Our Authors

Cybersecurity aims to connect science and practice in the field of cybersecurity. To achieve this, we work with many distinguished experts and professionals, both from the science community as well as the industry.

We are always looking for contributors to Cybersecurity Magazine. Do you work in the cybersecurity industry and have an interesting topic to discuss? Are you researching a particular topic on Cybersecurity and would like to see this topic better represented? Do you want to comment on a current topic in the area of cybersecurity?

Whatever your motives, feel free to contact us with a short abstract of your topic. If it meets the requirements, we are happy to publish your article!

We would like to recognize and thank all of the contributors to Cybersecurity Magazine. Here is a list of our contributing authors:

CEO at | + posts

Rajeev Prasad is the founder and CEO of River Publishers launched the company in 2007 in Denmark which now is an international brand with over 200 published titles and the same in pipeline. We also publishes scholarly societies such as IEEE, 3GPP, etc. The company is making strides to maintain a balance between open access and traditional publishing.

Rajeev Prasad is also the founder and editor of Cyber Security Magazine. The aim of the magazine is to promote expert views on the topic of cyber security, as well as the magazine sources its expertise in supporting medium size companies to meet their marketing objectives.

Ramil Khantimirov
CEO and co-founder at | + posts
Rani Osnat
SVP Strategy at | + posts
Ravikumar Jeevarathinam
Vice President Technology & Innovation Global Technology Centre at Lloyd’s Register | Website | + posts

Experienced Technopreneur with proven expertise in Digital Business Growth|Digital Transformation & Digital Innovation – Global Service Provider Network|Telecom|Mobile|Transport|M-Finance|Defence-Security|Retail|Healthcare|Energy|Consulting with over 20 years of experience in setting up and running business for technology companies with full P&L .responsibility (from startup to USD250M; infra advisory of Billion dollars) .One man start up to growing into a high growth organisation with a proven RoI. Pioneer in Wireless DAS indoor coverage solutions.
Creating and Nurturing Digital Talents across various industry verticals to accelerate digital business growth| Pioneer in introducing and implementing new digital technologies such as AI|DL|IoT|Bigdata-Analytics|Blockchain.
Merger & Acquisition (M&A) and instrumental in acquiring major technology companies.

Richard Bird
+ posts

Chief Security Officer, Traceable

Richard Menear
CEO at | + posts
Rick Davis
+ posts

Rick Davis is a freelance writer that specializes in cybersecurity and his mission is to spread online security awareness. In his free time, he enjoys long hikes with his dog and a great glass of Chianti.

+ posts
Robert Sugrue
Cyber Security Product Director at | + posts

Robert is Cyber Security Product Director at Six Degrees. He is responsible for providing strategic guidance and planning across Six Degrees’ entire cyber security portfolio, ensuring product success by championing cyber security product development while assuring clear understanding of complex products for clients.
With over 25 years of experience in the technical infrastructure, technical audit and cyber security products and services fields, Robert’s cyber security credentials include PMI, PRINCE2 and hybrid project management, CISSP, and ITIL.
Robert can deliver complex cyber security solutions to a wide audience, explaining in terms that suit multiple levels of understanding. He applies this ability to a number of thought leadership activities, spreading cyber awareness both inside and outside Six Degrees.

Roger Piqueras Jover
CTO Security Architecture Team at Bloomberg L.P. | Website | + posts

Subject matter expert on mobile/wireless/radio security, intrusion detection and machine learning applied to anomaly detection. Corporate strategy and technology leadership on network security architecture, mobile application and system security, access management and BlueTeam/RedTeam/PurpleTeam. Applied research on machine learning applied to intrusion and anomaly detection in corporate computer networks. Security and technology leadership in architecture design/test of corporate, customer and consumer mobile application tools. Research and development of new security systems and architectures to enhance the security of next-gen biometrics and two-factor authentication devices.

Security researcher and subject matter expert on security of mobile LTE and 5G networks, and wireless short-range networks (Bluetooth, 802.11, ZigBee, LoRa). Implementation and test of advanced LTE protocol exploits and LTE rogue base station prototypes. Leadership and expert advice on wireless security, LTE and 5G mobile network security to academia and government agencies.

+ posts