Jessica Lyons HardcastleThe Register
Becky Bracken, Editor, Dark ReadingDark Reading - Threat Intelligence
John Dwyer, Head of Research, IBM Security X-ForceDark Reading - Threat Intelligence
Dark Reading Staff, Dark ReadingDark Reading - Threat Intelligence
Steve FaehlMicrosoft Security Blog
Elizabeth Montalbano, Contributor, Dark ReadingDark Reading - Threat Intelligence
Microsoft Security ExpertsMicrosoft Security Blog
Etay Maor, Senior Director of Security Strategy, Cato NetworksDark Reading - Threat Intelligence
info@thehackernews.com (The Hacker News)The Hackers News
Bruce SchneierSchneier on Security
Kim ZetterWired
Dan Raywood, Senior Editor, Dark ReadingDark Reading - Threat Intelligence
N/ADark Reading - Threat Intelligence
Brandon VigliaroloThe Register
Matt Burgess, Lily Hay NewmanWired
N/ASANS ICS
Nate Nelson, Contributing Writer, Dark ReadingDark Reading - Threat Intelligence
Jai Vijayan, Contributing Writer, Dark ReadingDark Reading - Threat Intelligence
BrianKrebsKrebs on Security
Robert Lemos, Contributing Writer, Dark ReadingDark Reading - Threat Intelligence
Tara Seals, Managing Editor, News, Dark ReadingDark Reading - Threat Intelligence
Karen Spiegelman, Features EditorDark Reading - Threat Intelligence
Sam Crowther, Founder & CEO, KasadaDark Reading - Threat Intelligence
N/AESET
Paul KunertThe Register
Dhruv Mehrotra, Andrew CoutsWired
Edge Editors, Dark ReadingDark Reading - Threat Intelligence
Liam ProvenThe Register
Jamal Elmellas , Chief Operating Officer, Focus on SecurityDark Reading - Threat Intelligence
Curtis Franklin, Senior Analyst, OmdiaDark Reading - Threat Intelligence
Laura DobbersteinThe Register
CISAICS-Cert Advisories
Matt BurgessWired
Blair Cohen, Founder & President, AuthenticIDDark Reading - Threat Intelligence
Terence Harper, CISSP, Senior Sales Engineer, ErmeticDark Reading - Threat Intelligence
Vasu JakkalMicrosoft Security Blog