Cybersecurity aims to connect science and practice in the field of cybersecurity. To achieve this, we work with many distinguished experts and professionals, both from the science community as well as the industry.

We are always looking for contributors to Cybersecurity Magazine. Do you work in the cybersecurity industry and have an interesting topic to discuss? Are you researching a particular topic on Cybersecurity and would like to see this topic better represented? Do you want to comment on a current topic in the area of cybersecurity?

Whatever your motives, feel free to contact us with a short abstract of your topic. If it meets the requirements, we are happy to publish your article!

We would like to recognize and thank all of the contributors to Cybersecurity Magazine. Here is a list of our contributing authors:

James Opiyo
Senior Consultant for Security Strategy |  + posts

James Opiyo is a Senior Consultant for Security Strategy and has over 15 years of professional experience working for telecom companies.

Jason Kent
Hacker in Residence at  |  + posts

For over 20 years, Jason Kent has been ethically peering into Client Behaviour, Wireless Networks, Web Applications, APIs and Cloud Systems, helping organisations secure their assets and intellectual property from unauthorised access. As a consultant he’s taken hundreds of organisations through difficult compliance mine fields, ensuring their safety. As a researcher he has found flaws in consumer IoT systems and assisted in hardening them against external attacks. At Cequence Security Jason does research, community outreach and supports efforts in identifying Automated Attacks against Web, Mobile, and API-based Applications to keep Cequence’s customers safe.

Jason Stirland

Having completed his degree in Networking & Communications Technologies, Jason Stirland has spent nine years working in eLearning. From starting his career as first-line technical support, Jason has expanded his role to incorporate programming and sales and often hosts consultative software meetings for key clients. Jason has been responsible for developing DeltaNet’s Astute Learning Management System, as well as the organisation’s IT/security infrastructure and software strategy.

Jasson Casey
Chief Technology Officer at Beyond Identity |  + posts

Jasson is Chief Technology Officer at Beyond Identity. Before joining
the company, he held previous technical and executive roles, including
CTO of SecurityScorecard, VP of Engineering at IronNet Cybersecurity amd
Founder and Executive Director of Flowgrammable. Jasson received a
bachelor’s degree in computer engineering from The University of Texas
at Austin and a PhD in computer engineering from Texas A&M University.

Javier Dominguez
CISO at  |  + posts
Jawahar Sivasankaran
President at Cyware |  + posts

Jawahar brings 27+ years of progressive leadership experience in Corporate, Go-to-Market and Product leadership roles. He has experience leading large tech businesses at scale, with a platform approach and has also been a leader at PE and VC backed mid-late stage startups. Jawahar currently serves as the President of Cyware, leader in Cyber Threat Intelligence space. He has served an Operating Advisor with leading Private Equity and Consulting firms, focused on due diligence and portfolio operations and is active in the early stage startup community as investor and advisor. His previous operating leadership role was with Appgate, where he served as the President and COO, leading all Go to Market functions including Sales, Marketing and Customer Success. Jawahar previously led Global Security Specialization Sales for Splunk. He was responsible for driving growth for Splunk’s global security business in partnership with executive leadership, cross functional and theater teams. Before Splunk, Jawahar spent 15+ years at Cisco in various leadership roles. Most recently, he was responsible for leading global Sales & Business Development through Managed Security Providers, Strategic Partners, and Global Alliances. As a Senior Director, he previously led Sales GTM strategy & BD and before that he served as the Global Field CTO for the $2B+ security business. He played a key leadership role in transforming the global security business from the core focus of Network Security to subscription and SAAS, increasing focus on Cloud Security. Jawahar was part of the senior leadership team that formed Global Security Sales Organization at Cisco, a dedicated and accountable Cybersecurity specialists sales team. He was a founding member of the Cisco on Cisco practice, focused on customer success and advising customers on Technology and Business Transformation. He is a featured speaker in industry events. Jawahar started his career and grew in the technical ranks, eventually growing to a Cisco Distinguished Engineer and was part of the most senior technology leaders within the company. He leverages this strong technical, products and industry background and continual learning to effectively drive go-to-market success. Before Cisco, Jawahar worked at a satellite gateway startup building products. He started his career in the service provider business. Jawahar holds an MBA from Wharton Business School, University of Pennsylvania. He also holds a Masters degree in IS Management and a Bachelors in Electrical Engineering.

Jeff Stout
Security Consultant | Website |  + posts

Jeff Stout is a cybersecurity consultant. His work brings him into contact with ransomware and ransomware hackers on a daily basis.

