<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[Cybersecurity Writers Blog]]></title><description><![CDATA[B2B Content Marketing Insights, Tips & Tools for IT Security Leaders]]></description><link>https://blog.cybersecurity-writers.com/</link><image><url>https://blog.cybersecurity-writers.com/favicon.png</url><title>Cybersecurity Writers Blog</title><link>https://blog.cybersecurity-writers.com/</link></image><generator>Ghost 4.1</generator><lastBuildDate>Mon, 06 Apr 2026 03:33:33 GMT</lastBuildDate><atom:link href="https://blog.cybersecurity-writers.com/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[What Every Cybersecurity Content Writer Should Do]]></title><description><![CDATA[Are you "shoulding" and "musting" all over your readers in your B2B cybersecurity content? Research confirms: it doesn't work. Try this instead:]]></description><link>https://blog.cybersecurity-writers.com/what-every-cybersecurity-content-writer-should-do/</link><guid isPermaLink="false">60ba833a2ae533ba3e2cea5e</guid><category><![CDATA[Content Marketing]]></category><category><![CDATA[Research]]></category><category><![CDATA[Writing]]></category><category><![CDATA[Editing]]></category><dc:creator><![CDATA[Gerd Meissner]]></dc:creator><pubDate>Mon, 07 Jun 2021 14:37:19 GMT</pubDate><media:content url="https://blog.cybersecurity-writers.com/content/images/2021/06/CW-Blog-Featured-Image-06072021.png" medium="image"/><content:encoded><![CDATA[<img src="https://blog.cybersecurity-writers.com/content/images/2021/06/CW-Blog-Featured-Image-06072021.png" alt="What Every Cybersecurity Content Writer Should Do"><p>Did you notice? As B2B cybersecurity content writers, we love telling our readers what they &#x201C;should&#x201D; do.</p><p>As in, &#x201C;Organizations should&#x2026;&#x201D; or &#x201C;CISOs should&#x2026;&#x201D; or &#x201C;You should&#x2026;&#x201D;</p><p>Sometimes, we push that urgency pedal to the &#x201C;must&#x201D; metal. We exclaim that readers or their companies &#x201C;have to&#x201D; or &#x201C;need to&#x201D; or &#x201C;must&#x201D; take certain steps.</p><p>As in, &#x201C;Financial institutions have to&#x2026;&#x201D; or &#x201C;As a compliance leader, you need to&#x2026;&#x201D; &#xA0;or &#x201C;Enterprises must&#x2026;&#x201D;</p><p>Sounds a bit helpless, doesn&#x2019;t it?</p><p>So, does it work? Science confirms: it doesn&#x2019;t (more on that below).</p><!--kg-card-begin: html--><p align="center"><img src="https://blog.cybersecurity-writers.com/content/images/2021/06/somebody-should-do-something.jpeg" alt="What Every Cybersecurity Content Writer Should Do" width="80%"></p><!--kg-card-end: html--><p>If it did, the world would be a safer place.</p><p>We&#x2019;d be fat and happy, because our readers &#x201C;should&#x201D; love whatever product or service we highlight in our whitepapers, blogs, or drip mails.</p><p>The truth is: we can&#x2019;t mandate love - or total security. Most readers are pro-choice, thank you very much.</p><!--kg-card-begin: html--><p id="psychological-reactance">People don&#x2019;t want to be told what to do or not to do. Scientists even have a term for it: <a href="https://www.psychologytoday.com/us/blog/conscious-communication/201906/why-we-hate-people-telling-us-what-do" title="Why We Hate People Telling Us What To Do (Elizabeth Dorrance Hall Ph.D., Psychology Today)" target="_blank" rel="nofollow">psychological reactance</a>.</p><p><br></p><!--kg-card-end: html--><h2 id="does-your-cybersecurity-content-cause-psychological-reactance">Does your cybersecurity content cause psychological reactance?</h2><p><br>Here&#x2019;s a test.</p><p>Next time you read B2B content that stresses what you &#x201C;should&#x201D; do, ask yourself:</p><p>&#x201C;What&#x2019;s my gut reaction to that?&#x201D;</p><p>If the writer or the company she represents is your go-to authority on the subject matter, you may take action.</p><p>Or you let it slide, like that unsolicited and non-applicable advice from a friend who means well and only wants to help.</p><p>Yet, in many more cases, you&#x2019;ll not even consider it and simply move on without hesitation. I know I do. This usually happens for mainly three reasons:</p><ul><li>because the writer has failed to establish authority;</li><li>because the content doesn&#x2019;t speak to the reader&#x2019;s specific cybersecurity needs, situation, restraints, budget, or priorities;</li><li>because of basic human psychology: who wants to be told?</li></ul><p>B2C and B2B content writers underestimate this subconscious pushback at their own peril.</p><p>Does psychological reactance explain, at least in part, why we have failed as an industry to increase cybersecurity awareness in a meaningful way over the past years?</p><p>Perhaps cybersecurity writers are co-responsible for this failure.</p><p>Blame the &#x201C;must-erbation&#x201D; approach in poor cybersecurity content:</p><p></p><h2 id="meet-the-cybersecurity-content-musterbators">Meet the cybersecurity content musterbators</h2><p></p><!--kg-card-begin: html--><p>The term &#x201C;musterbation&#x201D; was coined by cognitive-behavioral science pioneer <a href="https://www.tc.columbia.edu/articles/2007/july/remembering-albert-ellis-a-giant-in-american-psychology---a/" title="Columbia University Teachers College: Albert Ellis (biographical sketch)" rel="nofollow" target="_blank">Albert Ellis</a> (1913-2007). It describes a particular way that people place absolute and unrealistic demands on themselves and others.</p><!--kg-card-end: html--><p>&#x201C;There are three musts that hold us back,&#x201D; the famous psychologist wrote. &#x201C;I must do well. You must treat me well. And the world must be easy.&#x201D;</p><p>The language of &#x201C;must&#x201D;, &#x201C;have to&#x201D;, and &#x201C;should&#x201D; people use to that effect is a language of black and white.</p><p>Such wording doesn&#x2019;t take into account the complexities and many shades of gray in how humans interact with each other and the world.</p><p>As a result, it weakens the desired outcome or prevents it altogether.</p><!--kg-card-begin: html--><p>&#x201C;<i>Should</i> may occasionally give good guidance.  More often, it sets unrealistic expectations,&#x201D; wrote clinical psychologist Susan Heitler in Psychology Today (<a href="https://www.psychologytoday.com/us/blog/resolution-not-conflict/201503/should-you-use-word-it-decreases-your-effectiveness" target="_blank" rel="nofollow" title="Should You Use This Word? It Decreases Your Effectiveness">Should You Use This Word? It Decreases Your Effectiveness</a>):</p><!--kg-card-end: html--><!--kg-card-begin: html--><p><blockquote>&#x201C;Should induces <a href="https://www.psychologytoday.com/us/basics/guilt" target="_blank" rel="nofollow" title="Guilt (Psychology Today)">guilt</a>, and decreases your desire to do what you otherwise might want to do.&#x201D;</blockquote></p><!--kg-card-end: html--><p>That&#x2019;s an empowering insight to share in a marriage counseling or management coaching session, you may think - but in <a href="https://blog.cybersecurity-writers.com/tag/cybersecurity">cybersecurity</a>?</p><h2 id="what-it-security-content-writers-can-learn-from-marriage-counselors">What IT security content writers can learn from marriage counselors</h2><p><br>Don&#x2019;t get me wrong, infusing our message with Snuggle-Plus Language Softener isn&#x2019;t the solution either.</p><p>I&#x2019;ve been writing about IT, and about information security in particular, for several decades now, first as a journalist and book author, then as a ghostwriter, blogger, and editor.</p><!--kg-card-begin: html--><p>Considering how little the messaging has changed, all I&#x2019;m saying is that it may be time to upgrade our communication skills as an industry the same way <a href="https://books.google.com/books?id=bLffCgAAQBAJ&amp;pg=PA23&amp;lpg=PA23&amp;dq=%22cockpit+communication%22+language" target="_blank" rel="nofollow" title="Lawrence M. Gillman, Sandy Widder, Michael Blaivas MD, Dimitrios Karakitsos (Editors): Trauma Team Dynamics: A Trauma Crisis Resource Management Manual (Springer)">other security and safety-focused fields</a> continue to <a href="https://hbr.org/2020/04/how-to-persuade-people-to-change-their-behavior" target="_blank" rel="nofollow" title="Jonah Berger: How to Persuade People to Change Their Behavior (Harvard Business Review">improve</a> theirs.</p><!--kg-card-end: html--><p>The good news is that we seem to be catching on to the problem. Slowly, but better late than never.</p><!--kg-card-begin: html--><p>Steve Durbin, the chief executive of the UK-based Information Security Forum (ISF), has noticed this change, too. He pointed out the underlying problem in a recent ISF podcast episode on <a href="https://www.securityforum.org/spotlight-on/influencing-security-behaviour/" title="ISF Podcast: Influencing Security Behaviour" rel="nofollow" target="_blank">Influencing Security Behaviour</a>:</p><!--kg-card-end: html--><figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/_5HCKQdrRwM?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></figure><p>&#x201C;People don&#x2019;t respond well to being told,&#x201D; said Steve. &#x201C;You get my buy-in much better by explaining to me than by telling me.&#x201D; (TC 08:59 min) </p><p>His prediction: &#x201C;We&#x2019;re going to see a need for a very much deeper understanding of some of the psychological elements of why people do what they do.&#x201D;</p><p>Until then, what&#x2019;s the solution? Abandon &#x201C;should&#x201D; and &#x201C;must&#x201D; and &#x201C;have to&#x201D; in cybersecurity content, such as How-to and best practices blog posts, altogether?</p><!--kg-card-begin: html--><p>Let&#x2019;s be real. Most of us, including yours truly, use these words <a href="https://blog.authentic8.com/october-is-malvertising-awareness-month/" title="October is Malvertising Awareness Month (Gerd Meissner on Authentic8 Blog)" target="_blank">on occasion</a> (even if we know better) to signal urgency and create a sense of obligation. We do so on a deadline, to save time,  or simply because <a href="https://blog.cybersecurity-writers.com/your-key-to-unique-remote-work-headlines/">research</a> says it works in <a href="https://blog.cybersecurity-writers.com/what-every-cybersecurity-content-writer-should-do#top" title="What Every Cybersecurity Content Writer Should Do">headlines</a>.<!--kg-card-end: html--></p><p>A more practical and effective solution than quitting &#x201C;shoulds&#x201D; and &#x201C;musts&#x201D; altogether in cybersecurity content is to use them sparsely. Can you think of an alternative? Deploy it. More often than not, it will make your content better.</p><p>Let&#x2019;s look at a few such alternatives next.</p><p></p><h2 id="from-%E2%80%9Cshould%E2%80%9D-to-%E2%80%9Cshow%E2%80%9D">From &#x201C;should&#x201D; to &#x201C;show&#x201D;</h2><p><br>Instead of dispensing &#x201C;should&#x201D; advice or similar, we can choose from several alternatives, depending on the type of content. Here a three of my personal preferences:</p><ul><li>Show how an industry peer solved the problem. In a short customer story or case snapshot, describe why that person or organization took the desired action. One additional advantage of this method is that it provides <a href="https://unbounce.com/landing-pages/social-proof/">social proof</a> for what you are recommending.<br><br>Enterprise digital rights management company Fasoo used this approach in a <a href="https://en.fasoo.com/the-ip-protection-capability-more-manufacturing-it-leaders-wish-they-had/">blog post about insider threats in tech manufacturing</a> (last four paragraphs).<br><br><br></li><li>Can&#x2019;t name customer names? It&#x2019;s a common challenge many are facing in our space. One solution here is to apply a generalization. &#x201C;Should&#x201D; betrays wishful thinking - state facts instead.<br><br>Talk about those peers or leaders as a group who already took the step you suggest and describe the outcome.