<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1076912843267184&amp;ev=PageView&amp;noscript=1">

RL Blog

|

20 application security pros you should follow

These leading app sec experts provide a steady flow of security knowledge to keep you up to speed.

John P. Mello Jr.
Blog Author

John P. Mello Jr., Freelance technology writer. Read More...

20 app sec pros to follow on social media

Keeping current with the latest developments in application security can be challenging and time-consuming. One way to make it less so is to have a go-to list of active online application security pros to follow who can keep you up to date on the latest security threats and trends, as well as best practices, through their social media, blogs, podcasts, and newsletters.

Here are 20 app sec pros that provide security practitioners and leaders with the knowledge they need to stay at the top of their game.

[ Want curated software supply chain security news? Subscribe to Chainmail ]

Sean Atkinson and Tony Sager 

Atkinson and Sager are co-hosts of the Cybersecurity Where You Are podcast, which is sponsored by the Center for Internet Security, a nonprofit organization whose mission is to make the connected world a safer place for people, businesses, and governments. In a typical podcast episode, the hosts and an expert guest or guests discuss a security topic. Recent episodes of CWYA include "Inside the 'Spidey Sense' of a Pentester," "Overcoming Pre-Audit Scaries Through Governance," and "Guiding Vendors to IoT Security by Design."

Cybersecurity Where You Are podcast

Kurt Baumgartner

Baumgartner is a principal security analyst with the global research and analysis team at the cybersecurity software company Kaspersky. He focuses on the analysis and exposure of advanced persistent threats, as well as the investigation of targeted attacks, mass exploits, and cyber-intrusions, and he talks about malware issues at international conferences  He can be found on both X, formerly Twitter, and Mastodon, although he's more active on X.


Kevin Beaumont

As a senior threat intelligence analyst at Microsoft, Beaumont is a frequent speaker at security conferences and author of the DoublePulsar blog, named for a nasty kernel-mode implant that was developed by the National Security Agency and leaked in 2017 to a hacker group called the Shadow Brokers. Recent blog entries discuss the distribution of Trojan-infected versions of a Hans Solo video role-playing game, unpatched server vulnerability at the Electoral Commission in the United Kingdom, and a backdoor discovered in a popular mobile device management product. Beaumont also tweets and posts to Mastodon.

Michael Burch

Recognizing how rapidly the world of application security is evolving, Security Journey, a maker of application security education tools to help developers and the entire software development lifecycle team recognize and understand vulnerabilities and threats and proactively mitigate them, launched the Security Champions podcast, hosted by Burch, who is the company’s applications security director. Episodes include discussions with development leaders and security experts about the latest headlines in the app sec world, as well as advice on building, maintaining, and scaling a successful security program.

 

Mark Curphey

Curphey writes the Crash Override blog and newsletter. He's a founder of OWASP, as well as of SourceClear, a cloud-native data security platform. SourceClear's software composition tool technology was acquired by Veracode in 2018. The blog has entries on product software certification, security tooling, and the latest developments in the company's open-source Chalk project. Chalk allows software developers, DevOps engineers, and security pros to gain visibility across development and production. Curphey also tweets at @VuduChief.

Crash Override
Royal Hansen

As the Google vice president of privacy, safety, and security, Hansen is focused on making the Internet safer for everyone. During his term at Google, he launched OSV Scanner, a tool that allows developers to scan for vulnerabilities in open-source software dependencies, led the development of the company's security incident response plan, and worked to improve the security of its products and services, such as Chrome, Android, and Gmail. Hansen is active on both X and LinkedIn.


Troy Hunt

Best known for his invaluable Have I Been Pwned website, which allows Internet users to check whether their personal data has been compromised in a data breach, Hunt is an Australian web security consultant and educator who has written several popular security-related courses on Pluralsight, a provider of video training courses for software developers and IT pros. In addition to conducting keynotes and workshops at conferences around the world, he writes a blog and is active on X and Mastodon, and has a YouTube channel.

