In an era where mobile devices are central to our digital lives, robust mobile security has become paramount. Featured.com's directory showcases top-tier mobile security experts and cybersecurity professionals who are at the forefront of safeguarding smartphones, tablets, and IoT devices against evolving threats. These industry leaders regularly contribute their insights to premier publications, offering cutting-edge strategies on data protection, app security, and mobile threat detection. For journalists and content creators, our platform provides instant access to authoritative voices in mobile security, ensuring your articles are backed by credible, up-to-date expertise. Simultaneously, it offers security professionals a powerful avenue to amplify their thought leadership and connect with major media outlets. Explore our curated list of mobile security experts below to find the perfect source for your next article or to elevate your content with industry-leading insights.
Connect directly with our network of vetted mobile security experts for interviews, quotes, or in-depth analysis.
Many experts respond within hours to media requests
All experts undergo background and credential verification
No fees to connect with experts for legitimate media requests
Join our network of professionals and connect with journalists and publishers looking for your expertise.
Showing 20 of 7,774 experts
Security Consultant & Industry Writer at Cozmos Digital, LLC
David Santiago (@DavidSecurity) is a Certified Security Professional with over 15 years of operational experience in security management, risk assessment, and physical protection. A U.S. Marine Corps veteran, David’s background includes securing U.S. embassies abroad and leading campus-wide security operations at a State Department-sponsored international school in Tunis, Tunisia, during the Arab Spring. Today, David works as a security consultant helping physical security integrators, SaaS platforms, and risk management firms improve their content marketing, thought leadership, and client engagement strategies. He specializes in creating industry-specific content—such as case studies, technical guides, and white papers—that informs decision-makers and drives growth. Based in Orlando, Florida, David actively follows the latest trends in physical security. He advises clients, contributes to leading industry publications, and regularly participates in conferences as a writer and subject matter expert.
Featured In:
Owner at Security Done Easy
Alexia P. Idoura is a cybersecurity expert and founder of Security Done Easy, where she helps primarily women-led and lgbtq-led small businesses protect their companies without needing to be technical. She specializes in practical risk prioritization, cyber insurance readiness, phishing and fraud prevention, AI-related security risks, and translating complex cybersecurity concepts into plain English. Alexia is a Stevie Award–winning business blogger, a frequent speaker and educator, and the creator of tools and programs that help founders make confident, informed security decisions.
Featured In:
Senior Information Security Engineer at Scott Altiparmak
Scott Altiparmak is a Senior Information Security Engineer with 8+ years of experience spanning identity and access management, email security, and cloud security, with a focus on building and automating enterprise security programs end to end. He is the creator of Threat Terminal, a live game-based research platform studying how humans detect phishing in the generative AI era, and maintains open-source tools including Enterprise-Zapp and Threat Intelligence Tarot. He serves as Director of Programming for the South Florida ISSA chapter and speaks regularly at industry and academic events including Tech Hub Pulse 2026, PBSC CyberWeek, and the PBSC Cybersecurity Symposium.
Featured In:
Owner, Principal Security-Risk Consultant at North Star Group
I’m a security consultant and the founder of North Star Group, where I help individuals, organizations, and communities strengthen their overall safety and preparedness. With over 20 years of experience across military and private-sector security, my work focuses on physical security assessments, threat and vulnerability analysis, CPTED principles, workplace violence prevention, and expert witness consulting. I’ve supported clients across a wide range of sectors—including education, government, business, healthcare, critical infrastructure, and houses of worship—by providing practical, real-world guidance rooted in proactive risk management. Whether it’s improving day-to-day security, planning for emergencies, or helping legal teams understand foreseeability and duty of care, I bring a layered and strategic approach to every situation. If you're looking for expert insight on how to build safer environments and reduce risk, I'm always open to contributing. *If any portion of my response is used, I’d appreciate attribution as follows: Daniel Loo, CPP®, PSS, SRMP — Principal Consultant at North Star Group, a Houston-based security and risk management firm.
Featured In:
Director of Solutions Engineering EMEA
For over 20 years, I've been on the front lines of cybersecurity, working with global organisations to help them answer critical questions like: "How effective are our security measures against a cyber attack?" My passion is empowering companies to identify and fortify their attack surface. I help leadership teams evaluate their security stack's effectiveness and build actionable roadmaps. Some of the topics I cover are Enterprise cybersecurity and strategy, culture and how it impacts cyber resilience. Emerging attacks and attacker innovation in ransomware and increasingly AI security risks. This passion for sharing actionable knowledge is why I also started writing my blog. It's my way of sharing ideas and providing insights for enterprise security defenders and educate the wider community. In my day-to-day role at Pentera, I lead a team of talented security engineers. We partner with leading organisations who are ready to embrace change. As a speaker and mentor, I enjoy challenging the norms, introducing disruptive technologies, and sharing best practices to raise the bar.
