Chris Wysopal, Veracode

Chris was one of the first
security researchers I met, in 2000, when he and the rest of the L0pht
had just become part of @stake. I’ve probably interviewed him more
often than anyone else on this list and he’s helped me with dozens of
stories over the years. He always had five minutes to explain why I had
screwed something up (often), what a good story angle might be or why
an attack, vulnerability or trend was important (or not).

Chris was one of the first
security researchers I met, in 2000, when he and the rest of the L0pht
had just become part of @stake. I’ve probably interviewed him more
often than anyone else on this list and he’s helped me with dozens of
stories over the years. He always had five minutes to explain why I had
screwed something up (often), what a good story angle might be or why
an attack, vulnerability or trend was important (or not). He has the
institutional memory of having been in the industry for close to 20
years, both on the research side and corporate side and he knows where
the bodies are buried.

Suggested articles

2020 Cybersecurity Trends to Watch

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.

Top Mobile Security Stories of 2019

Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost’s Top 10 mobile security stories of 2019.