 


James Kettle

Kettle is director of research at PortSwigger, which makes Burp, a suite of programs for web security scanning and application testing. Of the 10 most popular Burp extensions, Kettle has written three of them: ActiveScan++, HTTP Request Smuggler, and Backslash Powered Scanner. He has also made presentations on HTTP desync attacks at DEF CON, and on practical web cache poisoning at BlackHat USA. In addition to maintaining a dynamic personal web page with links to PortSwigger research, he is active on X, Mastodon, and LinkedIn.


Seth Law and Ken Johnson

Law, founder of the research and security consulting firm Redpoint, and Johnson, co-founder and CTO of DryRun Security, a maker of security software for developers, are hosts of the Absolute AppSec podcast. The podcast offers discussions on a wide range of application security topics, including contextual security analysis, scans, app sec research, threat modeling, Zip TLD, PyPI 2FA, AI poisoning, watering-hole attacks, and adversarial AI. Recent guests include Brian Walter of OpenContext, Evan Johnson of RunReveal, and Brian Joe of Impart Security. Both are active on X.


Jeremy Long

Developers who use software composition tools to determine if the libraries they're using are free of known security defects are likely to be familiar with Long's work. He wrote and maintains Dependency-Check, one of the earliest software composition tools to be offered to code warriors. His day job is as a principal security engineer at ServiceNow, a cloud-based platform that automates IT service management and other business processes, but he's also active on X and GitHub.


Melinda Marks

Marks is a senior analyst at TechTarget's Enterprise Strategy Group. She writes about cloud-native application protection platforms, cloud workload protection, cloud security posture management, DevSecOps, and application security, including web application security testing such as static AST, dynamic AST, interactive AST, software composition analysis, and API security. Her latest report on APIs delves into the challenges of securing APIs and how to build an effective security strategy so developers can safely utilize the power of APIs to build better applications. She's active on both X and LinkedIn.

 


Katie Moussouris

Bug bounty and vulnerability disclosure programs are Moussouris' specialty, which was honed working as chief policy officer for HackerOne and helping Microsoft and the U.S. Department of Defense set up their first bug bounty programs. Valuable knowledge can be gained by reading her blog at Luta Security, the company she founded. She's also very active on X, where she's garnered more than 116,000 followers.

Luta Security Blog

Jack Rhysider

Hackers, breaches, shadow government activity, hacktivism, and cybercrime are the subjects covered by Rhysider in his Darknet Diaries podcast. Episodes cover a range of subjects including the history of hacking and cybercrime, types of malware and how they work, and the dark web and how it is used for illegal activities, as well as stories about real-life hackers and cybercriminals and the latest trends in cybersecurity. In addition to his podcast, Rhysider is active on X and Discord. His website also has some cool T-shirts based on edgy original art created for his podcasts.


Chris Romeo

Application security and threat modeling are Romeo's forte, but he's had many roles over his long career, including trusted product evaluator, senior security consultant, penetration tester, director of incident response, chief security advocate at Cisco, and startup CEO at Security Journey. Currently, he is managing general partner at
Kerr Ventures, a cybersecurity startup investment and advisory firm. He also hosts or shares hosting duties for the Threat Modeling podcast, the Application Security podcast, and the Security Table podcast. In addition to his podcast activity, Romeo pens the Reasonable Application Security newsletter.

Application Security Podcast


Mike Shema

Shema, along with John Kinsella and Akira Brand, hosts the Application Security Weekly podcast sponsored by SC Magazine. The podcast delivers interviews and news about app sec, DevOps, DevSecOps and all the ways software flaws can be found and fixed. Recent episodes include "Security in a Cloud Native World & Mobile App Attacks,"
"Pointers and Perils for Presentations," "You’ve Got Appsec, But Do You Have Archsec?," "Identity and Verifiable Credentials in Cars," and "Navigating the Complexities of Development to Create Secure APIs."


