Our Authors

Cybersecurity aims to connect science and practice in the field of cybersecurity. To achieve this, we work with many distinguished experts and professionals, both from the science community as well as the industry.

We are always looking for contributors to Cybersecurity Magazine. Do you work in the cybersecurity industry and have an interesting topic to discuss? Are you researching a particular topic on Cybersecurity and would like to see this topic better represented? Do you want to comment on a current topic in the area of cybersecurity?

Whatever your motives, feel free to contact us with a short abstract of your topic. If it meets the requirements, we are happy to publish your article!

We would like to recognize and thank all of the contributors to Cybersecurity Magazine. Here is a list of our contributing authors:

Ramil Khantimirov
CEO and co-founder at | + posts
Rani Osnat
SVP Strategy at | + posts
Ravikumar Jeevarathinam
Vice President Technology & Innovation Global Technology Centre at Lloyd’s Register | Website | + posts

Experienced Technopreneur with proven expertise in Digital Business Growth|Digital Transformation & Digital Innovation – Global Service Provider Network|Telecom|Mobile|Transport|M-Finance|Defence-Security|Retail|Healthcare|Energy|Consulting with over 20 years of experience in setting up and running business for technology companies with full P&L .responsibility (from startup to USD250M; infra advisory of Billion dollars) .One man start up to growing into a high growth organisation with a proven RoI. Pioneer in Wireless DAS indoor coverage solutions.
Creating and Nurturing Digital Talents across various industry verticals to accelerate digital business growth| Pioneer in introducing and implementing new digital technologies such as AI|DL|IoT|Bigdata-Analytics|Blockchain.
Merger & Acquisition (M&A) and instrumental in acquiring major technology companies.

Richard Bird
+ posts

Chief Security Officer, Traceable

Richard Menear
CEO at | + posts
Rick Davis
+ posts

Rick Davis is a freelance writer that specializes in cybersecurity and his mission is to spread online security awareness. In his free time, he enjoys long hikes with his dog and a great glass of Chianti.

+ posts
Robert Sugrue
Cyber Security Product Director at | + posts

Robert is Cyber Security Product Director at Six Degrees. He is responsible for providing strategic guidance and planning across Six Degrees’ entire cyber security portfolio, ensuring product success by championing cyber security product development while assuring clear understanding of complex products for clients.
With over 25 years of experience in the technical infrastructure, technical audit and cyber security products and services fields, Robert’s cyber security credentials include PMI, PRINCE2 and hybrid project management, CISSP, and ITIL.
Robert can deliver complex cyber security solutions to a wide audience, explaining in terms that suit multiple levels of understanding. He applies this ability to a number of thought leadership activities, spreading cyber awareness both inside and outside Six Degrees.

Roger Piqueras Jover
CTO Security Architecture Team at Bloomberg L.P. | Website | + posts

Subject matter expert on mobile/wireless/radio security, intrusion detection and machine learning applied to anomaly detection. Corporate strategy and technology leadership on network security architecture, mobile application and system security, access management and BlueTeam/RedTeam/PurpleTeam. Applied research on machine learning applied to intrusion and anomaly detection in corporate computer networks. Security and technology leadership in architecture design/test of corporate, customer and consumer mobile application tools. Research and development of new security systems and architectures to enhance the security of next-gen biometrics and two-factor authentication devices.

Security researcher and subject matter expert on security of mobile LTE and 5G networks, and wireless short-range networks (Bluetooth, 802.11, ZigBee, LoRa). Implementation and test of advanced LTE protocol exploits and LTE rogue base station prototypes. Leadership and expert advice on wireless security, LTE and 5G mobile network security to academia and government agencies.

Roland Atoui
Managing Director at | + posts

Roland Atoui, ETSI member

+ posts