Blog
This blog contains insightful articles dealing with a wide range of cyber security topics. Blogs are submitted by a number of contributors inclusive of blogs authored by Security Truth. If you wish to submit a blog then contact us.
The following rules are to be followed when submitting a blog:
-
No profanity. This includes masking of profanity.
-
All facts are to be referenced.
-
No shaming of individuals.
-
Opinions about companies, organisations, governments, countries, industries and technology must be within the subject of the article/blog post.
-
Blog posts which are dedicated solely on selling a product or endorsing a company's services will be not allowed e.g. Company advertising.
-
Blog posts are to be well written, free from spelling mistakes and grammatical errors.
-
Where blog posts are written in other languages (not in English) it is encourage to provide a English translation. If this is not possible Security Truth will endeavor to translate the posts on a best efforts basis. Note the blog posts will be published in both languages.
-
Blog posts are provided to Security Truth freely and there is no expectation of financial remuneration.