Jessica Amado
Content Specialist at  |  + posts

Jessica holds an MA in Politics specializing in counter terrorism and homeland security after completing her BA at Regents University in London.

Joe Darrah

Joe Darrah is a freelance business writer based in the Philadelphia region. He has been published in more than 50 publications.

Joel Duffield
Global Director, Solutions Engineering at  |  + posts
John Prasad
Research Assistant at University of Warwick | Website |  + posts

I am currently a Research Assistant at the University of Warwick, collaborating with the Alan Turing Institute on cybersecurity initiatives. With a background in software engineering and a Master’s in Cyber Security Engineering from Warwick, I have worked on enterprise security, cyber threat intelligence, and automation. Previously, I was a Senior Software Engineer at CGI, where I developed automation solutions, managed endpoint security, and contributed to large-scale data migration projects. My research explores privacy-enhancing technologies, Zero Trust security models, and the intersection of AI and cybersecurity to build resilient security solutions for modern digital threats.

Jordan MacAvoy
Vice President Marketing at  |  + posts

Jordan MacAvoy is Vice President of Marketing at Reciprocity Labs and manages the company’s go-to-market strategy and execution. Prior to joining Reciprocity, Jordan served in executive roles at Fundbox, a Forbes Next Billion Dollar Company, and Intuit, via their acquisition of the SaaS marketing and communications solution, Demandforce.

Josh Breaker-Rolfe
Content Writer at Bora Cybersecurity Marketing |  + posts
Josh Neame
Technology Director at  |  + posts

Josh Neame is Technology Director at BlueFort Security, the UK’s leading cyber security solutions provider. Josh has more than 12 years’ experience in the information technology and services industry, from leadership and management through to support, development, design, architecture and implementation. A proficient and thorough cyber security specialist, Josh has a passion for aligning both business and technology goals.

Juan Vargas

A graduate of Carnegie Mellon University, Juan Vargas started his career doing data analysis at Intel Corp before focusing on automation and control systems at Emerson Electric and finally becoming a cybersecurity expert for those systems. He has worked with most control systems in power generation and on various projects for all of the top 10-utility companies in the United States. Juan can be reached on Twitter @JuanVargasCMU.

Jörg Keller
Professor of computer engineering at Fernuniversität Hagen |  + posts

Jörg Keller is a professor of computer engineering at FernUniversität in Hagen, Germany, and heads the Parallelism & VLSI group since 1996. His research interests are parallel and energy-efficient computing, security and fault-tolerance of computer systems, and web-based learning in engineering. He received MSc and PhD degrees from Saarland University, Germany, in 1989 and 1992, respectively, and spent his PostDoc phase at CWI (Netherlands Research Centre for Mathematics and Computer Science) in Amsterdam.

Katrina Thompson

An ardent believer in personal data privacy and the technology behind it, Katrina Thompson is a freelance writer leaning into encryption, data privacy legislation, and the intersection of information technology and human rights. She has written for Bora, Venafi, Tripwire, and many other sites.

Kavitha Srinivasulu
Program Director: Cybersecurity & Data Privacy at TCS |  + posts

Senior cyber risk and resilience executive with over 22 years of global leadership experience advising Boards and Executive Committees across Financial Services, Healthcare, Retail, Technology, and regulated industries. Delivered and led large-scale, regulator-driven cybersecurity, AI driven, PCI, and SOC transformations for Tier-1 banks, global healthcare organisations, and highly regulated enterprises operating across the UK, EU, USA, APAC, and ANZ. Trusted advisor to Boards, C-suite, regulators, and global enterprises, consistently delivering resilient, compliant, and scalable cyber operating models.

Kitty Bates
Cybersecurity Content Curator at  |  + posts

Kitty Bates is the Cybersecurity Content Curator at ramsac, providing insights on cybersecurity and IT services for charities, businesses and education.

Krista Kihlander
Solutions Engineer at HackerOne |  + posts
Kurt Jung
Principal Solution Engineer at  |  + posts
Lakshmi Ananderi Kandadai
Director of Product Marketing at Palo Alto Networks | Website |  + posts

Results-driven technology leader and enterprise visionary combining outstanding technical & marketing talents, with proven track record of creating innovative go-to-market strategies including conceptualizing, launching and positioning IP (Cloud, SDN/NFV) & RAN mobile-edge technology products and solutions in a fast paced business environment.

Designing and integrating end-to-end network solutions based on products and solutions from IP & Broadband, with focus on developing value proposition for the company’s IP Portfolio.

Evangelized solutions through presentations and discussions with C-level customers, internal and external stakeholders and global events.

Laura Loredo
HPE Worldwide Product Management Manager at  |  + posts