TOP 15 Identity Security Accounts to follow on X (formerly Twitter)

TOP 15 Identity Security Accounts to follow on X (formerly Twitter)
Oasis Team

Oasis Team

Published on

June 13, 2024

For any InfoSec pro, staying ahead with the latest industry buzz is crucial, and X  is a goldmine. But with 556 million active users, sifting through can be daunting.

Fear not! We've scoured the Twittersphere (yes, all 556 million of them!) to bring you the top 15 influencers and thought leaders in InfoSec, listed below in no particular order.

Steve Wilson


Steve Wilson is principal digital safety analyst at Constellation Research and founder of the Lockstep Group, an Australian digital identity and privacy consultancy.

John Fontana


John Fontana is a ZDNet blogger and ‘Identity Evangelist’ for Yubico. Fontana is an active user, but not so active that he’ll flood your feed with junk.

Jackson Shaw


Jackson Shaw is a senior director of product management for Dell Software and an expert in all things IAM.

Andras Cser


Andras Cser is Forrester Research’s Principal Analyst covering Identity and Access Management and Fraud Management. Cser is a leading expert on identity management, access management, user account provisioning, entitlement management, federation, privileged identity management, and role design and management.

FIDO Alliance


FIDO is a non-profit organization working to make authentication simpler, safer, and more reliable. FIDO Alliance board members include executives from Microsoft, Google, Lenovo, and Bank of America.

Brian Krebs


Brian Krebs is an independent investigative journalist covering cybercrime. Krebs was formerly a security reporter at The Washington Post and is currently the author of the popular Krebs on Security blog.  At The Washington Post, Krebs  won widespread recognition for his work exposing some of the biggest corporate data breaches of all time, such as the ones at Target and Home Depot.

Ian Glazer


Ian Glazer is Senior Director of Identity at, and a formal member of the Gartner blog network as research leader for Gartner’s identity and privacy strategies team. Once named one of the top 100 most powerful voices in security by Sys-Con Media.

Simon Moffatt


Simon Moffatt is the founder and research analyst at The Cyber Hut, a boutique firm providing independent and impartial analysis, advisory, and education services to clients worldwide. He is also a co-host of The Week in Identity podcast, where he discusses the latest news, trends, and innovations in the identity and access management landscape.

University of Texas Center for Identity


The University of Texas Center for Identity (UT CID) is a leading center of research and education in the fields of identity management, privacy, and security. UT CID’s Twitter account is an invaluable resource for the latest identity research and thought leadership.

Graham Cluley


Graham Cluley is a British security blogger and the author of Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011 and was given an honorary mention in the “10 Greatest Britons in IT History” for his contribution as a leading authority in Internet security.

Lasse Andresen


Lasse Anresen is the CTO and founder of Forgerock and an expert on cloud computing, identity and access management, web 2.0, infrastructure software, open source, distributed organizations, and leadership

Heather Flanagan


Heather Flanagan is the owner of Spherical Cow, a consulting company that supports collaborations in the Internet Identity space, and a project manager and coordinator for Identity and Access Management leading edge efforts in the realm of academic and research identity management.

Paul Asadoorian


Paul Asadoorian is the founder of Security Weekly, a popular series of podcasts and webcasts covering security-related topics. Asadoorian was formerly an instructor at the SANS Institute and is currently working as  a product evangelist for Tenable Network Security.

Paul Dube


Paul Dube is the COO of Brivas Technologies and an expert on Identity Management, IDaaS, authentication, security, DTM, EVs, risk-based authorization, and access control.

More like this