{"id":1100,"date":"2023-10-18T08:35:27","date_gmt":"2023-10-18T08:35:27","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/?p=1100"},"modified":"2023-10-18T08:35:27","modified_gmt":"2023-10-18T08:35:27","slug":"10-cybersecurity-experts-to-follow-on-social-media","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blog\/10-cybersecurity-experts-to-follow-on-social-media\/","title":{"rendered":"10 cybersecurity experts to follow on social media"},"content":{"rendered":"<p>The field of cybersecurity is rapidly evolving and adapting to new threats and technologies.<\/p>\n<p>The cost of cybercrime is expected to hit $10.5 trillion by 2025, according to a report by Cybersecurity Ventures. With countless threats looming in cyberspace, you might have questions about how to stay informed and protect your digital assets.<\/p>\n<p>An effective way to stay ahead of the curve is to follow cybersecurity experts on social media platforms. These individuals are subject matter experts who share their research and insights on the latest threats, cyber attack techniques and emerging trends in cybersecurity.<\/p>\n<p>But in this era of information overload with so many self-proclaimed experts on social media, it can be challenging to discern who the real experts are. This curated list addresses this issue, highlighting trustworthy and trending experts on cybersecurity.<\/p>\n<p><a href=\"https:\/\/www.techtarget.com\/whatis\/feature\/10-cybersecurity-experts-to-follow-on-social-media\">Read the Full Story Here<\/a><\/p>\n<p>Source: Tech Target<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The field of cybersecurity is rapidly evolving and adapting to new threats and technologies. The cost of cybercrime is expected to hit $10.5 trillion by 2025, according to a report by Cybersecurity Ventures. With countless threats looming in cyberspace, you might have questions about how to stay informed and protect your digital assets. An effective [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1102,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1100","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>10 cybersecurity experts to follow on social media - Community<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blog\/10-cybersecurity-experts-to-follow-on-social-media\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 cybersecurity experts to follow on social media - Community\" \/>\n<meta property=\"og:description\" content=\"The field of cybersecurity is rapidly evolving and adapting to new threats and technologies. The cost of cybercrime is expected to hit $10.5 trillion by 2025, according to a report by Cybersecurity Ventures. With countless threats looming in cyberspace, you might have questions about how to stay informed and protect your digital assets. An effective [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blog\/10-cybersecurity-experts-to-follow-on-social-media\/\" \/>\n<meta property=\"og:site_name\" content=\"Community\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-18T08:35:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/10\/pexels-magnus-mueller-2818118-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"1014\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/10-cybersecurity-experts-to-follow-on-social-media\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/10-cybersecurity-experts-to-follow-on-social-media\/\",\"name\":\"10 cybersecurity experts to follow on social media - Community\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/10-cybersecurity-experts-to-follow-on-social-media\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/10-cybersecurity-experts-to-follow-on-social-media\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/10\/pexels-magnus-mueller-2818118-1.jpg\",\"datePublished\":\"2023-10-18T08:35:27+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/10-cybersecurity-experts-to-follow-on-social-media\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blog\/10-cybersecurity-experts-to-follow-on-social-media\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/10-cybersecurity-experts-to-follow-on-social-media\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/10\/pexels-magnus-mueller-2818118-1.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/10\/pexels-magnus-mueller-2818118-1.jpg\",\"width\":1280,\"height\":1014},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/10-cybersecurity-experts-to-follow-on-social-media\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 cybersecurity experts to follow on social media\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/\",\"name\":\"Community\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"10 cybersecurity experts to follow on social media - Community","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blog\/10-cybersecurity-experts-to-follow-on-social-media\/","og_locale":"en_US","og_type":"article","og_title":"10 cybersecurity experts to follow on social media - Community","og_description":"The field of cybersecurity is rapidly evolving and adapting to new threats and technologies. The cost of cybercrime is expected to hit $10.5 trillion by 2025, according to a report by Cybersecurity Ventures. With countless threats looming in cyberspace, you might have questions about how to stay informed and protect your digital assets. An effective [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blog\/10-cybersecurity-experts-to-follow-on-social-media\/","og_site_name":"Community","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2023-10-18T08:35:27+00:00","og_image":[{"width":1280,"height":1014,"url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/10\/pexels-magnus-mueller-2818118-1.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/10-cybersecurity-experts-to-follow-on-social-media\/","url":"https:\/\/www.tsfactory.com\/forums\/blog\/10-cybersecurity-experts-to-follow-on-social-media\/","name":"10 cybersecurity experts to follow on social media - Community","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/10-cybersecurity-experts-to-follow-on-social-media\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/10-cybersecurity-experts-to-follow-on-social-media\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/10\/pexels-magnus-mueller-2818118-1.jpg","datePublished":"2023-10-18T08:35:27+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/10-cybersecurity-experts-to-follow-on-social-media\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blog\/10-cybersecurity-experts-to-follow-on-social-media\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/10-cybersecurity-experts-to-follow-on-social-media\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/10\/pexels-magnus-mueller-2818118-1.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/10\/pexels-magnus-mueller-2818118-1.jpg","width":1280,"height":1014},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/10-cybersecurity-experts-to-follow-on-social-media\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/"},{"@type":"ListItem","position":2,"name":"10 cybersecurity experts to follow on social media"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/#website","url":"https:\/\/www.tsfactory.com\/forums\/","name":"Community","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/1100","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/comments?post=1100"}],"version-history":[{"count":1,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/1100\/revisions"}],"predecessor-version":[{"id":1103,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/1100\/revisions\/1103"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media\/1102"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media?parent=1100"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/categories?post=1100"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/tags?post=1100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}