Our Authors

Cybersecurity aims to connect science and practice in the field of cybersecurity. To achieve this, we work with many distinguished experts and professionals, both from the science community as well as the industry.

We are always looking for contributors to Cybersecurity Magazine. Do you work in the cybersecurity industry and have an interesting topic to discuss? Are you researching a particular topic on Cybersecurity and would like to see this topic better represented? Do you want to comment on a current topic in the area of cybersecurity?

Whatever your motives, feel free to contact us with a short abstract of your topic. If it meets the requirements, we are happy to publish your article!

We would like to recognize and thank all of the contributors to Cybersecurity Magazine. Here is a list of our contributing authors:

Anand R. Prasad
Chief Information Security Officer at Rakuten Mobile Network | LinkedIn Profile

Anand is Chief Information Security Officer of Rakuten Mobile Network responsible of 4G, 5G and network security. Prior to joining Rakuten, Anand has over 20 years of experience in the mobile and wireless networking industry with key roles in NEC Corporation, NTT DOCOMO, Genista Corporation, Lucent Technologies and Uniden Corporation. Anand is an innovator with over 50 patents, a recognized keynote speaker (RSA, Global Wireless Summit (GWS), MWC, ICT etc.) and a prolific writer with 6 books & over 50 peer reviewed publications.

Anand is the Chairman of 3GPP SA3 -the mobile communications security and privacy group-, was governing council member of TSDSI, governing body member of GISFI, Fellow of IET, Fellow of IETE and Certified Information Systems Security Professional (CISSP).

Andre Smulders
Strategic Advisor Information Security | LinkedIn Profile
Bengt Sahlin
Research Leader, Networking Security at Nomadiclab, Ericsson Research | LinkedIn Profile
Christopher Murphy
Founder / Inventor / Chief Scientist / Cyber Security Theorist / Author / Public Speaker at Cyber Safety Harbor | LinkedIn Profile

The creator of Physical Presence technology, I start in the US Army as a Cartographic Draftsman. Honing my precision and attention to detail, I then shifted his focus to the world of software programming and would work as a Systems Analyst. With entrepreneurial flames burning, I then work as a software engineering consultant before taking the leap into my own venture. It was at this point when I first developed a method to prove presence on the internet by creating a digital state-of-existence.

Dave Palmer
Director of Technology at Darktrace

Dave Palmer is a cyber security technical expert with more than ten years' experience at the forefront of government intelligence operations. He has worked across UK intelligence agencies GCHQ and MI5, where he delivered mission-critical infrastructure services, including the replacement and security of entire global networks, the development of operational internet capabilities and the management of critical disaster recovery incidents. At Darktrace, Dave oversees the mathematics and engineering teams and product strategy. He holds a first class degree in Computer Science and Software Engineering from the University of Birmingham.

Edward Amoroso
Founder and CEO at TAG Cyber

Experienced Chief Executive Officer, Chief Security Officer, Chief Information Security Officer (second person to hold the CISO position in history), University Professor, Security Consultant, Keynote Speaker, Computer Science Researcher, and Prolific Author (six published books) with a demonstrated history of working in the telecommunications industry beginning at Bell Labs and leading to SVP/CSO position at AT&T. Skilled in Cyber Security, Network Architecture, Wide Area Network (WAN), Managed Services, and Network Design. Strong entrepreneurship professional with PhD in Computer Science from the Stevens Institute of Technology, and also a graduate of Columbia Business School. Directly served four Presidential Administrations in Cyber Security, and now serves as a Member of the M&T Bank Board of Directors, Senior Advisor for the Applied Physics Lab at Johns Hopkins University, Adjunct CS Professor at the Stevens Institute of Technology, CS Department Instructor at New York University, and Member of the NSA Advisory Board (NSAAB).

Fu Tianfu
Chief Security Architect at Huawei | LinkedIn Profile
Jörg Keller
Professor of computer engineering at Fernuniversität Hagen

Jörg Keller is a professor of computer engineering at FernUniversität in Hagen, Germany, and heads the Parallelism & VLSI group since 1996. His research interests are parallel and energy-efficient computing, security and fault-tolerance of computer systems, and web-based learning in engineering. He received MSc and PhD degrees from Saarland University, Germany, in 1989 and 1992, respectively, and spent his PostDoc phase at CWI (Netherlands Research Centre for Mathematics and Computer Science) in Amsterdam.

Matt Hurst
International Technical Director at Ribbon Communications | LinkedIn Profile

Highly experienced technical leader with a proven track record over 25 years of delivering advanced network solutions to meet demanding customer requirements and timescales.

Working at the leading edge of Cloud, Security, CPaaS, UCaaS, SDN/NFV & Unified Communications – trusted advisor to both partners and end customers, educating and supporting the adoption of secure cloud solutions within the Enterprise and Service Provider space.

Transitioning from an existing known architecture to a new model - be it UC, Cloud services or a fully virtualised model based around NFV can be a daunting prospect.

