Cybersecurity aims to connect science and practice in the field of cybersecurity. To achieve this, we work with many distinguished experts and professionals, both from the science community as well as the industry.
We are always looking for contributors to Cybersecurity Magazine. Do you work in the cybersecurity industry and have an interesting topic to discuss? Are you researching a particular topic on Cybersecurity and would like to see this topic better represented? Do you want to comment on a current topic in the area of cybersecurity?
Whatever your motives, feel free to contact us with a short abstract of your topic. If it meets the requirements, we are happy to publish your article!
We would like to recognize and thank all of the contributors to Cybersecurity Magazine. Here is a list of our contributing authors:
Jason Kent
For over 20 years, Jason Kent has been ethically peering into Client Behaviour, Wireless Networks, Web Applications, APIs and Cloud Systems, helping organisations secure their assets and intellectual property from unauthorised access. As a consultant he’s taken hundreds of organisations through difficult compliance mine fields, ensuring their safety. As a researcher he has found flaws in consumer IoT systems and assisted in hardening them against external attacks. At Cequence Security Jason does research, community outreach and supports efforts in identifying Automated Attacks against Web, Mobile, and API-based Applications to keep Cequence’s customers safe.
-
Jason Kent#molongui-disabled-link
Jason Stirland
Having completed his degree in Networking & Communications Technologies, Jason Stirland has spent nine years working in eLearning. From starting his career as first-line technical support, Jason has expanded his role to incorporate programming and sales and often hosts consultative software meetings for key clients. Jason has been responsible for developing DeltaNet’s Astute Learning Management System, as well as the organisation’s IT/security infrastructure and software strategy.
-
Jason Stirland#molongui-disabled-link
Jasson Casey
Jasson is Chief Technology Officer at Beyond Identity. Before joining
the company, he held previous technical and executive roles, including
CTO of SecurityScorecard, VP of Engineering at IronNet Cybersecurity amd
Founder and Executive Director of Flowgrammable. Jasson received a
bachelor’s degree in computer engineering from The University of Texas
at Austin and a PhD in computer engineering from Texas A&M University.
-
Jasson Casey#molongui-disabled-link
Jessica Amado
Jessica holds an MA in Politics specializing in counter terrorism and homeland security after completing her BA at Regents University in London.
-
Jessica Amado#molongui-disabled-link
Joe Darrah
Joe Darrah is a freelance business writer based in the Philadelphia region. He has been published in more than 50 publications.
-
Joe Darrah#molongui-disabled-link
Jon Fielding
-
Jon Fielding#molongui-disabled-link
Jordan MacAvoy
Jordan MacAvoy is Vice President of Marketing at Reciprocity Labs and manages the company’s go-to-market strategy and execution. Prior to joining Reciprocity, Jordan served in executive roles at Fundbox, a Forbes Next Billion Dollar Company, and Intuit, via their acquisition of the SaaS marketing and communications solution, Demandforce.
-
Jordan MacAvoy#molongui-disabled-link
Josh Neame
Josh Neame is Technology Director at BlueFort Security, the UK’s leading cyber security solutions provider. Josh has more than 12 years’ experience in the information technology and services industry, from leadership and management through to support, development, design, architecture and implementation. A proficient and thorough cyber security specialist, Josh has a passion for aligning both business and technology goals.
-
Josh Neame#molongui-disabled-link
Juan Vargas
A graduate of Carnegie Mellon University, Juan Vargas started his career doing data analysis at Intel Corp before focusing on automation and control systems at Emerson Electric and finally becoming a cybersecurity expert for those systems. He has worked with most control systems in power generation and on various projects for all of the top 10-utility companies in the United States. Juan can be reached on Twitter @JuanVargasCMU.
-
Juan Vargas#molongui-disabled-link
-
Editor's Deskhttps://murshidabad.org/author/philippaj/
-
Editor's Deskhttps://murshidabad.org/author/philippaj/
-
Editor's Deskhttps://murshidabad.org/author/philippaj/
-
Editor's Deskhttps://murshidabad.org/author/philippaj/