Adam Shostack

As an active member of the security community (he's on the Black Hat review board and an emeritus member of the CVE advisory board) and an author (he's written Threat Modeling: Designing for Security and Threats: What Every Engineer Should Learn from Star Wars and co-wrote The New School of Information Security) Shostack brings some impressive credentials and valuable insights to his Shostack + Associates blog. Recent entries include "Threat Modeling and Secure by Design," "Valorizing Rule Breaking," and "Microsoft Can Fix Ransomware Tomorrow."

Adam Shostack Blog

smelly_vx

The mysterious smelly_vx is the guardian of vx-underground.org, the largest collection of malware source code, samples, and papers on the Internet. Smelly describes himself as in his early 30s, married, and a dog owner. Judging from his tweets at the vx-underground X account, he also has a sense of humor. The latest activity at the vx-underground website—addition of malware samples and new papers—as well as hacker news can also be found at the X account, which has more than 224,000 followers.


Sam Stepanyan

Stepanyan is an application security architect and leader of OWASP's London chapter. In addition to posting OWASP news and notices on his X and Mastodon accounts, Stepanyan riffs about data breaches, zero-day vulnerabilities, open-source licensing and other concerns of app sec practitioners.

Sam Stepanyan


Chris Wysopal

Cybersecurity has been in Wysopal’s blood for a long time. He was one of the original vulnerability researchers at the L0pht, a 1990s hacker think tank, where he was one of the first to publicize the risks of insecure software. He co-founded Veracode, which pioneered the concept of using automated static binary analysis to discover vulnerabilities in software, where he's now CTO. A well-known security expert, he's testified before Congress and has been interviewed by numerous publications and TV networks. He's active on LinkedIn, X, and Mastodon.

What do you have to gain?

Staying on top of the rapidly evolving field of application security requires dedication and diligent effort. Following respected leaders in the app sec community through their blogs, newsletters, podcasts, and social media is a good way to keep up with the latest threats, tools, and best practices. The diverse group of experts highlighted here represent valuable sources of insight covering a wide range of topics from software composition analysis to threat modeling to vulnerability disclosure.

Whether you're just starting out in application security or are an experienced practitioner looking to expand your knowledge, subscribing to a select set of app sec thought leaders will ensure that you have access to breaking news and innovative thinking in the field. Making an effort to regularly consume their commentary and advice will pay dividends in helping you master today's threats and prepare for tomorrow's.

[ Want curated software supply chain security news? Subscribe to Chainmail ]

Keep learning

Get up to speed with our special report: CSF 2.0 and C-SCRM for Software Risk Management. Plus: See the related expert panel discussion.

Understand key trends and get expert insights with our special report package: The State of Supply Chain Security (SSCS) 2024. Plus: Download the full State of SSCS report.

Learn key factors and best practices for managing software supply chain risk with Gartner's guidance. Plus: Watch the related Webinar and get the Gartner Report courtesy of RL.

Read about why you need to upgrade your AppSec tools for the SSCS era. Plus: Download and share RL's Buyer's Guide for SSCS.


Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for advanced file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

More Blog Posts

Introducing the Unified RL Spectra Suite

Introducing the Unified RL Spectra Suite

RL announced the Spectra Advanced File Analysis and Malware Detection suite, a strategic update of our malware analysis and threat hunting solutions for advanced file analysis and threat detection. Here’s what you need to know.
Read More

    Special Reports

    Latest Blog Posts

    Chinese APT Group Exploits SOHO Routers Chinese APT Group Exploits SOHO Routers

    Conversations About Threat Hunting and Software Supply Chain Security

    Reproducible Builds: Graduate Your Software Supply Chain Security Reproducible Builds: Graduate Your Software Supply Chain Security

    Glassboard conversations with ReversingLabs Field CISO Matt Rose

    Software Package Deconstruction: Video Conferencing Software Software Package Deconstruction: Video Conferencing Software

    Analyzing Risks To Your Software Supply Chain