Cybersecurity aims to connect science and practice in the field of cybersecurity. To achieve this, we work with many distinguished experts and professionals, both from the science community as well as the industry.

We are always looking for contributors to Cybersecurity Magazine. Do you work in the cybersecurity industry and have an interesting topic to discuss? Are you researching a particular topic on Cybersecurity and would like to see this topic better represented? Do you want to comment on a current topic in the area of cybersecurity?

Whatever your motives, feel free to contact us with a short abstract of your topic. If it meets the requirements, we are happy to publish your article!

We would like to recognize and thank all of the contributors to Cybersecurity Magazine. Here is a list of our contributing authors:

Ben Kliger
CEO at Zenity |  + posts

Ben Kliger is co-founder and CEO of Zenity, the first security and governance platform purpose-built for AI agents across SaaS, cloud platforms, and endpoints. He leads the company’s strategy and product direction, with a focus on helping enterprises adopt AI agents securely and at scale.

Bengt Sahlin
Research Leader, Networking Security at Nomadiclab, Ericsson Research | Website |  + posts
Bilal Sardar

Bilal Sardar received a B.Sc. in Computer Science from FAST-NUCES, Lahore, Pakistan, in 2023, and an M.Sc. in Artificial Intelligence with Distinction from Anglia Ruskin University, Cambridge, United Kingdom, in 2024. His research focuses on trustworthy AI systems, explainable artificial intelligence, and cybersecurity, particularly adversarial attack detection and dynamic vulnerability assessment for composite ICT products. He has authored publications accepted at ICLR 2025 and VIHAR 2024. He is currently contributing to the EU Horizon Europe CYBERSECDOME project at Anglia RuskinUniversity, developing hybrid AI frameworks for cybersecurity certification, whilst working with Arieal Icon on VR 360° video and immersive media technologies. His work demonstrates expertise in applying cutting-edge AI methodologies across bioacoustics, natural language processing, and computer vision to solve complex real-world challenges.

Bill Udell
Chief Executive Officer of Americas region at  |  + posts

Bill Udell is Chief Executive Officer of Control Risks’ Americas region. He is responsible for the strategic growth and development of Control Risks’ business across the Americas, including its offices in Bogota, Houston, Los Angeles, Mexico City, New York, Panama City, São Paulo and Washington DC.

Brian J. Morgan
Cyber Coordination Cell Director at Minnesota National Guard | Website |  + posts

Brian Morgan is a cybersecurity leader with more than two decades of experience building cyber defense programs and leading enterprise security initiatives in the private and public sector. He is an Army Lieutenant Colonel in the National Guard with over 23 years of military experience in the fields of Intelligence, Communications, and Cyber Operations. He has an MBA and holds various professional certifications including CISSP, CISM, CEH, and others.

Brian Martin
Director of Product Management at Integrity360 |  + posts
Bruno Pavlicek
Senior Investigator |  + posts

Bruno Pavlicek is a Senior Investigator with the Corporate Security Department of a major telecommunications corporation.  He has over 25 years of experience in criminal and civil investigations between law enforcement and the private sector, specializing in fraud and non-traditional organized crime groups.  He is a Certified Fraud Examiner, Certified Forensic Interviewer, and currently serves as the President of the Georgia state chapter of the Association of Certified Fraud Examiners.  Bruno holds a PhD in Psychology, as well as a Master’s degree in Economic Crime Management.

Carl Wearn
Head of e-crim at  |  + posts

Carl worked as a UK Police officer in London for 24 years, specialising in antisocial behaviour and court applications before moving into the Metropolitan Police’s Falcon fraud and cybercrime Command in 2014. He headed the Operational Development Team there and was responsible for all performance, intelligence, and other support functions of the Command. This work also included the specialist investigation of high value, cyber-related fraud and management of the Command’s tasking process. He has a BSc (Hons) in Policing and a Post Graduate Certificate in Leadership & Management.

 

Carl’s role at Mimecast, in addition to providing threat intelligence focussed on email threats blocked by Mimecast, he also oversees e-crime and cyber investigations. This adds a wider context to the attacks companies are facing and seeks to clarify the who and why of them being targeted.

