Call for Editorial

We’re always interested in gathering perspectives from senior IT & Security leaders on the topics that matter to them
As someone with deep experience in your field, your insights would be incredibly valuable to fellow professionals. We’re interested in hearing from anyone wishing to share expertise and opinions to contribute to industry discussions and make wider connections with others in common.

Would you be open to contributing? It’d be great to hear from you – either complete the form below or schedule a quick call and we’ll take it from there.

Top Reasons to Get Involved
  • Establish Thought Leadership
  • Amplify Your Reach
  • Drive Engagement & Build Connections
  • Educate & Influence Buying Decisions
  • Showcase Real-World Impact
  • Support the Cloud & IT Ecosystem
Why Contribute to MYREDFORT?

The cloud landscape is evolving at an unprecedented pace, and businesses are seeking clarity amidst complexity. By contributing to The Cloud Community, you’re not just sharing insights, you’re shaping industry conversations, building credibility, and expanding your professional reach.

Join us in shaping the future of MYREDFORT.

Submit your content today and make your voice heard!

More in Home
SME Thinking About SASE?
SME Thinking About SASE?

The least you should know


Where does your security start and end?
Where does your security start and end?

How to protect data regardless of where it resides.


12345 or Password1?
12345 or Password1?

Are your users' passwords any good?


How prepared are your defences?
How prepared are your defences?

Grappling with alert fatigue, tool sprawl, and limited resources?


Understanding the network detection and response landscape
Understanding the network detection and response landscape

Building a business case for NDR adoption.


The downside of VPN
The downside of VPN

And how Menlo Security turns the tables.


Ten steps to prepare for SASE adoption

The challenges of browser security
The challenges of browser security

Thousands of policies to consider, while only a few are enforced.


3 cloud security challenges you can’t ignore
3 cloud security challenges you can’t ignore

Automation, skills gaps, and public cloud concerns.


Log it like you mean it
Log it like you mean it

Best practices for security.


Closed communication ecosystems
Closed communication ecosystems

What it means to truly control access.


Secure Access Service Edge
Secure Access Service Edge

What is it, and does it make sense?


Share this story

We're a community where IT security buyers can engage on their own terms.

We help you to better understand the security challenges associated with digital business and how to address them, so your company remains safe and secure.

Interested in what you see? Get in touch, and let's start a conversation Get in touch