<br><br>A basic example: Instead of writing &#x201C;IT security leaders in financial services should deploy [our product or service here], because... As a result, &#x2026;&#x201D;, we can use &#x201C;Throughout the financial services sector, IT security leaders are now deploying [ditto], because&#x2026; As a result, ...&#x201D;</li></ul><p></p><ul><li>Reframe instances of <a href="https://www.google.com/search?q=%22CISOs+should%22">&#x201C;CISOs should...&#x201D;</a> or <a href="https://www.google.com/search?q=%22Threat+hunters+must%22">&#x201C;Threat hunters must...&#x201D;</a> (Google search examples) - or whatever the onus is you put on your specific audience persona - to minimize <a href="https://blog.cybersecurity-writers.com/what-every-cybersecurity-content-writer-should-do/#psychological-reactance">psychological reactance</a>.<br><br>A straightforward way is to write in the second person and use verbs in the imperative mood when rendering advice or urging action. This particular method has three additional advantages: 1) It is shorter, 2) it&#x2019;s assertive, thus reinforces (subject matter) authority, and 3) it removes ambiguity.</li></ul><p><br>Yes, if you are a B2B cybersecurity writer who entered the field from marketing or journalism, the latter style may take getting used to. Military veterans who transitioned to creating IT security content, for example, seem to be more comfortable with it.</p><p>That&#x2019;s at least my experience as an editor. As an aircraft pilot, I&#x2019;ll use an example from the left seat to show the difference that particular communication style makes.</p><h2 id="short-and-to-the-point-avoids-ambiguity">Short and to the point avoids ambiguity</h2><p><br>Let&#x2019;s say Air Traffic Control (ATC) told the Pilot Flying &#x201C;<em>You should</em> turn left heading two-six-zero for traffic avoidance, after <em>w</em>hich <em>you have to</em> descend and maintain six thousand.&#x201C; (In the real world, they would use &#xA0;the FAA-conform &#x201C;Turn left heading two-six-zero for traffic avoidance, descend and maintain six thousand.&#x201D;)</p><p>That could lead to some serious head-scratching in the cockpit. &#x201C;Should we? What happens if we don&#x2019;t, and when? How urgent is this anyway? ATC is really long-winded and nice today. Who&#x2019;s that chatty intern? Whatever it is, they don&#x2019;t seem to be so sure either. &#x201D;</p><p>The point is, you don&#x2019;t want to find out.</p><p>Like with ransomware. This is where words <em>do</em> matter.</p><p></p><h2 id="the-case-for-cybersecurity-content-that-matters">The case for cybersecurity content that matters</h2><p><br>Granted, words won&#x2019;t stop ransomware. But as cybersecurity writers, we can make our content more credible and effective with help from science. Credibility, as <a href="https://blog.cybersecurity-writers.com/hungry-for-b2b-cybersecurity-content/">B2B content marketing research</a> shows, is key to engaging especially new site visitors.</p><p>Too many &#x201C;shoulds&#x201D; and &#x201C;musts&#x201D; in a blog post, email, or whitepaper indicate insecurity. In combination with other <a href="https://blog.cybersecurity-writers.com/this-cliche-will-harm-your-content-marketing/">tell-tell signs</a>, they can also signal that the content was cranked out by a beginner or a content mill (or by a beginner in a content mill).</p><!--kg-card-begin: html--><p>It&#x2019;s one <a href="https://blog.cybersecurity-writers.com/is-your-cybersecurity-content-too-weak/" title="Is Your Cybersecurity Content Too Weak?">cybersecurity content weakness</a> among many that can reflect poorly on a company. I&#x2019;ve written about some of the others <a href="https://blog.cybersecurity-writers.com/is-your-cybersecurity-content-too-weak/" title="Is Your Cybersecurity Content Too Weak?">here</a>. Our communication capabilities as an industry are lagging behind the massive and rapid progress information technology has made over the past three decades, <a href="https://www.sciencedirect.com/science/article/pii/S0740624X17300540#bb0020" target="_blank" rel="nofollow" title="Han de Bruijn, Marijn Janssen: Building Cybersecurity Awareness: The need for evidence-based framing strategies (Government Information Quarterly - Elsevier)">research confirms</a>.</p><!--kg-card-end: html--><p>One could argue that B2B content quality, in general, has declined significantly during the same period. And one would be correct.</p><!--kg-card-begin: html--><p>That&#x2019;s not a new insight, though. I recommend reading Doug Kessler&#x2019;s seminal rant <a href="https://velocitypartners.com/resources/crap-the-single-biggest-threat-to-b2b-content-marketing/" rel="nofollow" target="_blank" title="Crap: the single biggest threat to B2B content marketing (Doug Kessler on the Velocity Partners Blog)">Crap: the single biggest threat to B2B content marketing</a> from 2013.</p><!--kg-card-end: html--><p>It&#x2019;s also a lousy excuse if we compare our industry to other sectors where security and safety play a big role. The military and regulated fields like healthcare or aviation learn from each other.</p><!--kg-card-begin: html--><p align="center"><img src="https://blog.cybersecurity-writers.com/content/images/2021/06/clarity-in-communication-us-air-force.jpeg" alt="What Every Cybersecurity Content Writer Should Do" width="80%&quot;"></p><!--kg-card-end: html--><!--kg-card-begin: html--><p>They also draw on interdisciplinary research for continuous communication improvement. Surgeons and nurses, for example, now follow some of the same <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7449978/" title="You Have Control: aviation communication application for safety-critical times in surgery (Elsevier Public Health Emergency Collection)" target="_blank" rel="nofollow">communication guidelines</a> developed for airline cockpits.</p><!--kg-card-end: html--><p>Isn&#x2019;t it time for information security thought leaders and content creators to follow their example and look at behavioral and communication <a href="https://blog.cybersecurity-writers.com/tag/research">research</a> for guidance?</p><p>So let&#x2019;s get serious about the words we use or don&#x2019;t use to influence cybersecurity behavior. </p><p>The alternatives presented above make it easy to nip the &#x201C;shoulding and musting&#x201D; in the bud, before it can blossom into the unhealthy writing style that is a hallmark of bad <a href="https://blog.cybersecurity-writers.com/tag/writing">cybersecurity writing</a>.</p><!--kg-card-begin: html--><center>*</center><!--kg-card-end: html--><!--kg-card-begin: html--><center><p></p><h4>You need more quality B2B content, and faster?</h4><p></p></center>
<center><p></p><h3><a href="https://www.cybersecurity-writers.com">Let&apos;s talk.</a><p></p></h3></center><!--kg-card-end: html-->]]></content:encoded></item><item><title><![CDATA[With Clarity Against ID Theft: New Assessment Tool Aims to Limit Post-Breach Damage]]></title><description><![CDATA[Breach Clarity, a startup headed up by onetime Javelin Strategy + Research co-founder Jim Van Dyke, could help cybersecurity journalists, bloggers, and PR professionals write more clearly about data breaches.]]></description><link>https://blog.cybersecurity-writers.com/with-clarity-against-id-theft-new-assessment-tool-aims-to-limit-post-breach-damage/</link><guid isPermaLink="false">605f7a8c2ae533ba3e2ce932</guid><category><![CDATA[Crisis Communication]]></category><category><![CDATA[Press Releases]]></category><category><![CDATA[Cybersecurity]]></category><category><![CDATA[PR]]></category><category><![CDATA[ID Theft]]></category><dc:creator><![CDATA[Guest Contributor]]></dc:creator><pubDate>Mon, 01 Mar 2021 13:17:23 GMT</pubDate><media:content url="https://blog.cybersecurity-writers.com/content/images/2021/03/Time-for-Post-Data-Breach-Clarity-CW-Blog-Image-3-1-2021-min--1--1.png" medium="image"/><content:encoded><![CDATA[<img src="https://blog.cybersecurity-writers.com/content/images/2021/03/Time-for-Post-Data-Breach-Clarity-CW-Blog-Image-3-1-2021-min--1--1.png" alt="With Clarity Against ID Theft: New Assessment Tool Aims to Limit Post-Breach Damage"><p><em>By Robert McGarvey</em></p><p>Breaches are commonplace. There are four significant ones per day, says Van Dyke.</p><p>They often affect financial information, such as bank account or credit card data, protected health records, personally identifiable information (PII), or intellectual property.</p><p>In 2020, the total number of records exposed in reported breaches <a href="https://www.govtech.com/blogs/lohrmann-on-cybersecurity/2020-data-breaches-point-to-cybersecurity-trends-for-2021.html">exceeded 37 billion, a 141% increase over 2019</a>. This number doesn&apos;t even include yet 2020 data breaches reported in Q1 2021.</p><p>But what does that mean for individual consumers and their personal data in each case? &quot;The biggest challenge breach victims face,&quot; says Eva Velasquez, CEO of the nonprofit <a href="https://www.idtheftcenter.org/">Identity Theft Resource Center</a> (ITRC), &quot;is understanding the risks associated with a particular breach, and what steps they should take next.&quot;</p><p></p><h2 id="data-breach-press-releases-from-lawyers-for-lawyers">Data breach press releases from lawyers, for lawyers</h2><p><br>Ask any cybersecurity journalist what they do not like about data breach press releases of, say, financial services firms or health care providers, and the answer is: everything.</p><p>Such news releases disclose as little as possible and offer few details. Opacity is the hallmark of the genre.</p><p>These announcements are mostly made by lawyers, for an audience of other lawyers or state and federal regulators.</p><p>Often, they add more to the post-breach confusion than they help minimize the damage.</p><p>As a result, most IT security reporters and general news media go through the motions and contribute to the general data breach alarm fatigue. Consumers are left confused, frightened, and wonder how exactly they are impacted, and what they can do about it.</p><p></p><h2 id="how-severe-is-the-data-breach-ask-this-web-app-">How severe is the data breach? Ask this web app.</h2><p></p><p>Enter <a href="https://www.breachclarity.com/">Breach Clarity</a>, which puts transparency over opacity because its founders think that makes more business sense.</p><!--kg-card-begin: html--><p align="center"><img src="https://blog.cybersecurity-writers.com/content/images/2021/03/breach-clarity-score-basic-excerpt-min--1-.png" alt="With Clarity Against ID Theft: New Assessment Tool Aims to Limit Post-Breach Damage" width="100%"></p><p align="right"><i>Screenshot: Free data breach severity score - Breach Clarity Basic</i></p><!--kg-card-end: html--><p>The startup&apos;s new web service aims to prevent post-breach paralysis by providing consumers with three actionable insights:</p><ul><li>The tool scores a data breach on its severity, from 1 to 10;<br></li><li>it explains to individuals how they can protect themselves if caught up in a specific data heist;<br></li><li>it offers a score of the user&apos;s risk of becoming a fraud victim, with scores ranging from 1 to 100.</li></ul><p><br>The data breach severity scores and custom-tailored corrective steps are calculated based on Breach Clarity&apos;s patent-pending <a href="https://www.breachclarity.com/about/breach-clarity-score">algorithms</a>. Action items are specific to a particular breach and to the person who&apos;s asking, explains &#xA0;Co-founder and CEO Jim Van Dyke.</p><p>A data breach, for instance, that involves completed W-2 forms, banking information, and HR files exposes affected employees to IRS tax refund fraud.</p><p></p><h2 id="where-does-breach-clarity-get-its-breach-report-data">Where does Breach Clarity get its breach report data?</h2><p></p><p>Van Dyke says that Breach Clarity&apos;s consumer research found a surprisingly robust appetite for such tools among Gen Z and Millennials. The researchers also found high interest among Baby Boomers.</p><!--kg-card-begin: html--><p>Will Breach Clarity, <a href="https://www.businesswire.com/news/home/20210309005230/en/Sontiq%C2%AE-Acquires-Fintech-Provider-Breach-Clarity" title="Sontiq Acquires Breach Clarity" rel="nofollow" target="_blank">which was acquired by Sontiq in March 2021</a>, be able to give them the answers they are looking for?