Carmen Marsh
President & CEO at United Cybersecurity Alliance |  + posts
Caroline Guillaume
Chief Executive Officer at TrustInSoft |  + posts

Caroline Guillaume is the Chief Executive Officer of TrustInSoft.  She has an extensive background working in the critical software industry, notably at Thales Digital Identity and Security where for 14 years she contributed to the Sales division including as the VP of Sales – Software Monetization Europe and VP of Banking and Telecom Solutions Sales out of Singapore. She also previously worked as director of Product Marketing atGemplus. Caroline holds an engineering degree fromTélécom SudParis.

Chris Denbigh-White
CSO at Next DLP |  + posts
Chris Dickens
Senior Solutions Engineer at  |  + posts
Chris Rogers
Senior Technology Evangelist at Zerto, a Hewlett-Packard Enterprise company |  + posts
Chris Wingfield
Senior Vice President, Innovations at 360 Privacy |  + posts
Christie Simon

Christie Simon is a writer based in Canada. She writes articles with a focus on marketing and cybersecurity for a variety of businesses. Some of her favourite pieces can be found on the Constant C Technology Group’s website.

Christoph Nagy
CEO and Co-Founder at  | Website |  + posts

With expertise in both SAP cybersecurity and strong commercial skills, Christoph co-founded ABEX. As CEO. Christoph brings a wealth of expertise in product strategy, constantly redefining “most advanced” in the SAP business critical application sector. Christoph is responsible for executing product strategies for the SecurityBridge and ABEX product suites.

Christopher J. Tatarka
Adjunct Professor at Metro State University | Website |  + posts

Chris Tatarka, PhD, is an adjunct professor and leadership trainer whose work spans decision-making, critical thinking, and analysis. With a BA and MA in psychology, an MPA in public administration, and a PhD in business administration, he draws on decades of experience in military and public-sector leadership to help both organizations and students strengthen their decision-making and leadership effectiveness.

Christopher Murphy
Founder / Inventor / Chief Scientist / Cyber Security Theorist / Author / Public Speaker at Cyber Safety Harbor | Website |  + posts

The creator of Physical Presence technology, I start in the US Army as a Cartographic Draftsman. Honing my precision and attention to detail, I then shifted his focus to the world of software programming and would work as a Systems Analyst. With entrepreneurial flames burning, I then work as a software engineering consultant before taking the leap into my own venture. It was at this point when I first developed a method to prove presence on the internet by creating a digital state-of-existence.

Cindy Blake
Sr. Product Marketing Manager – Security at  | Website |  + posts

Cindy is a solutions strategist with a focus on cyber security and experience as an IT leader and a developer. She’s passionate about making application security mainstream by changing the market: how app sec tools are used, by whom, and what outcome is expected. Ask her about pragmatic steps to truly integrate security into DevOps using workflows that are more effective, efficient, and transparent.

Her book, “10 steps every CISO should take to secure next generation software” is intended to help security professionals understand how software development is changing and the impact upon security programs. Application security especially must evolve if it is to be effective and relevant amongst DevOps, containers, orchestrators and micro services.

Claire D’Esclercs
Director for Membership Development at ETSI |  + posts
CompTIA

The Computing Technology Industry Association (CompTIA) is an American non-profit trade association, issuing professional certifications for the information technology (IT) industry. It is considered one of the IT industry’s top trade associations. Based in Downers Grove, Illinois, CompTIA issues vendor-neutral professional certifications in over 120 countries. The organization releases over 50 industry studies annually to track industry trends and changes. Over 2.2 million people have earned CompTIA certifications since the association was established.

Cynthia Brumfield

Cynthia Brumfield is the author of Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, which spells out the essential risk management steps organizations can take to make their assets more secure, including asset inventories, network segmentation, and SBOMs. She also runs a cybersecurity news destination, Metacurity.

Cynthia Udoka Duru
Senior DevOps Engineer at Visa Europe | Website |  + posts

Cynthia Udoka Duru has led innovative projects across various sectors, from driving cloud-native system design, automated CI/CD workflows, and infrastructure lifecycle management to architecting solutions, contributing to digital health, finance & maritime cybersecurity, enabling exponential growth, improving infrastructure efficiency, and supporting award-winning innovation across Africa and Europe.

Dan Gardner
COO and co-founder at  |  + posts

Dan Gardner is the COO and co-founder of ProcessBolt. He has over 25 years of success in software development, IT infrastructure, cloud operations, and startups. Before founding ProcessBolt, Dan was VP of Technology at NetSPI.  Prior to that, he was a founder of Renew Data Corp., a company that specialized in high volume electronic data discovery, now part of KLDiscovery (KLDI).