Cybersecurity aims to connect science and practice in the field of cybersecurity. To achieve this, we work with many distinguished experts and professionals, both from the science community as well as the industry.
We are always looking for contributors to Cybersecurity Magazine. Do you work in the cybersecurity industry and have an interesting topic to discuss? Are you researching a particular topic on Cybersecurity and would like to see this topic better represented? Do you want to comment on a current topic in the area of cybersecurity?
Whatever your motives, feel free to contact us with a short abstract of your topic. If it meets the requirements, we are happy to publish your article!
We would like to recognize and thank all of the contributors to Cybersecurity Magazine. Here is a list of our contributing authors:
Rajeev Prasad is the founder and CEO of River Publishers launched the company in 2007 in Denmark which now is an international brand with over 200 published titles and the same in pipeline. We also publishes scholarly societies such as IEEE, 3GPP, etc. The company is making strides to maintain a balance between open access and traditional publishing.
Rajeev Prasad is also the founder and editor of Cyber Security Magazine. The aim of the magazine is to promote expert views on the topic of cyber security, as well as the magazine sources its expertise in supporting medium size companies to meet their marketing objectives.
-
Rajeev Prasadhttps://murshidabad.org/author/rprasad/
Ramil Khantimirov
-
Ramil Khantimirov#molongui-disabled-link
-
Ramil Khantimirov#molongui-disabled-link
-
Ramil Khantimirov#molongui-disabled-link
-
Ramil Khantimirov#molongui-disabled-link
Rani Osnat
-
Rani Osnat#molongui-disabled-link
Ravikumar Jeevarathinam
Experienced Technopreneur with proven expertise in Digital Business Growth|Digital Transformation & Digital Innovation – Global Service Provider Network|Telecom|Mobile|Transport|M-Finance|Defence-Security|Retail|Healthcare|Energy|Consulting with over 20 years of experience in setting up and running business for technology companies with full P&L .responsibility (from startup to USD250M; infra advisory of Billion dollars) .One man start up to growing into a high growth organisation with a proven RoI. Pioneer in Wireless DAS indoor coverage solutions.
Creating and Nurturing Digital Talents across various industry verticals to accelerate digital business growth| Pioneer in introducing and implementing new digital technologies such as AI|DL|IoT|Bigdata-Analytics|Blockchain.
Merger & Acquisition (M&A) and instrumental in acquiring major technology companies.
-
Ravikumar Jeevarathinam#molongui-disabled-link
Richard Bird
Chief Security Officer, Traceable
-
Richard Bird#molongui-disabled-link
Richard Menear
-
Richard Menear#molongui-disabled-link
Rick Davis
Rick Davis is a freelance writer that specializes in cybersecurity and his mission is to spread online security awareness. In his free time, he enjoys long hikes with his dog and a great glass of Chianti.
-
Rick Davis#molongui-disabled-link
Robert Sugrue
Robert is Cyber Security Product Director at Six Degrees. He is responsible for providing strategic guidance and planning across Six Degrees’ entire cyber security portfolio, ensuring product success by championing cyber security product development while assuring clear understanding of complex products for clients.
With over 25 years of experience in the technical infrastructure, technical audit and cyber security products and services fields, Robert’s cyber security credentials include PMI, PRINCE2 and hybrid project management, CISSP, and ITIL.
Robert can deliver complex cyber security solutions to a wide audience, explaining in terms that suit multiple levels of understanding. He applies this ability to a number of thought leadership activities, spreading cyber awareness both inside and outside Six Degrees.
-
Robert Sugrue#molongui-disabled-link
Roger Piqueras Jover
Subject matter expert on mobile/wireless/radio security, intrusion detection and machine learning applied to anomaly detection. Corporate strategy and technology leadership on network security architecture, mobile application and system security, access management and BlueTeam/RedTeam/PurpleTeam. Applied research on machine learning applied to intrusion and anomaly detection in corporate computer networks. Security and technology leadership in architecture design/test of corporate, customer and consumer mobile application tools. Research and development of new security systems and architectures to enhance the security of next-gen biometrics and two-factor authentication devices.
Security researcher and subject matter expert on security of mobile LTE and 5G networks, and wireless short-range networks (Bluetooth, 802.11, ZigBee, LoRa). Implementation and test of advanced LTE protocol exploits and LTE rogue base station prototypes. Leadership and expert advice on wireless security, LTE and 5G mobile network security to academia and government agencies.
-
This author does not have any more posts.
-
Editor's Deskhttps://murshidabad.org/author/philippaj/
-
Editor's Deskhttps://murshidabad.org/author/philippaj/
-
Editor's Deskhttps://murshidabad.org/author/philippaj/
-
Editor's Deskhttps://murshidabad.org/author/philippaj/