


Which Is the Best Multi-Factor Authentication System?
It appears that multi-factor authentication (MFA) is finally being adopted by many organizations, as well as public websites. It is unfortunate that when we look at its implementation path, it has been enacted more as an involuntary act, rather than a request by the...
Leveraging Social Media Marketing in the Cybersecurity Industry
Social media has become an integral part of our lives over the last two decades (remember ICQ?), and therefore it should not come as a big surprise that these beloved virtual town squares are now included in just about any marketing campaign you can think of. The...
3 Reasons Why LinkedIn Deserves Cyber Security Marketers Attention in 2022
When LinkedIn burst onto the social media scene, it positioned itself as a social media platform where professionals can showcase their professional experiences and achievements. Fast forward to 2022, it has become ‘THE’ place to be for cyber security marketing...
Don’t Allow Idioms to Be the Enemy of the Good
In business meetings, when a cybersecurity professional is asked to speak, the invitation is often prefaced with a request to avoid idioms and acronyms. Cybersecurity is rich in acronyms – whether they are used to describe a particular technical term or to...
2021 Cybersecurity Roundup
On January 1st, 2021, the wish on everyone’s lips was to get over with Covid. Unfortunately, this wish did not materialize, and non-Greek readers are facing the problem of learning the whole Greek alphabet. Let’s hope that we will not live to learn of an Omega...
Don’t be a Voice Bandit – How to Edit Professional Writing
Writing is not easy. Whether a person is attempting to write a full-length novel, a short essay, or a blog, it takes thought and effort. Many years ago, a writer was credited with stating that writing is easy. “I just sit at my typewriter until beads of blood form...
21 Essential Cybersecurity Terms You Should Know
In part one of this blog series, we looked at 40+ cybersecurity terms and acronyms, ranging from RaaS (Ransomware as a Service) to SASE (Secure Access Service Edge). In part two, we take a deeper dive into Cybersecurity and give you the essential 21 cybersecurity...
Editing for Cybersecurity is a Gentle Art
Do you remember the early years of schooling, when you were just learning how to construct sentences? In English, there are novel techniques that were developed to assist a person in figuring out what was considered “proper” use of the language. ...
What Is a Pillar Page? Building Page Authority in Cybersecurity
In the cybersecurity marketing world, we hear a lot of terms thrown around when we talk about content marketing. Search Engine Optimization (SEO)…Domain Authority…Search Engine Results Pages (SERP)…these are just a few terms that are often used. However, one term that...
The Value of a Cybersecurity Customer Review Platform
A cybersecurity customer review platform is nothing new but do they provide value? Well, when we are making all important decisions over business purchases, we devour the experiences of others with the products or services we are thinking of buying. No one wants to...