Our Authors

Cybersecurity aims to connect science and practice in the field of cybersecurity. To achieve this, we work with many distinguished experts and professionals, both from the science community as well as the industry.

We are always looking for contributors to Cybersecurity Magazine. Do you work in the cybersecurity industry and have an interesting topic to discuss? Are you researching a particular topic on Cybersecurity and would like to see this topic better represented? Do you want to comment on a current topic in the area of cybersecurity?

Whatever your motives, feel free to contact us with a short abstract of your topic. If it meets the requirements, we are happy to publish your article!

We would like to recognize and thank all of the contributors to Cybersecurity Magazine. Here is a list of our contributing authors:

+ posts
Bruno Pavlicek
Senior Investigator | + posts

Bruno Pavlicek is a Senior Investigator with the Corporate Security Department of a major telecommunications corporation.  He has over 25 years of experience in criminal and civil investigations between law enforcement and the private sector, specializing in fraud and non-traditional organized crime groups.  He is a Certified Fraud Examiner, Certified Forensic Interviewer, and currently serves as the President of the Georgia state chapter of the Association of Certified Fraud Examiners.  Bruno holds a PhD in Psychology, as well as a Master’s degree in Economic Crime Management.

Carl Wearn
Head of e-crim at | + posts

Carl worked as a UK Police officer in London for 24 years, specialising in antisocial behaviour and court applications before moving into the Metropolitan Police’s Falcon fraud and cybercrime Command in 2014. He headed the Operational Development Team there and was responsible for all performance, intelligence, and other support functions of the Command. This work also included the specialist investigation of high value, cyber-related fraud and management of the Command’s tasking process. He has a BSc (Hons) in Policing and a Post Graduate Certificate in Leadership & Management.

 

Carl’s role at Mimecast, in addition to providing threat intelligence focussed on email threats blocked by Mimecast, he also oversees e-crime and cyber investigations. This adds a wider context to the attacks companies are facing and seeks to clarify the who and why of them being targeted.

Chris Calvert
Co-Founder and CTO at | + posts
Christie Simon
+ posts

Christie Simon is a writer based in Canada. She writes articles with a focus on marketing and cybersecurity for a variety of businesses. Some of her favourite pieces can be found on the Constant C Technology Group’s website.

Christoph Nagy
CEO and Co-Founder at | Website | + posts

With expertise in both SAP cybersecurity and strong commercial skills, Christoph co-founded ABEX. As CEO. Christoph brings a wealth of expertise in product strategy, constantly redefining “most advanced” in the SAP business critical application sector. Christoph is responsible for executing product strategies for the SecurityBridge and ABEX product suites.

Christopher Murphy
Founder / Inventor / Chief Scientist / Cyber Security Theorist / Author / Public Speaker at Cyber Safety Harbor | Website | + posts

The creator of Physical Presence technology, I start in the US Army as a Cartographic Draftsman. Honing my precision and attention to detail, I then shifted his focus to the world of software programming and would work as a Systems Analyst. With entrepreneurial flames burning, I then work as a software engineering consultant before taking the leap into my own venture. It was at this point when I first developed a method to prove presence on the internet by creating a digital state-of-existence.

Cindy Blake
Sr. Product Marketing Manager – Security at | Website | + posts

Cindy is a solutions strategist with a focus on cyber security and experience as an IT leader and a developer. She’s passionate about making application security mainstream by changing the market: how app sec tools are used, by whom, and what outcome is expected. Ask her about pragmatic steps to truly integrate security into DevOps using workflows that are more effective, efficient, and transparent.

Her book, “10 steps every CISO should take to secure next generation software” is intended to help security professionals understand how software development is changing and the impact upon security programs. Application security especially must evolve if it is to be effective and relevant amongst DevOps, containers, orchestrators and micro services.

CompTIA
| + posts

The Computing Technology Industry Association (CompTIA) is an American non-profit trade association, issuing professional certifications for the information technology (IT) industry. It is considered one of the IT industry’s top trade associations. Based in Downers Grove, Illinois, CompTIA issues vendor-neutral professional certifications in over 120 countries. The organization releases over 50 industry studies annually to track industry trends and changes. Over 2.2 million people have earned CompTIA certifications since the association was established.

Cynthia Brumfield
Website | + posts

Cynthia Brumfield is the author of Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, which spells out the essential risk management steps organizations can take to make their assets more secure, including asset inventories, network segmentation, and SBOMs. She also runs a cybersecurity news destination, Metacurity.

+ posts