Tuesday, September 28, 2021
HomeTutorialsBest People to follow for Learning Security

Best People to follow for Learning Security

  1. It is difficult to choose correct mentor or select the right people’s as being new learner in cyber security .so today we will see some our great peoples in this cyber security field. Let’s explore together by this article….

 

Today’s highlights:

1]what is cyber security.

2] getting start with cyber security.

3]some great people in this field to follow.

 

What is cyber security?

Cybersecurity experts are in high demand as private, public and government sectors scramble to secure their systems and data in the wake of widespread cyber-attacks. Industry analyst Cybersecurity Ventures projects that cybercrime will cost the world $6 trillion annually by 2021.

 

There is such demand for cybersecurity professionals that U.S. News & World Report listed Information Security Analyst as the fifth best technology job in 2019 (and #38 of its 100 Best Jobs) — based on salary, employment rate, growth, stress, work-life balance and job prospects.

 

And it’s no wonder why, the information security analyst position pays a median salary of $98,350 and the industry as a whole boasts an unemployment rate of “zero percent.” Due to the high demand and the many perks that are being offered to professionals with the right combination of education and experience, there has never been a better time to start a career in cybersecurity. Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It’s also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.

 

  • Network security is the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware.

 

  • Application security focuses on keeping software and devices free of threats. A compromised application could provide access to the data its designed to protect. Successful security begins in the design stage, well before a program or device is deployed.

 

  • Information security protects the integrity and privacy of data, both in storage and in transit.

 

  • Operational security includes the processes and decisions for handling and protecting data assets. The permissions users have when accessing a network and the procedures that determine how and where data may be stored or shared all fall under this umbrella.

 

  • Disaster recovery and business continuity define how an organization responds to a cyber-security incident or any other event that causes the loss of operations or data. Disaster recovery policies dictate how the organization restores its operations and information to return to the same operating capacity as before the event. Business continuity is the plan the organization falls back on while trying to operate without certain resources.

 

  • End-user education addresses the most unpredictable cyber-security factor: people. Anyone can accidentally introduce a virus to an otherwise secure system by failing to follow good security practices. Teaching users to delete suspicious email attachments, not plug in unidentified USB drives, and various other important lessons is vital for the security of any organization.

How to start future with cyber security?

We can start learning from different sources such as by YouTube videos, by reading blogs, reading articles, by doing google searches or we can follow some experienced peoples to get a perfect knowledge from them.

 

Some of experienced and great peoples to follow to get a prefect knowledge:

Following experts on social media is one of the best ways to keep up with the industry at large and each expert’s thoughts in particular. Twitter is especially useful because you can make a list of your favorite experts and scroll through a feed that consists entirely of relevant musings and links whenever you’re ready to learn.

 

Brian Krebs

Brian Krebs is one of the most well-known cybersecurity experts out there. He regularly breaks big data breach news on his Twitter feed and blog. If you want to hear the news before everyone else starts reporting on it, follow him.

 

Twitter: @briankrebs

Website: KrebsOnSecurity.com

Troy Hunt

Troy Hunt is a cybersecurity blogger, teacher, and Microsoft Regional Director. He’s most well-known for creating Have I Been Pawned, a website that lets users know if their email addresses have been part of a data breach. Follow him to keep up with the latest data breaches and the best ways to track them.

 

Twitter: @troyhunt

Website: TroyHunt.com

Rachel Tobac

Rachel Tobac is CEO of Social Proof Security, a company that offers social engineering training as well as assessments and penetration tests. She has won second place in social engineering hacking competitions at DEF CON three years in a row.

 

Twitter: @RachelTobac

Website: SocialProofSecurity.com

Marcus J Carey

Marcus J. Carey is the author of Tribe of Hackers and CEO of Threat care. Tribe of Hackers is a collection of insights from 70 cybersecurity experts and Threat care provides breach and attack simulation software. Follow him to learn more about breaches and find ways to get better involved in the cybersecurity community.

 

Twitter: @marcusjcarey

Zack Whittaker

Zack Whittaker is the security editor for TechCrunch, and tweets about cybersecurity news, especially the political context surrounding it. He also produces a cybersecurity newsletter that summarizes each week’s news.

 

Twitter: @zackwhittaker

Eva Galperin

Eva Galperin is the Director of Cybersecurity at the Electronic Frontier Foundation, a non-profit organization focused on human rights in the digital world. She combines her knowledge of politics and technology to study privacy and security, especially as it relates to the world’s most vulnerable people. Follow her to learn more about the societal ramifications of technology and cybersecurity.

 

Twitter: @evacide

Graham Cluley

Graham Cluley is an independent computer security analyst who’s been working in the computer industry since the 1990s. He’s worked at companies like Sophos and McAfee and is now an independent blogger and podcaster. He tweets about cybersecurity news and any useful content he finds.

 

Twitter: @gcluley

Website: GrahamCluley.com

Theresa Payton

Theresa Payton is CEO at Fortalice Solutions and appears as a guest on numerous podcasts. Follow her to keep up with her insights on cybersecurity for SMBs, enterprises, and nations.

