Our Authors

Cybersecurity aims to connect science and practice in the field of cybersecurity. To achieve this, we work with many distinguished experts and professionals, both from the science community as well as the industry.

We are always looking for contributors to Cybersecurity Magazine. Do you work in the cybersecurity industry and have an interesting topic to discuss? Are you researching a particular topic on Cybersecurity and would like to see this topic better represented? Do you want to comment on a current topic in the area of cybersecurity?

Whatever your motives, feel free to contact us with a short abstract of your topic. If it meets the requirements, we are happy to publish your article!

We would like to recognize and thank all of the contributors to Cybersecurity Magazine. Here is a list of our contributing authors:

Anand R. Prasad
Chief Information Security Officer at Rakuten Mobile Network | LinkedIn Profile

Anand is Chief Information Security Officer of Rakuten Mobile Network responsible of 4G, 5G and network security. Prior to joining Rakuten, Anand has over 20 years of experience in the mobile and wireless networking industry with key roles in NEC Corporation, NTT DOCOMO, Genista Corporation, Lucent Technologies and Uniden Corporation. Anand is an innovator with over 50 patents, a recognized keynote speaker (RSA, Global Wireless Summit (GWS), MWC, ICT etc.) and a prolific writer with 6 books & over 50 peer reviewed publications.

Anand is the Chairman of 3GPP SA3 -the mobile communications security and privacy group-, was governing council member of TSDSI, governing body member of GISFI, Fellow of IET, Fellow of IETE and Certified Information Systems Security Professional (CISSP).

Andre Smulders
Strategic Advisor Information Security | LinkedIn Profile
Bengt Sahlin
Research Leader, Networking Security at Nomadiclab, Ericsson Research | LinkedIn Profile
Christopher Murphy
Founder / Inventor / Chief Scientist / Cyber Security Theorist / Author / Public Speaker at Cyber Safety Harbor | LinkedIn Profile

The creator of Physical Presence technology, I start in the US Army as a Cartographic Draftsman. Honing my precision and attention to detail, I then shifted his focus to the world of software programming and would work as a Systems Analyst. With entrepreneurial flames burning, I then work as a software engineering consultant before taking the leap into my own venture. It was at this point when I first developed a method to prove presence on the internet by creating a digital state-of-existence.

Cindy Blake
Sr. Product Marketing Manager - Security at | LinkedIn Profile

Cindy is a solutions strategist with a focus on cyber security and experience as an IT leader and a developer. She's passionate about making application security mainstream by changing the market: how app sec tools are used, by whom, and what outcome is expected. Ask her about pragmatic steps to truly integrate security into DevOps using workflows that are more effective, efficient, and transparent.

Her book, "10 steps every CISO should take to secure next generation software" is intended to help security professionals understand how software development is changing and the impact upon security programs. Application security especially must evolve if it is to be effective and relevant amongst DevOps, containers, orchestrators and micro services.

Dave Palmer
Director of Technology at Darktrace

Dave Palmer is a cyber security technical expert with more than ten years' experience at the forefront of government intelligence operations. He has worked across UK intelligence agencies GCHQ and MI5, where he delivered mission-critical infrastructure services, including the replacement and security of entire global networks, the development of operational internet capabilities and the management of critical disaster recovery incidents. At Darktrace, Dave oversees the mathematics and engineering teams and product strategy. He holds a first class degree in Computer Science and Software Engineering from the University of Birmingham.

Dr. Varin Khera
Lead Security Consultant – Asia Pacific at Nokia Networks | LinkedIn Profile

Dr. Varin Khera is the resident security expert in Nokia Software in the Asia Pacific Region. He has worked with almost every major CSP across the APAC region in his 20 years of being a security practitioner, helping stakeholders develop cyber security practices and build out/ adopt security systems to secure their operations and networks.

In his current role in Nokia Software, Dr. Khera is mainly responsible for providing guidance to CSP stakeholders in addressing their security concerns and requirements. His mandate is to recommend cutting-edge technologies that Nokia offers in the context of establishing a defendable network architecture for customers. He also provides training to customer stakeholders and partners on the use of these technologies.

Dr. Khera hold a bachelor’s degree in information technology from Central Queensland University, a Postgraduate Certificate in Network Computing from Monash University, a Master of Science degree from Assumption University, a Doctor of Information Technology (DIT) from Murdoch University and a Certificate of Executive Leadership from Cornell University together with various other professional certifications. Dr. Khera was awarded the prestigious Asia Pacific Information Security Leadership Awards (ISLA) from ISC2 a world leading information security certification body under the category of distinguished IT Security Practitioner for APAC in 2007.

