SpiderOak
SECURITY – rule 11 reader
Oliver Trevor
Security Weekly
The Dark Tangent
Security Weekly
Drew Koenig
Black Hat Briefings
Conor Gilsenan
The Dark Tangent
The Dark Tangent
Design Gold
Security Weekly
TJ Burbank
DEF CON
DEF CON
DEF CON
None
SearchSecurity.com
Cyolo
dtangent@defcon.org (The Dark Tangent)
dtangent@defcon.org (The Dark Tangent)
Praveen Vadnala, Lukasz Chmielewski
Decipher
SE Labs
DEF CON
Alex Amiryan
Security Weekly
Liz Denys & Geoffrey Thomas
The Dark Tangent
Paul F. Roberts
Jared Rimer
None
Security Weekly
Security Weekly
Tanya Janca - SheHacksPurple
Jemurai
Cybersecurity Growth
Hackedemy
Cisco Systems
Minnesota State University, Mankato
Patchstack Weekly
Rakhi Wadhwani
Brian Johnson
Tobin Solutions
1Password
Mark Fonseca Rendeiro
None
Sanjay Vaid
guy shurki
Mike Matchett and Warren Avery
Chris Glanden
Acreto Security
Finn
Roan
paul@securityweekly.com
ethanwarner
Mike Mimoso, Chris Brook
Dan Kuykendall
Helpdesk Miles
Tom Garrison and Camille Morhardt
Josh Amishav
Paul Mazumdar
Black Lantern Security
Josh Bressers & Kurt Seifried
Timothy De Block
peter
Secure Ideas LLC.
Andrew Morgan
Brian King Archives - Black Hills Information Security
Steve Stonebraker
Security Weekly
Dan Kuykendall
Phishing Archives - Black Hills Information Security
Security Weekly Productions
IDG
Durgesh Kalya
YusufOnSecurity.Com
CyberWire, Inc.
Shon Gerber, CISO, CISSP, Cybersecurity Author and Entrepreneur
Web App Archives - Black Hills Information Security
Hannah Boothe, Dima Kotik, and Michael Burch
Jack Rhysider
Security Sales & Integration
Zanidd
None
University of Bristol and the CyberWire
Tek or Die
University of Twente
Security Journey
IDG
Paul Asadoorian
martin