</p><!--kg-card-end: html--><p>Its approach&apos;s success depends to a high degree on the quantity and quality of available data breach reports.</p><p>A 2017 study indeed found <a href="https://www.law.com/thelegalintelligencer/2020/09/02/charges-from-botched-data-breach-responses-put-the-heat-on-corporate-execs/">60% of U.S. data breaches went unreported.</a> But there has been improvement in the four years since.</p><p>Privacy experts attribute this trend to the introduction of stricter consumer privacy laws and regulations at state level and of GDPR, the General Data Protection Regulation in the European Union, which also affects numerous US-based companies.</p><p>The new regulations are credited with increased self-reporting, especially in regulated sectors such as healthcare and the financial services industry.</p><p>Breach Clarity gets its data breach details from the ITRC, whose database is considered a gold standard in the field. Van Dyke sits on the ITRC <a href="https://www.idtheftcenter.org/board-of-directors/">board</a>.</p><p>The nonprofit&apos;s nationwide database contains detailed information on the latest publicly reported data compromises that impact consumers and businesses.</p><p>Eva Velasquez says ITRC is proud to be a part of a &quot;no-cost solution that brings much needed clarity to the victims of data breaches.&quot;</p><p></p><h2 id="first-target-markets-credit-unions-and-banks">First target markets: credit unions and banks</h2><p><br>How will Breach Clarity make money? For now, Jim Van Dyke, whose Javelin claimed many mega banks as clients, is marketing Breach Clarity as a value add for credit unions to offer to their members.</p><p>He already claims one customer - BCU (formerly Baxter Credit Union), the nation&apos;s <a href="https://www.mx.com/moneysummit/biggest-us-credit-unions-by-asset-size">56th largest</a> with around $4 billion in assets.</p><!--kg-card-begin: html--><p align="center"><img src="https://blog.cybersecurity-writers.com/content/images/2021/03/Breach-Clarity-CEO-Jim-Van-Dyke-min--1-.jpg" alt="With Clarity Against ID Theft: New Assessment Tool Aims to Limit Post-Breach Damage" width="100%"></p><p align="right"><i>Jim Van Dyke (Photo: Breach Clarity)</i></p><!--kg-card-end: html--><p><a href="https://www.bcu.org/">BCU </a>is offering Breach Clarity&apos;s <a href="https://www.breachclarity.com/products/bc-premium-now">premium-level service</a> as a free tool to its members. Nonetheless, Van Dyke forecasts a 5x ROI through a reduction in fraud losses.</p><p>That&apos;s because financial institutions absorb the bulk of the losses due to data breaches, says Van Dyke. Informed members/customers, goes his calculation, will be better able to take steps early to minimize fraud.</p><p>He also expects fewer calls to helplines. After heavily reported breaches, financial institutions are swamped with SOS calls. Fewer calls mean lower costs, which is why Breach Clarity expects growing interest from large regional and national banks next.</p><p></p><h2 id="more-cybersecurity-content-clarity-as-a-possible-side-benefit">More cybersecurity content clarity as a possible side benefit?</h2><p></p><p>Post-breach communication needs to improve on many levels, and Breach Clarity may have a role to play here.</p><p>News journalists and B2C content writers can draw on the service to give their readers more specific advice than the basic &quot;check your credit report&quot; guidance.</p><p>Organizations that suffer a publicly reported breach can point their members or customers to the Breach Clarity.</p><p>Most importantly, they need to be more transparent and clear about what happened, including possible consequences, starting with the first public announcement of the data breach, and follow these:</p><h2 id="three-basic-rules-for-post-data-breach-press-releases">Three basic rules for post-data breach press releases</h2><p></p><ul><li>Ditch the opacity. Be transparent about what data was stolen, over what timeframe, and admit what you don&apos;t know yet.<br></li><li>Spell out the steps your organization has taken to mitigate the data breach. That doesn&apos;t mean giving cyber crooks a road map. Disclose to the public any information that will help restore confidence.<br></li><li>Let cybersecurity crisis communication professionals polish your press releases. Yes, in-house counsel or your law firm will want to have the final say. For clarity and specificity, also involve a skilled PR writer with cybersecurity background.</li></ul><!--kg-card-begin: html--><center>*</center>
<p><i>This post has been updated to reflect the acquisition of Breach Clarity by Sontiq (3/9/2021 announcement).</i></p><!--kg-card-end: html--><!--kg-card-begin: html--><p><img src="https://blog.cybersecurity-writers.com/content/images/2021/03/Robert-McGarvey-wbg-min.png" width="200px" align="left" style="margin: 5px 15px" alt="With Clarity Against ID Theft: New Assessment Tool Aims to Limit Post-Breach Damage"><i>Cybersecurity Writers guest contributor <a href="https://www.mcgarvey.net/" title="Robert McGarvey"><b>Robert McGarvey</b></a> (Twitter: <a href="https://twitter.com/rjmcgarvey" target="_blank" rel="nofollow">@rjmcgarvey</a>) is a veteran technology reporter who has often covered cybersecurity and data breaches especially in financial services and <a href="https://blog.cybersecurity-writers.com/hospitality-when-will-we-see-a-hotel-safe-data-pledge/" title="Hospitality: When Will We See a Hotel Safe Data Pledge? (Robert McGarvey on the CYbersecurity Writers Blog)">hospitality</a>.</i> Listen to his half-hour <a href="https://www.buzzsprout.com/268738/7295068" title="CU2.0 Podcast Episode 134 Jim Van Dyke Breach Clarity" target="_blank">podcast with Jim Van Dyke</a> here.</p><!--kg-card-end: html-->]]></content:encoded></item><item><title><![CDATA[11 Blogs With Reviews of New Cybersecurity Books and Author Interviews]]></title><description><![CDATA[So you wrote a book. Which blogs review new cybersecurity books? How do you find book reviewers and score author interviews? Start with this list.]]></description><link>https://blog.cybersecurity-writers.com/11-blogs-with-reviews-of-new-cybersecurity-books-and-author-interviews/</link><guid isPermaLink="false">605f7a8c2ae533ba3e2ce931</guid><category><![CDATA[Writing]]></category><category><![CDATA[Podcast]]></category><category><![CDATA[Cybersecurity]]></category><category><![CDATA[Content Marketing]]></category><category><![CDATA[Books]]></category><category><![CDATA[Research]]></category><category><![CDATA[Career]]></category><dc:creator><![CDATA[CW Team]]></dc:creator><pubDate>Fri, 29 Jan 2021 17:26:50 GMT</pubDate><media:content url="https://blog.cybersecurity-writers.com/content/images/2021/03/Blogs-With-Cybersecurity-Book-Reviews-01292021-min--1-.png" medium="image"/><content:encoded><![CDATA[<img src="https://blog.cybersecurity-writers.com/content/images/2021/03/Blogs-With-Cybersecurity-Book-Reviews-01292021-min--1-.png" alt="11 Blogs With Reviews of New Cybersecurity Books and Author Interviews"><p>Established and new cybersecurity podcasts soared in 2020. That doesn&apos;t mean IT security professionals stopped reading books and eBooks. On the contrary.</p><!--kg-card-begin: html--><p>Let&apos;s look at eBooks, for example. <a href="https://blog.cybersecurity-writers.com/hungry-for-b2b-cybersecurity-content/" title="Research: Hungry for B2B Cybersecurity Content (Cybersecurity Writers Blog)" target="_blank">Research on B2B content consumption changes in 2020</a> found that eBooks ranked #1 in total views by content format. This includes complimentary downloads of B2B cybersecurity eBooks.</p><!--kg-card-end: html--><!--kg-card-begin: html--><p>Then there&apos;s the growing commercial eBooks market. In the first 11 months of 2020, eBook revenues in the US grew 15.2% to <b>$1.0 billion</b>,  according to the <a href="https://publishers.org/news/aap-november-2020-statshot-report-publishing-industry-up-24-5-for-month-up-0-8-year-to-date/" target="_blank" rel="nofollow">Association of American Publishers</a> (AAP).</p><!--kg-card-end: html--><p>The report provides only a glimpse of the total market. AAP is tracking roughly 1,300 publishers. Together, they represent less than one-fifth of eBook sales.</p><!--kg-card-begin: html--><p>The trade association doesn&apos;t follow smaller niche imprints. It doesn&apos;t track self-publishers and the labels owned by Amazon Publishing, which drive most of the eBook market growth. <a href="https://www.statista.com/outlook/21320/109/ebooks/united-states" rel="nofollow" target="_blank" title="Statista: eBook Revenues Forecast 2020">Statista</a> expects total eBook revenues in the US to surpass the <b>$6.0 billion</b> mark this year.</p><!--kg-card-end: html--><p>Granted - <a href="https://blog.cybersecurity-writers.com/tag/cybersecurity/">cybersecurity</a> publications make up only a minuscule fraction of the book market. Still, <a href="https://blog.cybersecurity-writers.com/tag/writing/">infosec tech writers</a> and IT recruiters-turned-authors contribute to this trend and benefit. </p><p>Quite a few have turned the 2020 <a href="https://blog.cybersecurity-writers.com/your-key-to-unique-remote-work-headlines/">lockdown</a> into an opportunity, or are about to. They have written or are currently writing technical eBooks, manuals, or leadership guides.</p><p>Does this sound familiar? Do you have a cybersecurity book in the works? And if so, how will your future readers learn about it?</p><p><br></p><h2 id="you-ve-written-a-book-how-will-readers-know">You&apos;ve written a book. How will readers know?</h2><p><br>Prepare for a crowded field. The good news is, as a newly minted book author, you&apos;re not alone. </p><p>That&apos;s also the bad news.</p><p>Get ready to face some stiff competition. More authors will be vying for attention for their cybersecurity books this year. They&apos;ve been as busy as you were.</p><p>The topics your fellow authors are tackling cover a wide field. Some write about threat intelligence and malware trends. Others examine pentesting methods and tools. <a href="https://blog.cybersecurity-writers.com/tag/career/">Career</a> advice for CISOs, anybody? Or accountability strategies for board members?</p><p>Someone wrote the book on it.</p><p>But wait, there&apos;s more.</p><!--kg-card-begin: html--><p>What about the <a href="https://blog.cybersecurity-writers.com/7-new-cybersecurity-podcasts-you-should-follow-in-2021" title="7 New Cybersecurity Podcasts You Should Follow in 2021 (Cybersecurity Writers Blog)" target="_blank">new cybersecurity podcasts launched in 2020</a>? Quite a few shows focus on career advice, research, and B2B cybersecurity thought leadership.</p><!--kg-card-end: html--><p>Some have racked up enough quality content by now to consider branching out. More hosts follow the changed <a href="https://blog.cybersecurity-writers.com/hungry-for-b2b-cybersecurity-content/">B2B content trends</a>. They are currently seeking to broaden their audiences.</p><!--kg-card-begin: html--><p>They edit and repurpose their conversations for consumption beyond the <a href="https://blog.cybersecurity-writers.com/podcast/" title="Podcasting topics on the Cybersecurity Writers Blog" target+_blank">podcasting</a> sphere. <a href="https://blog.cybersecurity-writers.com/hungry-for-b2b-cybersecurity-content/" target="_blank" title="How to repurpose digital event content without cheapening it (Cybersecurity Writers Blog)">Executive summaries of webcasts and podcast episodes</a> are one example. More companies are offering them now, courtesy of their corporate sponsors.</p><!--kg-card-end: html--><p>Independent consultants and other professionals launched podcasts to advance their careers. They may turn the accumulated content into the ultimate business card.</p><p>What a better boost for your personal brand than a book that speaks to your subject matter expertise?</p><p><br></p><h2 id="where-to-promote-your-cybersecurity-book-online">Where to promote your cybersecurity book online?