Edward Amoroso
Founder and CEO at TAG Cyber

Experienced Chief Executive Officer, Chief Security Officer, Chief Information Security Officer (second person to hold the CISO position in history), University Professor, Security Consultant, Keynote Speaker, Computer Science Researcher, and Prolific Author (six published books) with a demonstrated history of working in the telecommunications industry beginning at Bell Labs and leading to SVP/CSO position at AT&T. Skilled in Cyber Security, Network Architecture, Wide Area Network (WAN), Managed Services, and Network Design. Strong entrepreneurship professional with PhD in Computer Science from the Stevens Institute of Technology, and also a graduate of Columbia Business School. Directly served four Presidential Administrations in Cyber Security, and now serves as a Member of the M&T Bank Board of Directors, Senior Advisor for the Applied Physics Lab at Johns Hopkins University, Adjunct CS Professor at the Stevens Institute of Technology, CS Department Instructor at New York University, and Member of the NSA Advisory Board (NSAAB).

Fu Tianfu
Chief Security Architect at Huawei | LinkedIn Profile
Galina Antova
Co-founder and Chief Business Development Officer at | LinkedIn Profile

Galina Antova is the Co-founder and Chief Business Development Officer at Claroty. Prior to co-founding the company, she was the Global Head of Industrial Security Services at Siemens overseeing the development of its portfolio of services that protect industrial customers against cyber-attacks. While at Siemens, she was also responsible for leading the Cyber Security Practice and the Cyber Security Operations Center providing managed security services for industrial control systems operators. Previously, Galina was with IBM in Canada in various roles in the Provisioning and Cloud Solutions business. She holds a BS in Computer Science from York University in Toronto, and an MBA from IMD in Lausanne, Switzerland.

Gerhard Kafka

Gerhard Kafka is a free-lance journalist and contributor at Smart Industry.

Holger Stumm
CEO & Founder at log(2) oHG | LinkedIn Profile
Jörg Keller
Professor of computer engineering at Fernuniversität Hagen

Jörg Keller is a professor of computer engineering at FernUniversität in Hagen, Germany, and heads the Parallelism & VLSI group since 1996. His research interests are parallel and energy-efficient computing, security and fault-tolerance of computer systems, and web-based learning in engineering. He received MSc and PhD degrees from Saarland University, Germany, in 1989 and 1992, respectively, and spent his PostDoc phase at CWI (Netherlands Research Centre for Mathematics and Computer Science) in Amsterdam.

Mark Loveless
Senior Security Researcher at

Mark Loveless is a Senior Security Researcher at GitLab. His past employers have included startups, large corporations, hardware and software vendors, and even a government think tank. He has spoken at numerous security and hacker conferences worldwide on security and privacy topics, including Black Hat, DEF CON, ShmooCon, RSA, AusCERT, SANS among others. He has been quoted in television, online, and print media outlets as a security expert, including CNN, Washington Post, New York Times, and many others. He loves blogging, performing death metal, ghost hunting, and is an ordained minister.

Matt Hurst
International Technical Director at Ribbon Communications | LinkedIn Profile

Highly experienced technical leader with a proven track record over 25 years of delivering advanced network solutions to meet demanding customer requirements and timescales.

Working at the leading edge of Cloud, Security, CPaaS, UCaaS, SDN/NFV & Unified Communications – trusted advisor to both partners and end customers, educating and supporting the adoption of secure cloud solutions within the Enterprise and Service Provider space.

Transitioning from an existing known architecture to a new model - be it UC, Cloud services or a fully virtualised model based around NFV can be a daunting prospect.

Mayur Dave
Deputy General Manager at Reliance Jio Infocomm Ltd. | LinkedIn Profile

- Experience in Technical Team Management, and Wireless Device Testing across the Telecom domain.

- Understanding and coordinating client’s needs / enhancements, customizing product accordingly and consulting with technical team to provide solutions as per the delivery schedules.

- Knowledge of Wireless/cellular technologies with sound understanding of 3GPP Standards/ Specifications.

- Adept in device testing, problem resolution & project coordination; technology training and supervising teams in quality, adherence to work order specifications and equipment maintenance.

- Team building, organisational and analytical skills coupled with demonstrated relationship management and communication abilities.

Prof. Ahmed Banafa

Prof. Ahmed Banafa has extensive research work with focus on IoT, Blockchain, cybersecurity and AI. He served as a faculty at well-known universities and colleges.

He is the recipient of several awards, including Distinguished Tenured Staff Award, Instructor of the year and Certificate of Honor from the City and County of San Francisco.

