Our Authors

Cybersecurity aims to connect science and practice in the field of cybersecurity. To achieve this, we work with many distinguished experts and professionals, both from the science community as well as the industry.

We are always looking for contributors to Cybersecurity Magazine. Do you work in the cybersecurity industry and have an interesting topic to discuss? Are you researching a particular topic on Cybersecurity and would like to see this topic better represented? Do you want to comment on a current topic in the area of cybersecurity?

Whatever your motives, feel free to contact us with a short abstract of your topic. If it meets the requirements, we are happy to publish your article!

We would like to recognize and thank all of the contributors to Cybersecurity Magazine. Here is a list of our contributing authors:

Roman V. Yampolskiy
Tenured Associate Professor at | + posts

Dr. Roman V. Yampolskiy is a Tenured Associate Professor in the department of Computer Engineering and Computer Science at the Speed School of EngineeringUniversity of Louisville. He is the founding and current director of the Cyber Security Lab and an author of many books including Artificial Superintelligence: a Futuristic Approach. Yampolskiy is a Senior member of IEEE and AGI; Member of Kentucky Academy of Science, and Research Advisor for MIRI and Associate of GCRI.

Dr. Yampolskiy’s main areas of interest are AI Safety, Artificial Intelligence, Behavioral Biometrics, Cybersecurity, Digital Forensics, Games, Genetic Algorithms, and Pattern Recognition. Dr. Yampolskiy is an author of over 100 publications including multiple journal articles and books.

Ross Moore
Cyber Security Support Analyst at Passageways | + posts

Ross Moore is the Cyber Security Support Analyst with Passageways. He was Co-lead on SOC 2 Type 1 implementation and Lead on SOC 2 Type 2 implementation, facilitated the company’s BCP/DR TTX, and is a HIPAA Security Officer. Over the course of his 20 year IT career, Ross has served in a variety of operations and infosec roles for companies in the manufacturing, healthcare, real estate, business insurance, and technology sectors. He holds (ISC)2’s SSCP and CompTIA’s Security + certifications, a B.S. in Cyber Security and Information Assurance from WGU, and a B.A. in Bible/Counseling from Johnson University. He is also a regular writer at Bora.

Rusdi Rachim
CISSP-ISSAP, ISSMP, CISA, CISM, CRISC, CGEIT- Leader-Information Security in Telco industry | + posts
Saber Jafarizadeh
Research scientist at | + posts

Saber Jafarizadeh received his Ph.D. degree from the Department of Electrical & Information Engineering at the University of Sydney in 2015. He is currently a research scientist at the Innovation and Advanced Research Department (the R&D organization of Rakuten Mobile) and an adjunct fellow at the University of New South Wales. His research interests lie in the fields of distributed systems and control and networking, with emphasis on distributed optimization.

 

Saffija Kasem-Madani
University of Bonn | + posts
Sagar Tiwari
Independent Cyber Security researcher | + posts
Samantha Humphries
Head of Security Strategy EMEA at | + posts

Samantha Humphries, Head of Security Strategy EMEA at Exabeam
Samantha has been happily entrenched in the cybersecurity industry for over 20 years. During this time she has helped hundreds of organisations of all shapes, sizes, and geographies recover and learn from cyberattacks, defined strategy for pioneering security products and technologies, and is a regular speaker at security conferences around the world. In her current regeneration, Sam is part of the security strategy team at Exabeam. She authors articles and blogs for various security publications, has a strong passion for mentoring, and often volunteers at community events, including BSides, The Diana Initiative, and Blue Team Village (DEFCON).

Sander de Kievit
Security Architect at Rakuten Mobile, Inc. | Website | + posts

A 5G Security Architecture Specialist with management experience. Skilled in 5G mobile networktechnology, IP creation and management, standards, and applied research in the field of security.Strong verbal skills and eager to learn.

Scott Cadzow
Vice Chair at | + posts

Scott Cadzow, Vice Chair of ETSI Encrypted Traffic Integration Industry Specification Group, participant to ETSI Technical Committee CYBER.

Sharon Mantin
Founder & CEO at | Website | + posts

Sharon Mantin is the Founder & CEO of imVision an API Security company. imVision’s solution, API Anomaly Management Platform (AMP) uses Machine Learning and NLP to protect against API specific attacks by automatically learning the API Business logic behavioral patterns and enforcing them.

+ posts