Featured In:
Expert Seo at Adult Advisor
As a Digital Privacy Advocate and Lead SEO at Adult Advisor, I specialize in auditing digital platforms for user safety, subscription transparency, and data security. My work involves reverse-engineering complex web architectures and ensuring platforms adhere to strict consumer protection standards. With extensive experience in technical SEO and digital marketing, I help bridge the gap between user experience and web security, analyzing how online ecosystems can protect consumers from predatory billing and data breaches. I frequently share insights on technical SEO strategy, affiliate marketing, and digital privacy.
Featured In:
Founder/CTO at getcybr, inc.
Cybersecurity expert with over a decade and a half of deep-dive experience, I bring an unparalleled level of understanding and expertise in strategic Cybersecurity planning, effective risk control, and pioneering product innovation. My career reflects my role as a reliable authority for organizations of all sizes, as well as an effective liaison with different regulatory bodies.
Featured In:
Cybersecurity Director at ITRES
Co-Founder of SG6, ITRES and DEV6. Cybersecurity consultant with a deep technical background. More than 20 years of experience in the fields of IT Security, Cybersecurity, Security Research and IT Best Practices. Dozens of acredited CVE vulnerabilities since Y2K. I publish practical offensive/defensive research: vulnerability analysis, exploitation notes, reverse engineering, and hardening/detection takeaways.
Featured In:
CEO & Cyber Security Consultant at HostBreach
Franco Velasquez is the CEO and founder of HostBreach, a cybersecurity advisory firm specializing in external cyber intelligence, attack surface analysis, and intelligence-driven advisory for defense contractors and regulated organizations. His work focuses on understanding how attackers identify, prioritize, and compromise targets using publicly available intelligence, often before traditional security controls detect activity. Franco advises organizations on CMMC readiness, CUI exposure, ransomware risk, and pre-incident threat visibility, helping leaders understand real-world risk beyond checklist compliance. He has experience working with OSINT-based reconnaissance, threat actor behavior analysis, and tabletop attack simulations aligned to observed intrusion patterns. He is frequently consulted on topics including ransomware trends, external exposure management, supply chain risk, and how attackers exploit misconfigurations and unpatched systems. Franco emphasizes practical, intelligence-led decision-making that helps organizations reduce risk before incidents occur.
Featured In:
Chief Security Strategist (CSS) | Senior Cyber Threat Intelligence Analyst | APT Hunter | National Security & MENA Threat Expert | Author | CISSP, CISO | Nullc0d3 at IntelX360 Cybersecurity Solutions
Cyber Threat Intelligence Leader | Nation-State Actor Hunter | Strategic Defense Architect With over 20 years at the forefront of cybersecurity—including senior roles in national security and government defense—I specialize in threat hunting, APT campaign attribution, and intelligence-driven defense. My career spans proactive threat detection, incident response, and mentoring high-stakes SOC/CTI teams in classified environments. I’ve led national-level threat hunting operations, correlated complex TTPs using MITRE ATT&CK, and produced actionable intelligence for executive stakeholders. My expertise includes SIEM, SOAR, threat intelligence platforms, and secure infrastructure design, with a deep focus on the MENA region’s cyber threat landscape. As the author of “Inside the Hacker Hunter’s Mind” and “Inside the Hacker Hunter’s Toolkit”, I share real-world insights into state-level threat actors, OSINT, malware analysis, and digital forensics. I’m passionate about mentoring the next generation of cyber defenders and building resilient, intelligence-led security postures. Let’s connect to discuss cybersecurity challenges, threat intelligence, or how I can contribute to your mission. Key Skills: Cyber Threat Intelligence | APT Attribution | Incident Response | Threat Hunting | SIEM/SOAR | MITRE ATT&CK | OSINT | Malware Analysis | Secure Infrastructure | Executive Reporting | Python/C# Automation | MENA Threat Context
Featured In:
Head of Security
Dr. Connie McIntosh is a cybersecurity executive, academic, mentor and international speaker. She currently serves as Head of Security at Ericsson. Dr. McIntosh integrates cybersecurity, information security, product security, operational security, and data privacy into business strategy, fostering psychological safety and cultural transformation in traditionally siloed environments. Her background is in National Security and Cyber Defense working in in key Cybersecurity Leadership roles across Defense and Government classified networks, Academia and private enterprise. Her leadership has earned her accolades such as being named among the Top 100 Women in Cybersecurity by US Cyber Defense Magazine and the Black Unicorn Award at Black Hat 2020. In 2025, she was awarded the prestigious Global Recognition Award for Leadership Excellence in cybersecurity underscoring her global recognition and influence along with 2025 Young Leader of the Year - The Fast Mode Awards 2025 recognizing exceptional individuals whose leadership, resilience, and technical depth continue to elevate the global telecom ecosystem. Connie's contributions to cybersecurity have been featured in influential books and magazines, including the groundbreaking Women4Cyber's own "Europe's Top Women in Security, Hacking Gender Barriers", along with "The Rise of Cyber Women Vol 3", "Shining the Spotlight - Stories for Business Success." and others.