</h2><!--kg-card-begin: html--><p>Guest appearances on industry podcasts are an obvious option. Podcast, book, and <a href="http://ebook-pr.com/page/podcast-pr-for-your-book" title="Podcast PR for Your Book (eBook PR)" target="_blank">eBook PR</a> experts have specialized in reaching out to the right shows.</p><!--kg-card-end: html--><p>New authors should find an expert who is familiar with the podcasting landscape in their field. This approach ensures that they get booked for interviews in front of audiences that are a good match.</p><!--kg-card-begin: html--><p align="center"><img src="https://blog.cybersecurity-writers.com/content/images/2021/03/cybersecurity-writers-guide-to-book-success-at-a-library-min--1-.png" alt="11 Blogs With Reviews of New Cybersecurity Books and Author Interviews"></p><!--kg-card-end: html--><p>Industry websites and blogs for the information security community provide another viable venue. Focus on those that publish author interviews or highlight new books for their followers.</p><p>They often rely on established cybersecurity journalists or subject matter experts for new book reviews. Such posts have a much longer &quot;shelf life&quot; than podcasts. They also reach a larger audience.</p><!--kg-card-begin: html--><p>That&apos;s important, because avid readers aren&apos;t necessarily voracious podcasts listeners. Research shows that <a href="https://www.psychologytoday.com/us/blog/reading-minds/201904/why-read-when-you-can-listen" taget="_blank" title="Why Read When You Can Listen? (Psychology Today)" rel="nofollow">listening is less effective</a>.</p><p><a href="https://blog.cybersecurity-writers.com/7-new-cybersecurity-podcasts-you-should-follow-in-2021/" title="7 New Cybersecurity Podcasts to Follow in 2021" target _blank>Cybersecurity podcasts</a> also don&apos;t always provide episode notes with links to resources. As a result, even frequent listeners may have to take an extra step to find the book online.</p><!--kg-card-end: html--><p>In comparison, most blogs make it easy to order and download the books they mention or review. </p><p>New podcasters-turned-authors will face a challenge, though.</p><p><br></p><h2 id="you-thought-building-a-podcast-audience-was-tough">You thought building a podcast audience was tough?</h2><p><br>Then try getting your cybersecurity book reviewed on reputable blogs and industry portals.</p><p>The legwork will make you miss the days of slogging from zero to the first few hundred listeners.</p><p>On the plus side, you know now that you have what it takes. The &quot;DIY approach&quot; to book/eBook PR requires more of the same. Think serious time investments, thorough research, determination, resilience - and luck.</p><p>Are you ready to take your pain to a whole new level?</p><p>To give you a head start, we&apos;ve put together this overview of</p><p><br></p><h2 id="11-blogs-for-authors-to-promote-their-new-cybersecurity-book">11 Blogs for Authors to Promote Their New Cybersecurity Book</h2><p><br></p><p>Which blogs reviewed new cybersecurity books or published author interviews in 2020?</p><p>The list below is by far not exhaustive. But after reviewing it, you may have a better idea of places to turn to with your new book.</p><p>That doesn&apos;t mean you&apos;re on your own with identifying the &quot;right&quot; reviewers. To save time and legwork, check out the tips at the bottom of this post.</p><p>How to find book reviewers in the cybersecurity field?</p><p>The key is developing a target list of journalists, bloggers, and podcasters that is custom-tailored to your book. Identify those who cover the &#xA0;IT security topic or field you write about.</p><p>This post can serve as a starting point. Much success with your book launch!</p><!--kg-card-begin: html--><center>*</center><!--kg-card-end: html--><h3 id="blumira-blog">Blumira Blog</h3><p></p><!--kg-card-begin: html--><p>IT security firm Blumira invited cybersecurity book author Pascal Ackerman on its podcast. Check out the blog mini-series distilled from the <a href="https://www.blumira.com/modern-cybersecurity-practices-part-1/" title="Interview with Pascal Ackerman, author of Modern Cybersecurity Practices (Blumira Blog)" target="_blank" rel="nofollow">conversation between Mike McCarthy and Pascal Ackerman, who wrote Modern Cybersecurity Practices: Exploring And Implementing Agile Cybersecurity Frameworks and Strategies for Your Organization</a>.</p><!--kg-card-end: html--><p><br></p><h3 id="cybersecurity-canon">Cybersecurity Canon</h3><p><br></p><p>Then-time Palo Alto Networks CISO Rick Howard created the Cybersecurity Canon in 2013. His goal: establishing a resource of &quot;must-read books for all cybersecurity practitioners.&quot;</p><p>The result was a curated catalog with reviews of books from and about the industry. It allows readers to keep up with essential knowledge and developments in the field. In 2020, the Cybersecurity Canon moved to Ohio State University.</p><!--kg-card-begin: html--><p>Read recent <a href="https://icdt.osu.edu/cybercanon" title="Cybersecurity Canon Reviews (OSU Institute for Cybersecurity &amp; Digital Trust)" target="_blank" rel="nofollow">Cybersecurity Canon reviews on the website of OSU&apos;s Institute for Cybersecurity &amp; Digital Trust</a>.</p><!--kg-card-end: html--><p><br></p><h3 id="cybersecurity-guide">Cybersecurity Guide</h3><p><br></p><p>The Cybersecurity Guide offers a wide variety of specialized education and career resources. It covers mostly online and on-campus cybersecurity degree programs.</p><!--kg-card-begin: html--><p>Included are associate&apos;s degree, bachelor&apos;s degree, master&apos;s degree, and Ph.D. degree programs. Read the Cybersecurity Guide&apos;s expert <a href="https://cybersecurityguide.org/expert-interviews/matt-bishop/" title="Interview with Matt Bishop, who author of Computer Security: Art and Science (Cybersecurity Guide)" target="_blank" rel="nofollow">interview with Matt Bishop, who authored the textbook Computer Security: Art and Science</a>.</p><!--kg-card-end: html--><p><br></p><h3 id="the-diplomat">The Diplomat</h3><p></p><!--kg-card-begin: html--><p>The Diplomat magazine covers current affairs in the Asia-Pacific region. It publishes expert analysis and commentary on events occurring in Asia and globally. This includes cybersecurity developments. One example from the Trans-Pacific View Blog of The Diplomat is Mercy A. Kuo&apos;s <a href="https://thediplomat.com/2020/03/the-hacker-and-the-state-cyberattacks-and-the-new-normal-of-geopolitics/" title="Interview with Ben Buchanan, author of The Hacker and the State (The Diplomat)" target="_blank" rel="nofollow">interview with Georgetown University professor Ben Buchanan, author of The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics</a>.</p><!--kg-card-end: html--><p><br></p><h3 id="government-technology">Government Technology</h3><p></p><!--kg-card-begin: html--><p>Government Technology and its sister publications report on IT in state and local governments. Part of the mix are in-depth reviews of publications about IT security in the public sector. A 2020 example is this <a href="https://www.govtech.com/blogs/lohrmann-on-cybersecurity/book-review-cybersecurity--attack-and-defense-strategies.html" target="_blank" title="Book review: Cybersecurity &#x2013; Attack and Defense Strategies by Yuri Diogenes and Erdal Ozkaya (Government Technology)" rel="nofollow">book review by Government Technology blogger Dan Lohrmann, Chief Security Officer of Security Mentor, of Cybersecurity &#x2013; Attack and Defense Strategies by Yuri Diogenes and Erdal Ozkaya</a>.</p><!--kg-card-end: html--><p><br></p><h3 id="help-net-security">Help Net Security</h3><p></p><!--kg-card-begin: html--><p>Croatia-based Help Net Security has covered information security since 1998. Topics tackled include technical security challenges and IT management issues. The portal features a dedicated reviews section. Read news editor Helga Labus&apos; <a href="https://www.helpnetsecurity.com/2020/07/28/review-cyber-warfare-truth-tactics-and-strategies/" target="_blank" rel="nofollow" title="Review of Chase Cunningham&apos;s Cyber Warfare (Help Net Security)">review of Chase Cunningham&apos;s Cyber Warfare - Truth, Tactics, and Strategies</a>.</p><!--kg-card-end: html--><p><br></p><h3 id="rift-recon-blog">Rift Recon Blog</h3><p></p><!--kg-card-begin: html--><p>Rift Recon is a boutique cyber- and physical security firm. It provides consulting, training, and software development services. Read the Rift Recon blog <a href="https://www.riftrecon.com/blog/2020/06/02/interview-with-matt-monte-author-of-network-attacks-and-exploitation-a-framework/" target="_blank" rel="nofollow" title="Interview with Matt Monte, author of Network Attacks and Exploitation (Rift Recon Blog)">interview with Matt Monte, author of Network Attacks and Exploitation: A Framework</a>.</p><!--kg-card-end: html--><p><br></p><h3 id="secure-blitz">Secure Blitz</h3><p></p><!--kg-card-begin: html--><p>SecureBlitz aims to inform about and expose cyber threats on the internet. It occasionally includes interviews with cybersecurity book authors. Read Gina Lynch&apos;s <a href="https://secureblitz.com/interview-with-hugh-taylor-digital-downfall/" target="_blank" rel="nofollow" title="Interview with Hugh Taylor, author of Digital Downfall (SecureBlitz)">interview with Hugh Taylor, author of Digital Downfall: Technology, Cyberattacks and the End of the American Republic</a>.</p><!--kg-card-end: html--><p></p><p></p><h3 id="solutions-review">Solutions Review</h3><p></p><!--kg-card-begin: html--><p>Solutions Review publishes content about Enterprise Cloud solutions on its portal. This includes reviews of publications and tools. In August 2020, tech writer Daniel Hein <a href="https://solutionsreview.com/cloud-platforms/the-essential-cloud-security-books-for-cybersecurity-professionals/" target="_blank" rel="nofollow" title="Book Reviews: The Essential Cloud Security Books for Cybersecurity Professionals (Solutions Review)">reviewed The Essential Cloud Security Books for Cybersecurity Professionals</a>.</p><!--kg-card-end: html--><p><br></p><h3 id="strategic-piece">Strategic Piece</h3><p></p><!--kg-card-begin: html--><p>Strategic Piece helps B2B companies unify their marketing, sales, and service efforts. Read founder Matt Bell&apos;s <a href="https://www.strategicpiece.com/blog/cyber-security-in-focus-an-interview-with-expert-author-jason-rorie" target="_blank" rel="nofollow" title="Interview with Jason Rorie, author of Small Business &#x2013; A Hacker&apos;s Playground (Strategic Piece Blog)">interview with Jason Rorie, author of Small Business &#x2013; A Hacker&apos;s Playground: Cyber Security</a>.</p><!--kg-card-end: html--><p><br></p><h3 id="tapad-engineering-blog">Tapad Engineering Blog</h3><p></p><!--kg-card-begin: html--><p>Tapad (an Experian company) offers digital identity resolution and cross-device identification solutions. Its resident book blogger is Ben Rothke. Rothke, a founding member of the Cybersecurity Canon, reviewed <a href="https://engineering.tapad.com/the-best-information-security-books-of-2020-e7430444fbd4" target="_blank" rel="nofollow" title="The Best Information Security Books 2020 (Tapad Engineering Blog">The Best Information Security Books 2020</a> on the Tapad Engineering Blog.</p><!--kg-card-end: html--><!--kg-card-begin: html--><center>*</center><!--kg-card-end: html--><p>Want to save yourself the legwork and valuable time when launching your new cybersecurity book?</p><h2 id="need-help-with-your-book-launch">Need help with your book launch?</h2><p><a href="https://cybersecurity-writers.com">Contact us</a> for a referral to industry experts and publicists who can help with your outreach to trade journalists, podcasters, and bloggers, and sign up below for our newsletter with further tips and insights from fellow authors:</p>]]></content:encoded></item><item><title><![CDATA[Hospitality: When Will We See a Hotel Safe Data Pledge?]]></title><description><![CDATA[I applauded when I saw the headline earlier this year: "Marriott International faces class action suit over mass data breach."
