such as Blockchain Threat Intelligence or The Cloud Security Guy.

Industry trends and analysis

  • Venture in Security: Covers cybersecurity trends, key players, and venture capital in the industry.
  • The Cybersecurity Pulse: Offers a weekly look at the latest developments, innovation, and funding in cybersecurity.
  • The Security Industry: Provides analysis on the cybersecurity vendor landscape, often highlighting fast-growing companies. 

Technical and threat-focused

  • Ransomware: Focuses specifically on ransomware developments, including the shift in threat actor tactics.
  • Detection at Scale: Delves into scaling security information and event management (SIEM) tools and other detection engineering practices.
  • Blockchain Threat Intelligence: Concentrates on the intersection of blockchain technology and security threats. 

Professional and operational

Discuss

OnAir membership is required. The lead Moderator for the discussions is Cyber Curators. We encourage civil, honest, and safe discourse. For more information on commenting and giving feedback, see our Comment Guidelines.

This is an open discussion on the contents of this post.

Home Forums Open Discussion

Viewing 1 post (of 1 total)
Viewing 1 post (of 1 total)
  • You must be logged in to reply to this topic.
Skip to toolbar