Featured In:
CEO at Coleman Technologies
Darren Coleman is a cybersecurity expert, technology strategist, and founder of Coleman Technologies, a managed IT services and cybersecurity firm helping organizations across North America reduce cyber risk and modernize their IT infrastructure. Since founding Coleman Technologies in 1999, Darren has advised business leaders on cybersecurity, ransomware protection, cloud strategy, and the evolving risks of the dark web. He is a recognized speaker on cybersecurity and emerging technology trends, including artificial intelligence and AI-driven business productivity. Darren has spoken at the Harvard Business Expert Forum and has appeared in media outlets discussing cybercrime, cybersecurity awareness, and technology risk. He is also a contributing author to the Amazon bestselling cybersecurity book Easy Prey: How to Protect Your Business from Data Breach, Cybercrime and Employee Fraud. Through his work with Coleman Technologies, Darren helps organizations implement proactive cybersecurity strategies, AI-enabled productivity tools, and managed IT services designed to improve operational reliability and protect critical business systems. Website: https://colemantechnologies.com
Featured In:
Director at Cyphere
Harman Singh, director at respected consultancy Cyphere, is an experienced security professional consulting public and private sector customers across the globe. He brings over a decade of intensive consulting experience, advising both private and public sector organisations on security matters around offensive and defensive security, particularly SOC operations maturity, CREST pen testing, risk and governance. Harman is recognised for his teaching ability; he is not just a consultant, but an educator of other experts: Black Hat Trainer: He has delivered advanced, practical training sessions at the prestigious Black Hat security conferences. Advanced Hacking: His training focuses on sophisticated techniques for attacking and defending complex digital infrastructure, upskilling security teams worldwide. Corporate Consulting: Beyond training, he possesses extensive experience consulting with corporate security teams, helping them manage threats across traditional networks and cloud-based systems. His insights—covering regulatory compliance, comments and best practices—are frequently featured in publications such as Infosecurity Magazine and Fast Company.
Featured In:
Privacy Expert at Cyber Insider
I have over 30 years experience as an Electrical Engineer, Technical Writer, and Documentation Manager. I worked in technical areas including avionics, systems integration, mobile software, SaaS. Several years ago I left the corporate world to care for sick parents. I supported myself building websites, writing technical “how-to” books, and leading online courses. Now, with family issues behind me, I have the time to take on some freelance clients. My atypical career path taught me to work well with a wide range of clients and audiences. Clients like Honeywell and Microsoft, McGraw-Hill and other book publishers, even pre-IPO startups. Audiences from computer beginners, to B2B buyers, to engineers building aircraft systems. I'm skilled at learning complex technologies like VPNs and cryptocurrencies. And I excel at turning that raw data into understandable content for a target audience. I am looking to contribute to projects that need these skills. I'm particularly interested in subjects that empower individuals such as online privacy.
Featured In:
Chief Hacker at ioSENTRIX
Omair Manzoor is the Founder and CEO of ioSENTRIX, a cybersecurity firm specializing in Penetration Testing as a Service (PTaaS), application security, and AI/ML security assessments. ioSENTRIX serves mid-market and enterprise clients across financial services, healthcare, SaaS, and critical infrastructure — delivering continuous security testing through a hybrid human-AI approach with audit-ready deliverables mapped to SOC 2, ISO 27001, HIPAA, and PCI DSS frameworks. The company has been featured in FOX News, NBC, CBS, AP, ABC News, Business Insider, and Yahoo Finance, and is listed on AWS Marketplace and G2. Omair's areas of expertise include penetration testing strategy, PTaaS implementation, AI/LLM security and red teaming, application security program development, vibe coding security risks, compliance-driven security testing, and continuous threat exposure management (CTEM).
