* New: 20 March to 2 April * DemystifySecurity's Student Writing Competition
Attention all ambitious cybersecurity students! If you are eager to showcase your knowledge and skills in the industry, then our cybersecurity article competition is perfect for you.
This is an exceptional opportunity to connect with industry experts and get your work published, while also increasing your chances of being seen by potential employers searching for talented individuals like yourself. In addition, there are two CompTIA Security+ exam vouchers up for grabs, making the competition even more compelling.
How are prizes awarded?
The first voucher will be awarded to the article that is deemed the most interesting and engaging by a panel of experts in the field.
The second voucher will be given to the article with the most engagement on our LinkedIn page, so not only will your work be judged by experts in the industry, but it will also be viewed by a wider audience.
Requirements
To participate in this remarkable opportunity, simply follow our LinkedIn page and submit an article of at least 500 words before the submission deadline of April 2nd 10 PM (GMT), 2023, to info@demystifysecurity.com.
Don't miss out on the chance to kickstart your career in cybersecurity by showcasing your skills and knowledge. Take action today and start brainstorming your article topic to create a piece that will captivate our panel of judges and audience alike. Best of luck!

The value of mutual TLS for API authentication

An honest review Of ‘Undeclared War’ On Channel 4

Teaching your Nanna about Cyber Security

Users – The Weakest Link in Business Security Systems?

Is it Safe to use Serverless Applications?

So, What’s Phishing?

MageCart attack

Elevating security with virtualisation

Cyber crime against women

Side-channel attacks

Data breaches: A story that seems to never end

Why having the right toys matters?

Android wallpaper – a medium for malware infection

Coronavirus: A cyber threat

Coronavirus: Remember to stay safe online too

Passwords and Paranoia

The importance of Ethical Hacking

Minimising risk in business: the relevance of cybersecurity and data protection

Changing characteristics in private-public cybersecurity cooperation

Darkweb crack-down spurs digital refugee crisis

Interview with Dr. Tim Stevens, Lecturer in Global Security at King’s College London

Crash Override: Too big to ignore

An interview with Misha Glenny, author of ‘DarkMarket: How Hackers Became the New Mafia’

Bitcoin: the risks and how to stay safe using it?

Protecting yourself against Ransomware

Four recommended Cyber Security Summer reads

Your PC taken hostage

Personal Cyber Hygiene

Decrypting the encryption debate.

Risk in the Internet of Things

Estonia: how the country became ‘poster child’ for national cyber security.

Who watches the watcher?

Hipster counter-espionage?

IOT – progress or cyber madness?

Hear no evil, see no evil – cyber awareness

Phishing and the cost of your information

Ethical Hacking vs Hacktivism: where perspective matters.

Distorted risk perception: Why we fear terrorism, but don’t worry about our cyber security.

Security fatigue

Trusted security
