Cybersecurity aims to connect science and practice in the field of cybersecurity. To achieve this, we work with many distinguished experts and professionals, both from the science community as well as the industry.
We are always looking for contributors to Cybersecurity Magazine. Do you work in the cybersecurity industry and have an interesting topic to discuss? Are you researching a particular topic on Cybersecurity and would like to see this topic better represented? Do you want to comment on a current topic in the area of cybersecurity?
Whatever your motives, feel free to contact us with a short abstract of your topic. If it meets the requirements, we are happy to publish your article!
We would like to recognize and thank all of the contributors to Cybersecurity Magazine. Here is a list of our contributing authors:
Todd Moore, Thales
-
Todd Moore, Thales#molongui-disabled-link
Tom Madsen
Tom Madsen has been active in the cybersecurity industry for more than 20 years. Tom graduated from the University of Aalborg and covered several technical roles in security during his professional career. He is certified as CISSP, CISA, CISM, CGEIT, CRISK, CCSP, CDSPE and CSSLP, and has published the book “The Art of War for Cybersecurity”. He is currently writing a book ‘Security Architecture – How & Why’.
-
Tom Madsen#molongui-disabled-link
-
Tom Madsen#molongui-disabled-link
-
Tom Madsen#molongui-disabled-link
-
Tom Madsen#molongui-disabled-link
Tomy Han
Tomy joined Volition Capital in 2012. He focuses on software and internet investments in compliance, security, supply chain, and vertical applications. Tomy serves on the board of directors of Pramata and Qure4u. Other board observer roles have included Assent Compliance, Black Kite, Burst, Creatio, RTS, and Securonix. Tomy’s exited investments and board observer roles include the following companies: Connatix (Acquired by Court Square Capital Partners), Insite Software (Acquired by Episerver), and LoanLogics (Acquired by Sun Capital Part
-
Tomy Han#molongui-disabled-link
Trevor Logan
Trevor Logan is a research analyst at the Center on Cyber and Technology Innovation (CCTI) at the Foundation for Defense of Democracies (FDD). For more analysis from Trevor and CCTI, please subscribe HERE.
FDD is a Washington, DC-based, nonpartisan research institute focusing on national security and foreign policy.
-
Trevor Logan#molongui-disabled-link
Vinay Purohit
Vinay Purohit is Director of Product Management at Sectigo, a leading provider of automated digital identity management and web security solutions. With more than 20 years of software development and managing cybersecurity products, Vinay leads the company’s innovations around PKI, DevOps, Mobile, and Cloud security. Before Sectigo, he was with Entrust and Nokia Software. He has an Engineering degree in computer science.
-
Vinay Purohit#molongui-disabled-link
William Chow
Architect for multiple technology startups, leading product development from concept to sales (and ultimately to exit).
-
William Chow#molongui-disabled-link
Wojciech Mazurczyk
Wojciech Mazurczyk holds D.Sc. (habilitation, 2014) and Ph.D. (2009) in telecommunications (with honours) from Warsaw University of Technology, Poland.
Associate Professor at Department of Cybersecurity, Institute of Telecommunications, Faculty of Electronics and Information Technology, Warsaw University of Technology. A member of the Parallelism and VLSI Group at Faculty of Mathematics and Computer Science at FernUniversitat, Germany
Author or co-author of 2 books, over 120 papers, 2 patent applications and over 35 invited talks. Involved in many international and domestic research project as a principal investigator or as a senior researcher. A guest editor of many special issues devoted to network security (among others: IEEE TDSC, IEEE S&P, IEEE Commag). Serving as Technical Program Committee Member of (among others): IEEE INFOCOM, IEEE GLOBECOM, IEEE ICC, IEEE LCN, IEEE CNS, IEEE WIFS and ACM IH&MMSec. From 2016 Editor-in-Chief of an open access Journal of Cyber Security and Mobility.
An Accredited Cybercrime Expert and Trainer for Europol EC3 (European Cybercrime Center). A founder and a coordinator of the Criminal Use of Information Hiding (CUIng) Initative launched in cooperation with Europol EC3. A founding member of EURASIP “Biometrics, Data Forensics and Security” (B.For.Sec) Special Area Team. IEEE Senior Member (2013-) and EURASIP member (2015-). Involved in the think thank of FP7 project CAMINO (Comprehensive Approach to cyber roadMap coordINation and develOpment) (2015-).
For over 10 years has been serving as the independent consultant in the fields of network security and telecommunications. Between 2003 and 2007 he was also a deployments specialist for the telecom company Suntech.
His research was covered by worldwide media numerous times including in “IEEE Spectrum”, “New Scientist”, “MIT Technology Review”, “The Economist”, “Der Spiegel”, etc.
-
Wojciech Mazurczyk#molongui-disabled-link
Zac Amos
Zac Amos writes about AI, cybersecurity and other trending technology topics, and he works as the Features Editor at ReHack.
-
Zac Amos#molongui-disabled-link
-
Zac Amos#molongui-disabled-link
-
Zac Amos#molongui-disabled-link
-
Zac Amos#molongui-disabled-link
-
Editor's Deskhttps://murshidabad.org/author/philippaj/
-
Editor's Deskhttps://murshidabad.org/author/philippaj/
-
Editor's Deskhttps://murshidabad.org/author/philippaj/
-
Editor's Deskhttps://murshidabad.org/author/philippaj/