He was named as No.1 tech voice to follow by LinkedIn (with 38k+ followers ), featured in Forbes, IEEE-IoT and MIT Technology Review, with frequent appearances on ABC, CBS, NBC, BBC and Fox TV and Radio stations.

He studied Electrical Engineering at Lehigh University, Cybersecurity at Harvard University, and Digital Transformation at MIT.

Ravikumar Jeevarathinam
Vice President Technology & Innovation Global Technology Centre at Lloyd's Register | LinkedIn Profile

Experienced Technopreneur with proven expertise in Digital Business Growth|Digital Transformation & Digital Innovation - Global Service Provider Network|Telecom|Mobile|Transport|M-Finance|Defence-Security|Retail|Healthcare|Energy|Consulting with over 20 years of experience in setting up and running business for technology companies with full P&L .responsibility (from startup to USD250M; infra advisory of Billion dollars) .One man start up to growing into a high growth organisation with a proven RoI. Pioneer in Wireless DAS indoor coverage solutions.
Creating and Nurturing Digital Talents across various industry verticals to accelerate digital business growth| Pioneer in introducing and implementing new digital technologies such as AI|DL|IoT|Bigdata-Analytics|Blockchain.
Merger & Acquisition (M&A) and instrumental in acquiring major technology companies.

Roger Piqueras Jover
CTO Security Architecture Team at Bloomberg L.P. | LinkedIn Profile

Subject matter expert on mobile/wireless/radio security, intrusion detection and machine learning applied to anomaly detection. Corporate strategy and technology leadership on network security architecture, mobile application and system security, access management and BlueTeam/RedTeam/PurpleTeam. Applied research on machine learning applied to intrusion and anomaly detection in corporate computer networks. Security and technology leadership in architecture design/test of corporate, customer and consumer mobile application tools. Research and development of new security systems and architectures to enhance the security of next-gen biometrics and two-factor authentication devices.

Security researcher and subject matter expert on security of mobile LTE and 5G networks, and wireless short-range networks (Bluetooth, 802.11, ZigBee, LoRa). Implementation and test of advanced LTE protocol exploits and LTE rogue base station prototypes. Leadership and expert advice on wireless security, LTE and 5G mobile network security to academia and government agencies.

Saffija Kasem-Madani
University of Bonn
Sander de Kievit
Security Architect at Rakuten Mobile, Inc. | LinkedIn Profile

A 5G Security Architecture Specialist with management experience. Skilled in 5G mobile networktechnology, IP creation and management, standards, and applied research in the field of security.Strong verbal skills and eager to learn.

Steffen Wendzel
Worms University of Applied Sciences
William Chow
Chief Technology Officer at Mobolize | LinkedIn Profile

Architect for multiple technology startups, leading product development from concept to sales (and ultimately to exit).

Wojciech Mazurczyk
Associate Professor at Warsaw University of Technology | LinkedIn Profile

Wojciech Mazurczyk holds D.Sc. (habilitation, 2014) and Ph.D. (2009) in telecommunications (with honours) from Warsaw University of Technology, Poland.

Associate Professor at Department of Cybersecurity, Institute of Telecommunications, Faculty of Electronics and Information Technology, Warsaw University of Technology. A member of the Parallelism and VLSI Group at Faculty of Mathematics and Computer Science at FernUniversitat, Germany

Author or co-author of 2 books, over 120 papers, 2 patent applications and over 35 invited talks. Involved in many international and domestic research project as a principal investigator or as a senior researcher. A guest editor of many special issues devoted to network security (among others: IEEE TDSC, IEEE S&P, IEEE Commag). Serving as Technical Program Committee Member of (among others): IEEE INFOCOM, IEEE GLOBECOM, IEEE ICC, IEEE LCN, IEEE CNS, IEEE WIFS and ACM IH&MMSec. From 2016 Editor-in-Chief of an open access Journal of Cyber Security and Mobility.

An Accredited Cybercrime Expert and Trainer for Europol EC3 (European Cybercrime Center). A founder and a coordinator of the Criminal Use of Information Hiding (CUIng) Initative launched in cooperation with Europol EC3. A founding member of EURASIP "Biometrics, Data Forensics and Security" (B.For.Sec) Special Area Team. IEEE Senior Member (2013-) and EURASIP member (2015-). Involved in the think thank of FP7 project CAMINO (Comprehensive Approach to cyber roadMap coordINation and develOpment) (2015-).

For over 10 years has been serving as the independent consultant in the fields of network security and telecommunications. Between 2003 and 2007 he was also a deployments specialist for the telecom company Suntech.

His research was covered by worldwide media numerous times including in "IEEE Spectrum", "New Scientist", "MIT Technology Review", "The Economist", "Der Spiegel", etc.