]]></description><link>https://blog.cybersecurity-writers.com/hospitality-when-will-we-see-a-hotel-safe-data-pledge/</link><guid isPermaLink="false">605f7a8c2ae533ba3e2ce930</guid><category><![CDATA[Cybersecurity]]></category><category><![CDATA[Content Marketing]]></category><category><![CDATA[Travel]]></category><category><![CDATA[Hospitality]]></category><dc:creator><![CDATA[Guest Contributor]]></dc:creator><pubDate>Tue, 22 Dec 2020 20:57:08 GMT</pubDate><media:content url="https://blog.cybersecurity-writers.com/content/images/2021/03/hotel-cybersecurity-cw-12-22-2020-min-1.png" medium="image"/><content:encoded><![CDATA[<img src="https://blog.cybersecurity-writers.com/content/images/2021/03/hotel-cybersecurity-cw-12-22-2020-min-1.png" alt="Hospitality: When Will We See a Hotel Safe Data Pledge?"><p><em>By Robert McGarvey</em></p><p>Hotel groups have mismanaged data security for at least a decade. This negligence has put our data in the crosshairs of cyber criminals.</p><p>In the Marriott case, the source of the malaise is <a href="https://www.hotelnewsnow.com/Articles/291666/Up-to-500m-impacted-by-Marriott-Starwood-data-breach">Starwood</a>, which Marriott acquired in a merger. With Starwood, the group also acquired a massive data breach. <a href="https://www.hotelnewsnow.com/Articles/291666/Up-to-500m-impacted-by-Marriott-Starwood-data-breach">Hotel News Now</a> reported that approximately 327 million guests were affected by the breach.</p><p>Why am I re-hashing this sorry affair now, two years after the breach was announced? Because the saddest part is that the industry hasn&apos;t learned from it.</p><h2 id="hoteliers-suck-at-data-security-">Hoteliers suck at data security.</h2><!--kg-card-begin: html--><p>Let&apos;s look at the data impacted at Starwood. According to the <a href="https://www.hotelnewsnow.com/Articles/291666/Up-to-500m-impacted-by-Marriott-Starwood-data-breach" title="Marriott Starwood data breach press release in Hotel News Now" rel="nofollow" target="_blank">data breach press release</a> by Marriott International at the time, the information included &quot;some combination of name, mailing address, phone number, email address, passport number, Starwood Preferred Guest (&quot;SPG&quot;) account information, date of birth, gender, arrival and departure information, reservation date, and communication preferences.&quot;</p><!--kg-card-end: html--><p>Obviously, for criminal hackers, that&apos;s a valuable trove of data. And so online looters have been feasting on hotels and their data - &#xA0;on us! - for years.</p><!--kg-card-begin: html--><p>Thus the roll of shame grows longer. <a href="https://www.hotelnewsnow.com/Articles/50937/Timeline-The-growing-number-of-hotel-data-breaches" title="Hotel News Now hotel data breaches overview" target="_blank" rel="nofollow">Hotel News Now</a> offers a catalog of the worst offenses going back to 2008 when Wyndham suffered the first of what became three breaches extending into 2010.</p><!--kg-card-end: html--><h3 id="what-are-the-lessons-learned-so-far">What are the lessons learned so far?</h3><p>As far as consumers and business travelers are concerned, it is only a minor exaggeration to say that if you stayed in a US hotel in the past decade, in great likelihood you are a victim of a data breach.</p><p>Guests have caught on. They know: give a hotel your credit card, and you put your finances in jeopardy. Class action litigators rejoice. They can&apos;t wait to develop a new revenue stream.</p><p>I wish I could say that hoteliers had learned their lesson, too. And that hotels were safer today, because of the negative publicity over data breaches, the fines, and the lawsuits.</p><p>But they aren&apos;t. And if there are any exceptions, nobody has noticed, because it has not been communicated.</p><!--kg-card-begin: html--><p>I understand if hotels don&apos;t want to advertise to the public the details of preventive measures to protect their guests&apos; financial data and privacy. PR and <a href="https://blog.cybersecurity-writers.com/tag/cybersecurity/" title="Cybersecurity content marketing topics on the Cybersecurity Writers Blog">cybersecurity content marketing</a> professionals would know how to handle the messaging part.</p><!--kg-card-end: html--><p>The problem is that more than two years after the Marriott mess, there&apos;s no positive change to report. The opposite is the case.</p><p><strong>Here are three steps hotels can take to win back wary consumers:</strong></p><ul><li>Commit, for real, to proactive cybersecurity as a critical business expense and not as an annoying drain on revenues that guests never appreciate.</li><li>Commit to full transparency and honest communication about breaches and do it soon after the breach is detected. &#xA0;Mumbo jumbo opacity is the hotelier norm when a breach is detected. That lowers guest confidence and puts us more at risk as criminals gain more time to use the stolen data.</li><li>Commit to telling the world about the cybersecurity steps you took. Of course not with enough detail so that crooks can dodge them. But with enough detail so that guests can sleep soundly at night.</li></ul><!--kg-card-begin: html--><p>Where to start? In May, the American Hotel &amp; Lodging Association introduced the <a href="https://www.ahla.com/press-release/ahla-releases-industry-wide-hotel-cleaning-standards-through-safe-stay-initiative" title="AHLA Hotel Safe Stay Pledge Announcement" rel="nofollow" target="_blank">Hotel Safe Stay Pledge</a> to safely welcome back guests and employees in the age of Covid-19.</p><!--kg-card-end: html--><p>The <a href="https://blog.cybersecurity-writers.com/tag/hospitality">hospitality</a> business has crawled almost to a standstill this year. From a cybersecurity perspective, this could be an opportunity for hoteliers.</p><p>They should take inspiration from their own Safe Stay initiative. Why not use the remaining time before the post-pandemic <a href="https://blog.cybersecurity-writers.com/tag/travel">travel</a> boom to develop and implement a nationwide Hotel Safe Data Pledge?</p><!--kg-card-begin: html--><center>*</center><!--kg-card-end: html--><!--kg-card-begin: html--><p><img src="https://blog.cybersecurity-writers.com/content/images/2021/03/Robert-McGarvey-wbg-min-1.png" width="200px" align="left" style="margin: 5px 15px" alt="Hospitality: When Will We See a Hotel Safe Data Pledge?"><i><a href="https://www.mcgarvey.net/" title="Robert McGarvey"><b>Robert McGarvey</b></a> (Twitter: <a href="https://twitter.com/rjmcgarvey" target="_blank" rel="nofollow">@rjmcgarvey</a>) is a veteran technology reporter who has often covered cybersecurity and data breaches especially in financial services and hospitality.</i></p>
   <!--kg-card-end: html-->]]></content:encoded></item><item><title><![CDATA[7 New Cybersecurity Podcasts You Should Follow in 2021]]></title><description><![CDATA[2020 was a banner year for podcasts, mostly due to the COVID-19 lockdown. We listened to brand-new cybersecurity podcasts. Here are our seven picks you should keep an ear on in 2021.]]></description><link>https://blog.cybersecurity-writers.com/7-new-cybersecurity-podcasts-you-should-follow-in-2021/</link><guid isPermaLink="false">605f7a8c2ae533ba3e2ce92e</guid><category><![CDATA[Podcast]]></category><category><![CDATA[Cybersecurity]]></category><category><![CDATA[Content Marketing]]></category><category><![CDATA[Research]]></category><category><![CDATA[Career]]></category><dc:creator><![CDATA[CW Team]]></dc:creator><pubDate>Tue, 08 Dec 2020 21:19:38 GMT</pubDate><media:content url="https://blog.cybersecurity-writers.com/content/images/2021/03/7-cybersecurity-podcasts-you-should-follow-in-2021-cybersecurity-writers-blog--min--3--1.png" medium="image"/><content:encoded><![CDATA[<!--kg-card-begin: html--><img src="https://blog.cybersecurity-writers.com/content/images/2021/03/7-cybersecurity-podcasts-you-should-follow-in-2021-cybersecurity-writers-blog--min--3--1.png" alt="7 New Cybersecurity Podcasts You Should Follow in 2021"><p>2020 saw <a href="http://www.mcgarvey.net/2020/11/25/the-podcast-explosion-talk-up-or-stay-silent/" title="The Podcast Explosion - Robert McGarvey&apos;s Blog" rel="nofollow" target="_blank">The Podcast Explosion</a>, to quote journalist and podcaster Robert McGarvey. The number of podcasts worldwide doubled. It increased from <a href="https://www.smallbizgenius.net/by-the-numbers/podcast-statistics/" title="Small Biz Genius Podcast Statistics" rel="nofollow" target="_blank">750,000 in 2019 to 1.5 million</a>, with over 34 million episodes (<a href="https://podcasthosting.org/podcast-statistics/" title="Podcasthosting.org Podcast Statistics" rel="nofollow" target="_blank">December 2020</a>).<!--kg-card-end: html--></p><p>This trend didn&apos;t favor only podcasts about cults or serial killers. The lockdown year also increased B2B content consumption significantly across industries. The demand for <a href="https://blog.cybersecurity-writers.com/tag/cybersecurity/">cybersecurity</a> content became almost as strong as for COVID-19 topics.</p><!--kg-card-begin: html--><p>B2B IT security buyers and customers engage with more content more often. <a href="https://www.linkedin.com/in/contentwritereditor" target="_blank">Gerd Meissner</a> analyzed this trend in his recent post <a href="https://blog.cybersecurity-writers.com/hungry-for-b2b-cybersecurity-content/" title="B2B Content Marketing: Hungry for Cybersecurity Content - Gerd Meissner on the Cybersecurity Writers Blog" target="_blank">Hungry for Cybersecurity Content</a>.</p><!--kg-card-end: html--><p>They are especially hungry for podcasts about IT security. At least that&apos;s what this year&apos;s newly minted cybersecurity podcasters are counting on.</p><!--kg-card-begin: html--><div style="background-color: #F5F5DC ; padding: 10px; border: 0;"><h2>Cybersecurity podcast &quot;Class of 2020&quot; at a glance:</h2><br><p><strong>Most common themes of new IT security podcasts launched in 2020:</strong></p><p><ul><li><a href="https://blog.cybersecurity-writers.com/7-new-cybersecurity-podcasts-you-should-follow-in-2021#cybersecurity-career-planning" title="New 2020 Podcasts About Cybersecurity Career Planning">cybersecurity career planning and leadership skills development</a></li><li><a href="https://blog.cybersecurity-writers.com/7-new-cybersecurity-podcasts-you-should-follow-in-2021#cybersecurity-podcasts-for-it-buyers" title="New 2020 Podcasts for IT Security Buyers and Customers">technology trends for B2b buyers, customers, and IT security leaders</a></li><li><a href="https://blog.cybersecurity-writers.com/7-new-cybersecurity-podcasts-you-should-follow-in-2021#it-security-and-treat-intelligence-podcasts" title="New 2020 IT Security and Risk Management Podcasts">security research and threat intelligence</a></li></ul></p><br><p><strong>If the cybersecurity podcast &quot;Class of 2020&quot; had a motto, what would it be?</strong></p><br><p>&quot;Less is more; let&apos;s keep it short.&quot; 15-30-minute episodes are becoming more common in cybersecurity podcasts.</p><br>
