#FFSec, March 8: Five infosec pros who stand out

Follow these names on Twitter. Together, they make cyberspace a more secure place. (copy and paste)

This week's standouts:

1.) @myrcurial: James Arlen is a self-described infosec geek, hacker, social activist, author, speaker and parent. Take it from me: He does all of those things exceptionally well, which is why we frequently use him as a source in articles. He also delivers his opinions on Twitter forcefully, unflinchingly and often amusingly.

2.) @benrothke: Ben Rothke is manager of information security at Wyndham Worldwide Corp., and the scribe of many security books and articles. We at CSO clearly value what he has to offer, since he has authored quite a few articles for us. He's a voice of reason, which we can never get enough of in this industry.

3.) @alexhutton: Alex Hutton is the man I go to when I need to understand the challenges of Big Data and risk better. I'm a better journalist because of what he's taught me, and his tweets will teach you a lot, too.

4.) @joshcorman: Josh Corman is one of today's leading voices on everything from secure coding (he is founder of Rugged Software) to the future of hacktivism. He has been called a security philosopher and I think that description fits. I've particularly appreciated his efforts in the past to break people of the mindset that PCI DSS compliance is THE roadmap to an ironclad defense.

5.) @stacythayer: Stacy Thayer is founder and executive director of the SOURCE conference. SOURCE Boston is one of my favorites in terms of the content provided and the networking opportunities. She inspires infosec pros to volunteer their time in organizing these events, and she is a consensus builder. You will learn much from her.

Get your morning news fix with the daily Salted Hash e-newsletter! Sign up today.

Also recommended for following:

@lothie, @JodieSwafford, @headhntr, @georgiaweidman

@spiderlabs, @OWASP, @Tactical_Intel @MichaelDPeters @cindyv   @lothie @SecureTom @chort0 @obscuresec @pdp11hacker @ITSecurity  @krypt3ia @shunkydave @humanhacker @Chimerically @anchisesbr  @thorsheim @securitygen

@davidoberry @K0nsp1racy @davienthemoose @MattJezorek @dave_rel1k @c4i @DaveMarcus @jpettorino @theprez98 @quentynblog @kairoer @mike_fabrico  @mtezna

@SecBarbie @ashimmy @beaker @falconsview @georgevhulme @jack_daniel @jtkeating @mgbits @SecRunner @WH1T3RABBIT

@bug_bear @spacerog @myrcurial @benrothke @jjx @dewzi @danielkennedy74 @lauren @Hack_the_Lab @selenakyle

@wardspan @nselby @hrbrmstr

@DrInfoSec @krowney @diami03 @securityninja @danphilpott @DDrazic @halvarflake @BrandenWilliams

 @0security @hackeracademy @InfoSec208 @jaysonstreet @jgarcia62 @darryl_macleod

@dsalons (for the legal perspective) @yo9fah @daveshackleford @pmhesse @wireheadlance @dlitchfield @kevinmitnick

@wimremes @DeathwishDuck @Steve_Hunt @jeffsieben @coolacid @randomuserid

@leighhollowell @petermannmc @Shpantzer @rybolov @csoandy @e_cowperthwaite @grecs

@wikidsystems @lmwalsh2112 @PHYSECTECH @BrianHonan @kriggins @MikD

@WeldPond @mckeay @ken5m1th @SecureSun @mmurray @dacort @wkandek @ivanristic @adamshostack @RafalLos @agent0x0 @rogueclown @alexhutton @joshcorman @armorguy

@quine @rmogull @treyford @gattaca @andrewsmhay @burgessct @mschafer and @lmacvittie @hypatiadotca

@451wendy @CaseyDunham @dallendoug @bknabe @jeremiahg@tottenkoph @stacythayer @pauldotcom @donicer @aloria @SilverstoneA @SecurityBSides @NAISG_atl

@quadling @kidko92 @lennyzeltser @sans_isc @nickf4rr

@jeremiahg @dakami @jsokoly @adamely @SecurityPortal @stacyasimpson  @mikko @daveaitel @gcluley @adamjodonnell @Techdulla

@SecurityExpert @attritionorg @ABCecurity @indi303

@spiresec @securityspeak @hack3rcon @humanhacker

CSO's Daily Dashboard gives you a one-stop view of latest business threats. We created it for you! Bookmark it! Use it!

To comment on this article and other CSO content, visit our Facebook page or our Twitter stream.
Insider: Hacking the elections: myths and realities
Notice to our Readers
We're now using social media to take your comments and feedback. Learn more about this here.