Cybersecurity aims to connect science and practice in the field of cybersecurity. To achieve this, we work with many distinguished experts and professionals, both from the science community as well as the industry.
We are always looking for contributors to Cybersecurity Magazine. Do you work in the cybersecurity industry and have an interesting topic to discuss? Are you researching a particular topic on Cybersecurity and would like to see this topic better represented? Do you want to comment on a current topic in the area of cybersecurity?
Whatever your motives, feel free to contact us with a short abstract of your topic. If it meets the requirements, we are happy to publish your article!
We would like to recognize and thank all of the contributors to Cybersecurity Magazine. Here is a list of our contributing authors:
Christie Simon is a writer based in Canada. She writes articles with a focus on marketing and cybersecurity for a variety of businesses. Some of her favourite pieces can be found on the Constant C Technology Group’s website.
With expertise in both SAP cybersecurity and strong commercial skills, Christoph co-founded ABEX. As CEO. Christoph brings a wealth of expertise in product strategy, constantly redefining “most advanced” in the SAP business critical application sector. Christoph is responsible for executing product strategies for the SecurityBridge and ABEX product suites.
The creator of Physical Presence technology, I start in the US Army as a Cartographic Draftsman. Honing my precision and attention to detail, I then shifted his focus to the world of software programming and would work as a Systems Analyst. With entrepreneurial flames burning, I then work as a software engineering consultant before taking the leap into my own venture. It was at this point when I first developed a method to prove presence on the internet by creating a digital state-of-existence.
Cindy is a solutions strategist with a focus on cyber security and experience as an IT leader and a developer. She’s passionate about making application security mainstream by changing the market: how app sec tools are used, by whom, and what outcome is expected. Ask her about pragmatic steps to truly integrate security into DevOps using workflows that are more effective, efficient, and transparent.
Her book, “10 steps every CISO should take to secure next generation software” is intended to help security professionals understand how software development is changing and the impact upon security programs. Application security especially must evolve if it is to be effective and relevant amongst DevOps, containers, orchestrators and micro services.
The Computing Technology Industry Association (CompTIA) is an American non-profit trade association, issuing professional certifications for the information technology (IT) industry. It is considered one of the IT industry’s top trade associations. Based in Downers Grove, Illinois, CompTIA issues vendor-neutral professional certifications in over 120 countries. The organization releases over 50 industry studies annually to track industry trends and changes. Over 2.2 million people have earned CompTIA certifications since the association was established.
Cynthia Brumfield is the author of Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, which spells out the essential risk management steps organizations can take to make their assets more secure, including asset inventories, network segmentation, and SBOMs. She also runs a cybersecurity news destination, Metacurity.
Dan Gardner is the COO and co-founder of ProcessBolt. He has over 25 years of success in software development, IT infrastructure, cloud operations, and startups. Before founding ProcessBolt, Dan was VP of Technology at NetSPI. Prior to that, he was a founder of Renew Data Corp., a company that specialized in high volume electronic data discovery, now part of KLDiscovery (KLDI).