<p><strong>2021 Outlook:</strong></p><p>How many of the new podcasts launched in 2020 will last and grow post-pandemic?</p><br><p>In cybersecurity, the odds favor shorter podcasts that address relevant niche topics.</p><br><p>The latest examples reviewed below reflect this trend.</p></div><!--kg-card-end: html--><!--kg-card-begin: html--><p><br></p><p>And why should only the <a href="https://player.fm/podcasts/Cyber-Security" target="_blank" title="Best Cybersecurity Podcasts of 2020" rel="nofollow">established players</a> have all the fun?</p> <!--kg-card-end: html--><p>The &quot;Class of 2020&quot; podcast hosts in this niche come well prepared to meet the demand.</p><p>House-bound enterprise CISOs and senior IT security technologists have joined the podcasting community. Another group well represented are cybersecurity training experts, career advisers, and recruiters.</p><p>Of the seven shows introduced below, three focus on cybersecurity as a career. They cover security training, career advice, and leadership skills development.</p><h2 id="podcasts-keep-the-line-open">Podcasts keep the line open</h2><p></p><p>Many new industry podcasts and webcasts in 2020 were born of necessity. Trade shows, conferences, and in-person panel discussions have been nixed pending further notice.</p><p>B2C and B2B podcasts help fill the void. The hosts can build and strengthen relationships with buyers and customers or clients. They also use their podcast for networking with fellow and future industry professionals.</p><p>A list of the &quot;best cybersecurity podcasts of 2020&quot; would have been too subjective. Best for whom? Instead, we&apos;ve selected seven newcomers to the field that aim to serve their own distinct audiences:</p><!--kg-card-begin: html--><a id="cybersecurity-career-planning"></a><!--kg-card-end: html--><h2 id="new-cybersecurity-career-and-leadership-podcasts"><strong>New Cybersecurity Career and Leadership Podcasts</strong></h2><p></p><h3 id="cybr-podcast-cybr-inc-"><strong><em>Cybr Podcast</em> (Cybr Inc.)</strong></h3><!--kg-card-begin: html--><img style="float:left; margin:1em;" src="https://blog.cybersecurity-writers.com/content/images/2021/03/cybr-podcast-logo--1-.jpg" width="250" alt="7 New Cybersecurity Podcasts You Should Follow in 2021"> <p>Dallas, TX-based Cybr has specialized in cybersecurity training and consulting. On his podcast, host <i>Christophe Limpalair</i> focuses on cybersecurity education and career topics.</p><p>He created this program for newcomers to the field. Interviews with CIOs, IT Directors, and other cybersecurity leaders provide valuable insights.</p><!--kg-card-end: html--><p>Especially career changers, IT students, and recent graduates will find the Cybr podcast helpful.</p><!--kg-card-begin: html--><p>Listen to it here: <a href="https://anchor.fm/cybr" title="Cybr Podcast on Anchor.fm" rel="nofollow" target="_blank"><b>Cybr Podcast</b></a>. Twitter: <a href="http://twitter.com/cybrcom" title="Cybr on Twitter"><b>@cybrcom</b></a></p><!--kg-card-end: html--><!--kg-card-begin: html--><center>*</center><!--kg-card-end: html--><h3 id="ciso-tradecraft-podcast"><strong><em>CISO Tradecraft</em> Podcast</strong></h3><!--kg-card-begin: html--><img style="float:left; margin:1em;" src="https://blog.cybersecurity-writers.com/content/images/2021/03/CISO-Tradecraft-Podcast-logo--1-.png" width="250" alt="7 New Cybersecurity Podcasts You Should Follow in 2021"> <p><i>G. Mark Hardy</i> and <i>Ross Young</i> created the CISO Tradecraft podcast. The co-hosts designed their podcast to share what they call &quot;the adventure of becoming a CISO.&quot;</p><p>Hardy founded and runs the cybersecurity consulting firm National Security Corporation. Ross Young is the CISO of the Caterpillar Financial Services Corporation. They offer to guide listeners on their path to become competent and effective CISOs.</p><!--kg-card-end: html--><p>Reading is one prerequisite, if we follow CISO Tradecraft recommendations. Three of the podcast&apos;s six episodes so far (as of December 2020) deal with leadership concepts. They encourage listeners to dive into the management guides mentioned on the program.</p><!--kg-card-begin: html--><p>Listen to it here: <a href="https://cisotradecraft.podbean.com/" title="CISO Tradecraft Podcast" rel="nofollow" target="_blank"><b>CISO Tradecraft Podcast</b></a>. Twitter: <a href="http://twitter.com/cisotradecraft" title="CISO Tradecraft Podcast on Twitter"><b>@cisotradecraft</b></a></p><p></p><!--kg-card-end: html--><!--kg-card-begin: html--><center>*</center><!--kg-card-end: html--><h3 id="cyber-security-leadership-podcast"><strong><em>Cyber Security Leadership</em> Podcast</strong></h3><!--kg-card-begin: html--><img style="float:left; margin:1em;" src="https://blog.cybersecurity-writers.com/content/images/2021/03/security-leadership-podcast-logo-1.jpg" alt="7 New Cybersecurity Podcasts You Should Follow in 2021" width="250&quot;"><p>Soft skill and leadership development is the theme of this podcast. Cyber Security Leadership is co-hosted by <i>Yaron Levi</i> and <i>Jeff Snyder</i>.</p><p>Levi is the CISO at Dolby. Snyder a veteran cybersecurity recruiter and executive coach.</p><p>The co-hosts share lessons learned in their careers and invite their guests to do the same. What sets their podcast apart is that both are &quot;active&quot; listeners.</p><!--kg-card-end: html--><p>Levi and Snyder aren&apos;t afraid of pauses, an exception in the often breathless field. They also know how to tell a story without overwhelming their conversation partners.</p><!--kg-card-begin: html--><p>Listen to it here: <a href="https://anchor.fm/cyber-security-leadership" title="Cyber Security Leadership Podcast" rel="nofollow" target="_blank"><b>Cyber Security Leadership Podcast</b></a>. Twitter: <a href="http://twitter.com/SecurityRecruit" title="Cyber Security Leadership Podcast on Twitter"><b>@SecurityRecruit</b></a></p><p></p><!--kg-card-end: html--><!--kg-card-begin: html--><center>*</center><a id="cybersecurity-podcasts-for-it-buyers"></a><!--kg-card-end: html--><h2 id="new-b2b-podcasts-for-it-security-buyers-and-customers"><strong>New B2B Podcasts for IT Security Buyers and Customers</strong></h2><p></p><h3 id="ready-set-secure-podcast-set-solutions-"><strong><em>Ready, Set, Secure</em> Podcast (Set Solutions)</strong></h3><!--kg-card-begin: html--><img style="float:left; margin:1em;" src="https://blog.cybersecurity-writers.com/content/images/2021/03/ready-set-secure-set-solutions-podcast-logo--1-.jpeg" alt="7 New Cybersecurity Podcasts You Should Follow in 2021" width="250&quot;">
<p>This podcast was launched by Houston-based cybersecurity solution provider and integrator Set Solutions. CTO <i>Michael Farnum</i> hosts the bi-weekly show. He is joined by Senior Solutions Architect <i>Nick DiPasquale</i>.</p>
<p>The co-hosts invite a diverse variety of guests for each episode to discuss IT security for practitioners. Examples are real-time monitoring in the cloud, Zero Trust implementation, and threat hunting.</p><!--kg-card-end: html--><p>The Ready, Set, Secure podcast hosts are also comfortable covering &quot;soft&quot; topics. Two examples are workplace diversity and cybersecurity staffing.</p><!--kg-card-begin: html--><p>Listen to it here: <a href="https://www.buzzsprout.com/992788" title="Ready, Set, Secure Podcast (Set Solutions)" rel="nofollow" target="_blank"><b>Ready, Set, Secure Podcast</b></a>. Twitter: <a href="https://twitter.com/setsoltionsinc" title="Set Solutions on Twitter"><b>@setsolutionsinc</b></a></p><!--kg-card-end: html--><!--kg-card-begin: html--><center>*</center><!--kg-card-end: html--><h3 id="security-architecture-podcast-herjavec-group-"><strong><em>Security Architecture</em> Podcast (Herjavec Group)</strong></h3><!--kg-card-begin: html--><img style="float:left; margin:1em;" src="https://blog.cybersecurity-writers.com/content/images/2021/03/security-architecture-podcast--1-.jpg" alt="7 New Cybersecurity Podcasts You Should Follow in 2021" width="250&quot;"><p><i>Evgeniy Kharam</i> launched the Security Architecture Podcast together with <i>Dmitry Raidman</i>.</p><p>The co-hosts have been around the cybersecurity block a few times. Kharam is the Director of the Solution Architecture Division at the Herjavec Group,  Raidman the CTO and Co-founder of Cybeats.</p><p>Their background benefits the depth of discussions and the lineup of guest experts on their program. They also had a precise game plan for this podcast from the get-go. And it shows.</p><!--kg-card-end: html--><p>The webcast/podcast combo was launched only in July 2020. Yet its 15 episodes so far (as of December 2020) already feature a wide variety of subject matter experts. The podcast guest list features various heavy-hitters like BitGlass, Checkpoint, ForcePoint, and ZScaler.</p><p>In Season 1, the hosts invited vendors to discuss their Secure Access Service Edge (SASE) offerings. Season 2 episodes are dedicated to Zero Trust Network Access (ZTNA) remote access solutions.</p><p>This podcast features a fair amount of industry lingo and cybersecurity acronyms. However, the hosts make it easy for their listeners to follow. The Security Architecture podcast homepage includes a dictionary of IT security architecture-related terms.</p><!--kg-card-begin: html--><p>Watch or listen to it here: <a href="https://www.security-architecture.org" title="Security Architecture Podcast" rel="nofollow" target="_blank"><b>Security Architecture Podcast</b></a>. Twitter: <a href="http://twitter.com/secarchpodcast" title="Security Architecture Podcast on Twitter"><b>@secarchpodcast</b></a></p><!--kg-card-end: html--><!--kg-card-begin: html--><center>*</center><a id="it-security-and-treat-intelligence-podcasts"></a><!--kg-card-end: html--><h2 id="new-it-security-research-and-threat-intelligence-podcasts"><strong>New IT Security Research and Threat Intelligence Podcasts</strong></h2><p></p><h3 id="security-science-podcast-kenna-research-"><strong><em>Security Science</em> Podcast (Kenna Research)</strong></h3><!