Mayur Dave
Deputy General Manager at Reliance Jio Infocomm Ltd. | LinkedIn Profile

- Experience in Technical Team Management, and Wireless Device Testing across the Telecom domain.

- Understanding and coordinating client’s needs / enhancements, customizing product accordingly and consulting with technical team to provide solutions as per the delivery schedules.

- Knowledge of Wireless/cellular technologies with sound understanding of 3GPP Standards/ Specifications.

- Adept in device testing, problem resolution & project coordination; technology training and supervising teams in quality, adherence to work order specifications and equipment maintenance.

- Team building, organisational and analytical skills coupled with demonstrated relationship management and communication abilities.

Ravikumar Jeevarathinam
Vice President Technology & Innovation Global Technology Centre at Lloyd's Register | LinkedIn Profile

Experienced Technopreneur with proven expertise in Digital Business Growth|Digital Transformation & Digital Innovation - Global Service Provider Network|Telecom|Mobile|Transport|M-Finance|Defence-Security|Retail|Healthcare|Energy|Consulting with over 20 years of experience in setting up and running business for technology companies with full P&L .responsibility (from startup to USD250M; infra advisory of Billion dollars) .One man start up to growing into a high growth organisation with a proven RoI. Pioneer in Wireless DAS indoor coverage solutions.
Creating and Nurturing Digital Talents across various industry verticals to accelerate digital business growth| Pioneer in introducing and implementing new digital technologies such as AI|DL|IoT|Bigdata-Analytics|Blockchain.
Merger & Acquisition (M&A) and instrumental in acquiring major technology companies.

Roger Piqueras Jover
CTO Security Architecture Team at Bloomberg L.P. | LinkedIn Profile

Subject matter expert on mobile/wireless/radio security, intrusion detection and machine learning applied to anomaly detection. Corporate strategy and technology leadership on network security architecture, mobile application and system security, access management and BlueTeam/RedTeam/PurpleTeam. Applied research on machine learning applied to intrusion and anomaly detection in corporate computer networks. Security and technology leadership in architecture design/test of corporate, customer and consumer mobile application tools. Research and development of new security systems and architectures to enhance the security of next-gen biometrics and two-factor authentication devices.

Security researcher and subject matter expert on security of mobile LTE and 5G networks, and wireless short-range networks (Bluetooth, 802.11, ZigBee, LoRa). Implementation and test of advanced LTE protocol exploits and LTE rogue base station prototypes. Leadership and expert advice on wireless security, LTE and 5G mobile network security to academia and government agencies.

Saffija Kasem-Madani
University of Bonn
Sander de Kievit
Security Architect at Rakuten Mobile, Inc. | LinkedIn Profile

A 5G Security Architecture Specialist with management experience. Skilled in 5G mobile networktechnology, IP creation and management, standards, and applied research in the field of security.Strong verbal skills and eager to learn.

Steffen Wendzel
Worms University of Applied Sciences
William Chow
Chief Technology Officer at Mobolize | LinkedIn Profile

Architect for multiple technology startups, leading product development from concept to sales (and ultimately to exit).

Wojciech Mazurczyk
Associate Professor at Warsaw University of Technology | LinkedIn Profile

Wojciech Mazurczyk holds D.Sc. (habilitation, 2014) and Ph.D. (2009) in telecommunications (with honours) from Warsaw University of Technology, Poland.

Associate Professor at Department of Cybersecurity, Institute of Telecommunications, Faculty of Electronics and Information Technology, Warsaw University of Technology. A member of the Parallelism and VLSI Group at Faculty of Mathematics and Computer Science at FernUniversitat, Germany

Author or co-author of 2 books, over 120 papers, 2 patent applications and over 35 invited talks. Involved in many international and domestic research project as a principal investigator or as a senior researcher. A guest editor of many special issues devoted to network security (among others: IEEE TDSC, IEEE S&P, IEEE Commag). Serving as Technical Program Committee Member of (among others): IEEE INFOCOM, IEEE GLOBECOM, IEEE ICC, IEEE LCN, IEEE CNS, IEEE WIFS and ACM IH&MMSec. From 2016 Editor-in-Chief of an open access Journal of Cyber Security and Mobility.

An Accredited Cybercrime Expert and Trainer for Europol EC3 (European Cybercrime Center). A founder and a coordinator of the Criminal Use of Information Hiding (CUIng) Initative launched in cooperation with Europol EC3. A founding member of EURASIP "Biometrics, Data Forensics and Security" (B.For.Sec) Special Area Team. IEEE Senior Member (2013-) and EURASIP member (2015-). Involved in the think thank of FP7 project CAMINO (Comprehensive Approach to cyber roadMap coordINation and develOpment) (2015-).

For over 10 years has been serving as the independent consultant in the fields of network security and telecommunications. Between 2003 and 2007 he was also a deployments specialist for the telecom company Suntech.

His research was covered by worldwide media numerous times including in "IEEE Spectrum", "New Scientist", "MIT Technology Review", "The Economist", "Der Spiegel", etc.