 

Twitter: @TrackerPayton

Kevin Mitnick

There’s no better person to learn about hacking from than a hacker. Kevin Mitnick has the bonafides to back up his hacking fame, having at one point earned a spot on the FBI’s Most Wanted List after hacking 40 major corporations. Mitnick now writes books, speaks about cybersecurity, and offers security consulting services. Follow him for news about his appearances and oftentimes blunt analyses about the state of cybersecurity.

 

Twitter: @kevinmitnick

Website: MitnickSecurity.com

Adam Levin

Adam Levin is a cybersecurity expert who calls on over 40 years of intensive security experience across privacy, real estate, and government service. Currently, he’s the chairman and founder of CyberScout, an identity and data services provider, and co-founder of Credit.com, a site that provides free credit checks. Follow him on Twitter to keep up-to-date with cybersecurity news and to see his unique insights into identity theft education.

 

Twitter: @AdamKLevin+

Website: AdamLevin.com

John Bambenek

John Bambenek is the founder of Bambenek Consulting, a consulting firm that investigates criminal threats, and a regular contributor to Dark Reading. Follow him on Twitter to see his blunt reactions to the latest cybersecurity news.

 

Twitter: @bambenek

Website: BambenekConsulting.com

Magda Chelly

Dr. Magda Chelly, founder of Women in Cyber, holds a Ph.D. in Telecommunication Engineering and a specialization in cybersecurity, making her one of the most educated cybersecurity experts you can add to your feed. She works as a “CISO on-demand” for companies around the world—from SMBs to enterprises.

 

Twitter: @m49D4ch3lly

Website: Responsible-Cyber.com

Richard Stiennon

Richard Stiennon is the author of There Will Be Cyberwar, a book about the U.S. military’s shift to network-centric warfare and what that portends for cyberwar. Follow him on Twitter to keep up with his interviews and articles on a host of cybersecurity topics.

 

Twitter: @stiennon

Joseph Steinberg

Joseph Steinberg is a speaker and advisor on emerging technologies and their cybersecurity implications. If you’re curious about edge technologies like blockchain, Steinberg is an essential addition to your feed.

 

Twitter: @JosephSteinberg

Website: JosephSteinberg.com

Dr. Alissa Abdullah

Dr. Alissa Abdullah is the CISO for Xerox and former Deputy CIO for the White House. The Huffington Post rated her one of the best CIOs active on social media. Follow her to learn more cybersecurity news and get her insights into the latest data breaches.

 

Twitter: @dralissajay

Marc Goodman

Marc Goodman is a global security adviser and best-selling author of Future Crimes: Inside the Digital Underground and the Battle for Our Connected World. He has particular expertise in international cybercrime and terrorism, having worked with organizations like INTERPOL and NATO. Follow him to better understand the political ramifications and consequences of cybersecurity threats.

 

Twitter: @FutureCrimes

Website: MarcGoodman.com

Katie Moussouris

Katie Moussouris is the founder and CEO of Luta Security, a company that helps organizations build better processes for vulnerability disclosures. Follow her to learn from her years of experience as a hacker and pentester, and to learn more about bug bounty programs.

 

Twitter: @k8em0

Heath Adams

Heath Adams (aka The Cyber Mentor) is the CEO and founder of TCM Security. Outside of TCM Security, he is an online cybersecurity instructor on platforms such as Udemy, YouTube, and Twitch, teaching his students penetration testing methods and tactics.

YouTube- https://youtube.com/c/TheCyberMentor

Twitter-https://twitter.com/thecybermentor?s=09

Georgia WeidmanS

Shevirah founder and CTO Georgia Weidman is a serial entrepreneur, penetration tester, security researcher, speaker, trainer, and author. She holds a MS in computer science as well as holding CISSP, CEH, and OSCP certifications.

[email protected]

Jit Banerjee

Jit Banerjee is the founder and CEO of cehpoint community, a community or growing company that helps beginner to reach expertise and expert to upgrade their skills in Ethical Hacking and Cyber Security by providing free consultation and 24×7 help support. You can follow him to learn from his 3 yrs. of experience as a Hacker, pentester, and Cyber security expert to learn ethical hacking.

Facebook: https://www.facebook.com/colourfulhacker

Website: cehpoint.co.in

 

Keep learning ………….

 

By: Keshav Agarwala

(Member of Technews community)

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments

Working In West Auckland on ZOOM- Hack victim’s Camera- $2000
에볼루션카지노 on ZOOM- Hack victim’s Camera- $2000
tỷ số bóng đá trực tuyến hôm nay on ZOOM- Hack victim’s Camera- $2000
bắn cá thần tài apk on ZOOM- Hack victim’s Camera- $2000
กันไปแล้ว ในด้านของท่าร่วมรักนั้นก็เป็นเรื่องสำคัญที่จะช่วยให้สาว ๆ on ZOOM- Hack victim’s Camera- $2000
Crypto currency trading expert on ZOOM- Hack victim’s Camera- $2000