--kg-card-begin: html--><img style="float:left; margin:1em;" src="https://blog.cybersecurity-writers.com/content/images/2021/03/security-science-podcast-kenna-research-logo--1-.jpg" alt="7 New Cybersecurity Podcasts You Should Follow in 2021" width="250&quot;"><p>Cybersecurity shouldn&apos;t be a black box, says Security Science host <i>Dan Mellinger</i>. This fast-paced podcast aims to demystify cybersecurity. Its secret sauce: &quot;education combined with a dose of entertainment.&quot;</p><p>Over 22 episodes so far (as of December 2020), the podcast addressed a broad range of topics. The host and his guests tackled &quot;A Brief History of Vulnerability Management.&quot; They explored &quot;Risk, Measured: Epidemiology for Cybersecurity.&quot; And they discussed &quot;Reporting Risk to the Board.&quot;</p><!--kg-card-end: html--><p>An eclectic mix of topics and guests make for an informative listening experience. Key takeaways&quot; in the form of soundbites are shared with each episode on the podcast website.</p><!--kg-card-begin: html--><p>Listen to it here: <a href="https://podcast.kennaresearch.com/public/46/Security-Science-80c4443c" title="Security Science Podcast" rel="nofollow" target="_blank"><b>Security Science Podcast</b></a>. Twitter: <a href="http://twitter.com/KennaSecurity" title="Security Science Podcast on Twitter"><b>@KennaSecurity</b></a></p><!--kg-card-end: html--><!--kg-card-begin: html--><center>*</center><!--kg-card-end: html--><h3 id="s-rm-insider-podcast-s-rm-intelligence-and-risk-consulting-"><strong><em>S-RM Insider Podcast</em></strong> (S-RM Intelligence and Risk Consulting)</h3><!--kg-card-begin: html--><img style="float:left; margin:1em;" src="https://blog.cybersecurity-writers.com/content/images/2021/03/S-RM-Insider-podcast-logo--1-.jpg" alt="7 New Cybersecurity Podcasts You Should Follow in 2021" width="250&quot;"><p>S-RM Intelligence and Risk Consulting is a global risk and intelligence consultancy. Associate Director <i>Lenoy Barkai</i> hosts the S-RM Insider podcast.</p>
<p>She convenes industry experts to discuss a broad swath of subject matters. In 2020, topics included &quot;Organisational Resilience,&quot; &quot;Cyber Security &amp; 5G Technology&quot;, and &quot;Social Media Investigations.&quot;</p>
<p>The S-RM Insider podcast took an end-of-year hiatus. Lenoy says it will be back in January 2021, with several guest speakers already lined up. Topics will include cybersecurity matters, threat intelligence, and regional risks.</p><!--kg-card-end: html--><!--kg-card-begin: html--><p>Listen to it here: <a href="https://s-rm-90854.zencast.website/" title="S-RM Insider Podcast" rel="nofollow" target="_blank"><b>S-RM Insider Podcast</b></a>. Twitter: <a href="http://twitter.com/SRMInform" title="S-RM Insider Podcast on Twitter"><b>@SRMInform</b></a></p><!--kg-card-end: html--><!--kg-card-begin: html--><center>*</center><!--kg-card-end: html--><p>Further mentions go to new cybersecurity podcasts of two industry giants:</p><!--kg-card-begin: html--><p><b><i><a href="https://shows.acast.com/securing-digitalization" target="_blank" rel="nofollow" title="Securing Digitalization Podcast (Siemens)">Securing Digitalization</a></i></b> is &quot;The Siemens Cybersecurity Podcast.&quot; Siemens Chief Cybersecurity Officer <i>Natalia Oropeza</i> (Twitter: <a href="https://twitter.com/NataliaOropezaG" rel="nofollow" title="Natalia Oropeza on Twitter" target="_blank"><b>@NataliaOropezaG</b></a> and <i>Mirko Ross</i> (Twitter: <a href="https://twitter.com/mirko_ross" rel="nofollow" title="Mirko Ross" target="_blank"><b>@Mirko_Ross</b></a>) are the co-hosts.</p><!--kg-card-end: html--><!--kg-card-begin: html--><p><b><i><a href="https://securityunlockedpodcast.com/" target="_blank" rel="nofollow" title="Security Unlocked Podcast (Microsoft)">Security Unlocked</a></i></b> is &quot;The Microsoft Security Podcast&quot; (Twitter: <a href="https://twitter.com/msftsecurity" title="Microsoft Security" target="_blank" rel="nofollow"><b>@msftsecurity</b></a>. Microsoft Security evangelists Nic Fillingham and Natalia Godyla are hosting. Their goal is to explore the technology and people behind Microsoft&apos;s security solutions.</p><!--kg-card-end: html--><!--kg-card-begin: html--><center>*</center><!--kg-card-end: html--><h2 id="will-the-2020-cybersecurity-podcasts-have-staying-power">Will the 2020 cybersecurity podcasts have staying power?</h2><p></p><p>Do the new cybersecurity podcasts of 2020 have what it takes to see post-pandemic success?</p><p>We think that most of them are well-positioned to outlast the lockdowns. They have specialized in cybersecurity content niches where they face little or no competition from their established brethren - yet.</p><!--kg-card-begin: html--><center>###</center><p><br></p><!--kg-card-end: html--><p><em>Did we miss a new cybersecurity podcasts that you think should be included here? Did you or your company launch a cybersecurity podcast this year? </em></p><p><em><a href="mailto:info@cybersecurity-writers.com?subject=Re.%207%20New%20Cybersecurity%20Podcasts%You%20Should%20Follow%20in%202021">Drop us a note</a> and let us know, and we may include it when we publish a follow-up. This post was last updated on 2/5/2021.</em></p><p><br></p><p><br></p><p><br></p><p><br></p>]]></content:encoded></item><item><title><![CDATA[Hungry for B2B Cybersecurity Content]]></title><description><![CDATA[New research shows that B2B buyers and customers in the US engage with more content more often during the pandemic. What does this mean for cybersecurity content marketing?]]></description><link>https://blog.cybersecurity-writers.com/hungry-for-b2b-cybersecurity-content/</link><guid isPermaLink="false">605f7a8c2ae533ba3e2ce92d</guid><category><![CDATA[Research]]></category><category><![CDATA[Cybersecurity]]></category><category><![CDATA[Content Marketing]]></category><dc:creator><![CDATA[Gerd Meissner]]></dc:creator><pubDate>Fri, 20 Nov 2020 18:31:15 GMT</pubDate><media:content url="https://blog.cybersecurity-writers.com/content/images/2021/03/hungry-for-cybersecurity-content-executive-summaries-cybersecurity-writers-blog-min--3-.png" medium="image"/><content:encoded><![CDATA[<!--kg-card-begin: html--><img src="https://blog.cybersecurity-writers.com/content/images/2021/03/hungry-for-cybersecurity-content-executive-summaries-cybersecurity-writers-blog-min--3-.png" alt="Hungry for B2B Cybersecurity Content"><p>New <a href="https://blog.cybersecurity-writers.com/tag/research/" title="More research-related posts on the Cybersecurity Writers blog" target="_blank">research</a> from content platform provider PathFactory reveals a massive increase in B2B marketing content consumption following the first lockdowns related to COVID-19 in the US.</p><!--kg-card-end: html--><p>Average session times, on the other hand, saw a significant decrease. During the same period, the engagement with B2B cybersecurity content was almost as strong on average (4:20 min.) as with COVID-19 topics (4:50 min), which top the list.</p><!--kg-card-begin: html--><p>The findings, derived from data collected from hundreds of enterprises and mid-market technology companies, are now available in a research report titled <a href="https://nurturenow.pathfactory.com/cer-2020/" title="Content Engagement Report: How COVID-19 changed B2B content consumption in 2020" target="_blank" rel="nofollow">Content Engagement Report: How COVID-19 changed B2B content consumption in 2020</a>.</p><!--kg-card-end: html--><p>Note the dramatic increase in attention paid to IT security-related B2B content. Market observers attribute this to the shift to remote work and the increase in cybersecurity risks that come with it.</p><p>This leaves the question what content asset types actually lived up to the task.</p><h2 id="what-content-types-do-buyers-prefer">What content types do buyers prefer?</h2><p></p><!--kg-card-begin: html--><p>In <a href="https://blog.cybersecurity-writers.com/tag/content-marketing/" title="More content marketing-related posts on the Cybersecurity Writers Blog" target="_blank">cybersecurity content marketing</a>, what B2B content formats and assets are worth a second look? The new report provides critical pointers.</p><!--kg-card-end: html--><p>According to <em>PathFactory</em>, the most-viewed content asset types during the pandemic include webinars, videos, <a href="https://blog.cybersecurity-writers.com/11-blogs-with-reviews-of-new-cybersecurity-books-and-author-interviews/">eBooks</a>, and reports. Like before the COVID-19 crisis, eBooks account for the most significant share of total views.</p><p>The content format with the largest engagement increase are executive summaries, according to the <em>PathFactory</em> study.</p><p>Engagement with executive summaries was up 256.6% compared to the period before COVID-19. To put that in perspective: B2B landing pages saw &quot;only&quot; a 139.5% increase.</p><h2 id="more-b2b-cybersecurity-content-but-does-it-stick">More B2B cybersecurity content. But does it stick?</h2><p>The most-viewed content asset types during the pandemic include webinars (consumption up 128.1%), reports (up 65.1%), and videos (up 27%), reports <em>PathFactory</em>.</p><p>Other noteworthy findings from the report include:</p><ul><li>During the pandemic, 17% more visitors accessed B2B digital content, unique asset views were up 40%, and visitors spent 15% more time reading and viewing what they found.<br></li><li>Site visitors interacted with more B2B content, more often: there was a 42% increase in sessions.<br></li><li>Yet those sessions were 17% shorter for &quot;bingers&quot; (visitors who engaged with more than one asset in a single session) and 38% shorter for &quot;non-bingers&quot;.</li></ul><!--kg-card-begin: html--><p align="center"><img src="https://blog.cybersecurity-writers.com/content/images/2021/03/Bingers-vs-non-bingers-How-COVID19-changed-B2B-content-consumption-in-2020.png" alt="Hungry for B2B Cybersecurity Content"></p><p align="right">Source: <i>PathFactory</i></p><!--kg-card-end: html--><p>What do these results mean for B2B cybersecurity content marketing?</p><h2 id="how-covid-19-changed-b2b-cybersecurity-content-marketing">How COVID-19 changed B2B cybersecurity content marketing</h2><p></p><p>The cybersecurity industry has ramped up its B2B &#xA0;content marketing during the pandemic. Your company is focusing on webinars, webcasts, videos, and <a href="https://blog.cybersecurity-writers.com/tag/podcast/">podcasts</a>? So are your competitors.</p><p>At the same time, B2B buyers overall spend less time with more IT security content marketing assets clamoring for their attention.</p><p>What are they looking for? &quot;Unknowns looked for content credibility, known visitors wanted actionable next steps,&quot; the <em>PathFactory</em> report points out.