Featured In:
Education Technology Consultant at RootED K12 Solutions
Mark Racine is a veteran K-12 technology leader with 20 years of experience navigating the digital evolution of urban school districts. Mark specializes in translating complex cybersecurity threats and AI governance into actionable leadership strategies. Known for his 'foundation-first' approach, he helps school leaders build sustainable IT ecosystems that protect student data while empowering classroom innovation. Former CIO for a large urban school district, founder of Rooted K-12, and and co-host of the K-12 Tech Talk podcast.
Featured In:
Editor-in-Chief at TECNOLOGIA GEEK
Henry Ramirez is the CEO of Tecnología Geek LLC, a verified technology news media outlet serving the Hispanic community in the US and Latin America. With a background in intelligence and computing, Henry specializes in translating complex cybersecurity trends and Artificial Intelligence developments for Spanish-speaking audiences. He leads editorial strategies focused on digital safety, consumer privacy, and the intersection of politics and technology. As a recognized voice in the industry, Henry provides expert analysis on how emerging technologies affect minority communities and small businesses. His work is dedicated to combating digital fraud and educating the public on the future of tech.
Featured In:
Security Expert at 4Freedom Mobile
Featured In:
Founder/CEO at Connextivity
Kevin Chen is the founder/CEO of Connextivity, a New York-based international security consulting firm specializing in commercial and government security management. He is a Certified Protection Professional (CPP®)- board certified in security management, Certified Security Project Manager (CSPM®), and a New York State licensed security and fire alarm installer. He has numerous manufacturer certifications, including from Axis, Milestone, and AWS, and works with Government and commercial clients, and their security and property management teams, providing end-to-end security assessments, consulting, engineering, installation, and commissioning services for military bases and offices domestically and abroad. He is at the forefront of the latest physical security technology, constantly testing, vetting, and field testing through real-world implementation, for a proactive approach towards security, including the use and proper configuration of license plate, thermal, 360-degree, and auto-tracking cameras, as well as gun and gunshot detection, intrusion, loitering, and other AI analytics. Kevin has a background in IT and Business Strategy consulting, where he has led large scale IT transformation, technology innovation, and commercial incubators for the Federal Government, Fortune 500 companies, and startups, navigating go-to-market strategy, marketing, talent, alliance, IT architecture, and regulatory, financial, and business continuity risk.
Featured In:
Security Engineer at Turo
An experienced security professional helping security folks discover their best with HealthyByte. Previously built and led secure design functions at Insight, secured and protected thousands of websites per day at SiteLock alongside malware research at Sectigo, and currently building and scaling security for millions of rental cars at Turo. I’m curious and a lifetime learner across every field. Areas of Expertise & Interest: ‣ Enterprise/Corporate Security ‣ Infrastructure Security ‣ AWS Cloud Security ‣ Offensive Security (Red Teaming) ‣ Incident Detection and Response
Showing 20 of 7774 experts
Publishers can enhance their content's credibility and value by incorporating insights from mobile security experts. These specialists can provide authoritative comments on current mobile threats, offer practical tips for readers to protect their devices, and explain complex security concepts in accessible terms. This expert input can boost reader engagement, establish the publication as a trusted source, and potentially increase organic traffic through relevant, high-quality content.
Mobile security experts on Featured.com can significantly expand their professional visibility and thought leadership. They gain opportunities to be quoted in reputable publications, potentially reaching millions of readers. This exposure can lead to new business opportunities, speaking engagements, and collaborations within the industry. Additionally, experts can build their personal brand and establish themselves as go-to authorities in the rapidly evolving field of mobile security.
Featured.com offers access to a diverse range of mobile security experts, including cybersecurity professionals, app developers, network security specialists, and digital forensics analysts. These experts can provide insights on topics such as mobile malware protection, secure app development, mobile device management, and emerging threats in the mobile landscape.
High-demand topics for mobile security expert commentary include 5G network security implications, the rise of mobile-based phishing attacks, best practices for secure remote work on mobile devices, emerging AI-powered mobile threats, and the impact of privacy regulations on mobile app development. Experts who can provide insights on these trending subjects are particularly valuable to publishers looking to create timely and relevant content for their audiences.