</p><p>The pandemic is putting immense burdens on IT, cybersecurity, and compliance technology leaders. It&apos;s fair to assume that this particular group&apos;s session times are down by even more than 38%.</p><p>That means you cannot rely on them patiently sitting through even the most relevant and instructive webinars, webcasts, videos, or <a href="https://blog.cybersecurity-writers.com/7-new-cybersecurity-podcasts-you-should-follow-in-2021/">cybersecurity podcasts</a>.</p><p>They dip in, dip out, and move on.</p><p>Based on the new research data, what content should you custom-tailor for this situation?</p><p>One answer almost jumps out from the report: executive summaries of webinars and webcasts.</p><!--kg-card-begin: html--><p align="center"><img src="https://blog.cybersecurity-writers.com/content/images/2021/03/Executive-Summaries---Content-Engagement-Report_-How-COVID19-changed-B2B-content-consumption-in-2020.png" alt="Hungry for B2B Cybersecurity Content"><br>Increase in content consumption by asset type (excerpt)</p><p align="right">Source: <i>PathFactory</i></p><!--kg-card-end: html--><h2 id="how-to-write-executive-summaries-of-webinars-for-cybersecurity-buyers">How to write executive summaries of webinars for cybersecurity buyers?</h2><p></p><p>Research shows that executive summaries of webcasts and webinars deserve more attention in content marketing. Cybersecurity content leaders, read the signs.</p><p>Do you want all the efforts your team put into webinars and webcasts to make a dent? Distill them into executive summaries that are custom-tailored to the needs and tight schedules of IT security leaders and C-level executives.</p><p>Repurpose your video, audio, and slides for those time-constrained &quot;non-bingers&quot; on a mission. Help them accomplish their mission faster.</p><p>Present them with an executive summary of the recording that condenses <a href="https://www.vidyard.com/blog/video-length/">30, 45, or 60 minutes</a> (including Q&amp;A) into 2-6 pages. Provide an at-a-glance overview of the main takeaways that is efficiently structured, easy on the eye, and includes actionable next steps.</p><p>As a rule of thumb, reading an executive summary should take no more than 10% of the time it would take to watch the webinar or webcast. For a 60-minute production, plan for a maximum of &#xA0;<a href="https://capitalizemytitle.com/reading-time/3-pages/">1,800 words = six minutes at average reading speed</a>.</p><!--kg-card-begin: html--><p>So, who&apos;s <a href="https://blog.cybersecurity-writers/tag/writing/" title="More writing-related posts on the Cybersecurity Writers blog" target="_blank">writing</a> it?</p><!--kg-card-end: html--><h2 id="how-to-repurpose-digital-event-content-without-cheapening-it">How to repurpose digital event content without &quot;cheapening&quot; it</h2><p><br>Are your company&apos;s content writers over capacity? Before you assign the task to a digital events coordinator or your favorite gig marketplace, a word of caution.</p><p>Readers expect this format to save them (or their higher-ups) valuable time. They are looking for a quick and effortless read, concise and to the point.</p><p><a href="https://blog.cybersecurity-writers.com/tag/writing/">Writing</a> executive summaries is not a task you want to assign to junior content writers on the team or to a subject matter expert involved with the original presentation or panel.</p><p>They may know too little or &quot;too much,&quot; respectively, to present the gist of the matter in the language, style, and format that readers expect.</p><p>Nor is this task something you want to outsource to a random freelancer or an overseas content mill, given the industry lingo of cybersecurity web events. They often involve technical deep-dives and in-depth cyber threat research discussions.</p><!--kg-card-begin: html--><p align="center"><img src="https://blog.cybersecurity-writers.com/content/images/2021/03/Proportions-Content-Type-Content-Engagement-Report_-How-COVID19-changed-B2B-content-consumption-in-2020.png" alt="Hungry for B2B Cybersecurity Content"></p><p align="right">Source: <i>PathFactory</i></p><!--kg-card-end: html--><p>Industry outsiders frequently struggle to accurately excerpt and capture the essence of cybersecurity audio or video transcripts.</p><p>Most transcripts for this purpose are automatically generated. They reflect the infamous abundance of acronyms and abbreviations in the cybersecurity sector, interspersed with misspellings (example: &quot;sock leader&quot; instead of &quot;SOC leader&quot;).</p><p>Clean-up efforts by writers or external editors who are not sufficiently familiar with the subject area tend to introduce more misunderstandings.</p><h2 id="unknowns-looked-for-content-credibility">&quot;Unknowns looked for content credibility&quot;</h2><!--kg-card-begin: html--><p>Such mistakes will add to your internal content team&apos;s workload or, if you miss them,  <a href="https://blog.cybersecurity-writers.com/is-your-cybersecurity-content-too-weak/" title="Is Your Cybersecurity Content Too Weak?" target="_blank">diminish the content&apos;s credibility</a> and leave readers less inclined to take the next step.</p><!--kg-card-end: html--><p>As the <em>PathFactory</em> report points out, content credibility is key to engaging new visitors (the &quot;unknowns&quot;) with whom dialog has not been established yet.</p><p>This is especially true for site visitors vetting cybersecurity vendors for their competence and trustworthiness.</p><!--kg-card-begin: html--><p>Another recent research report, presented by <i>Hinge Marketing</i>: <a href="https://hingemarketing.com/library/article/inside-the-buyers-brain-third-edition-executive-summary" title="Hinge Marketing: Inside the Buyer&apos;s Brain: How You Can Adapt to Shifting Buyer Behavior (Executive Summary)" target="_blank" rel="nofollow">Inside the Buyer&apos;s Brain: How You Can Adapt to Shifting Buyer Behavior</a>, shows what B2B buyers are looking for: In 2020, they put the highest value on knowledge of the industry/subject matter expertise (32.2%), up 56% since 2018 (20.6%).</p><!--kg-card-end: html--><p>In cybersecurity marketing, executive summaries of webinars and webcasts are a cost-effective way to repurpose digital event programs with content that highlights core competencies, adds credibility, and builds trust.</p><p>Did your company host webcasts or webinars over the past months? Extend their shelf life and increase their impact. Contact use now to convert them into executive summaries:</p><!--kg-card-begin: html--><p><center><h3><a href="https://www.cybersecurity-writers.com/" title="B2B Webcast and Webinar Executive Summaries: Schedule a Free Initial Consultation">Schedule a Free Initial Consultation</a></h3></center></p><p><center>###</center></p><!--kg-card-end: html-->]]></content:encoded></item><item><title><![CDATA[Do We Really Need Headline Capitalization Tools?]]></title><description><![CDATA[How do you capitalize headlines - on a blog, say, or in a whitepaper? And should you do it at all? Beware the one rule that must not be broken. The tools on the shortlist below will help.]]></description><link>https://blog.cybersecurity-writers.com/do-we-really-need-headline-capitalization-tools/</link><guid isPermaLink="false">605f7a8c2ae533ba3e2ce92b</guid><category><![CDATA[Content Marketing]]></category><category><![CDATA[Cybersecurity]]></category><category><![CDATA[Writing]]></category><category><![CDATA[Editing]]></category><category><![CDATA[Tools]]></category><dc:creator><![CDATA[Gerd Meissner]]></dc:creator><pubDate>Fri, 06 Nov 2020 13:07:47 GMT</pubDate><media:content url="https://blog.cybersecurity-writers.com/content/images/2021/03/exciting-tales-of-science-headline-capitalization-lab-cw-blog-11062020-mini--2-.png" medium="image"/><content:encoded><![CDATA[<img src="https://blog.cybersecurity-writers.com/content/images/2021/03/exciting-tales-of-science-headline-capitalization-lab-cw-blog-11062020-mini--2-.png" alt="Do We Really Need Headline Capitalization Tools?"><p>&quot;Learn the rules before you break them&quot; is time-honored advice. Variations are attributed to Pablo Picasso (&quot;Learn the rules like a pro, so you can break them like an artist&quot;) and the Dalai Lama (<a href="https://www.snopes.com/fact-check/hello-dalai/">falsely</a>), among others.</p><p>My flight instructor had his own version. It ended with &quot;...and only if required in an emergency to ensure a safe outcome.&quot;</p><!--kg-card-begin: html--><p>Title capitalization in <a href="https://blog.cybersecurity-writers.com/hungry-for-b2b-cybersecurity-content/" title="Hungry for B2B Content" target="_blank">B2B content</a> isn&apos;t exactly a matter of life or death. So when <a href="https://blog.cybersecurity-writers.com/your-key-to-unique-remote-work-headlines/" title="Your Key to &apos;Remote Work&apos; Headlines (Cybersecurity Writers Tips &amp; Tools Blog)">headlines</a> are created as an afterthought, it often happens with little or no regard for any rules whatsoever.</p><!--kg-card-end: html--><p>Did anyone say &quot;style guide&quot;? Oops.</p><p>The problem with headlines that flout the rules is that they look sloppy.</p><p>A capitalization mistake jumps out at readers. It violates a familiar pattern they have come to associate with trusted sources.</p><p>It doesn&apos;t matter if they can&apos;t put the finger on it.</p><p>Something simply seems <em>off</em>.</p><p>Which brings us to:</p><h2 id="one-title-capitalization-rule-to-rule-them-all">One title capitalization rule to rule them all</h2><p><br>Be consistent. That&apos;s all.</p><!--kg-card-begin: html--><p>Title case, sentence case, AP, Chicago, <a href="https://www.nytimes.com/1998/03/02/business/unlocking-the-secrets-of-the-digital-archive-left-by-east-germany.html" title="Gerd Meissner: Unlocking the Secrets Of the Digital Archive Left by East Germany - The New York Times" target="_blank" rel="nofollow">New York Times</a>: Once we choose a headline style for our title or subheadings, we better stick with it.</p><!--kg-card-end: html--><p>If we don&apos;t, it becomes a distraction and weakens our message.</p><p>That rule applies to blog posts, landing pages, and whitepapers just the same.</p><p>Or take the overlay text on social media images, for example. In this case, the visual draws even more attention to capitalization errors.</p><p>The tools listed below help you ensure consistency for whatever style you settle on.</p><p>Before we get there, let&apos;s back up for a moment.</p><p>You may ask:</p><h2 id="why-should-we-use-headline-capitalization-at-all">Why should we use headline capitalization at all?</h2><p><br>Fair question. Given the variety of distinct title capitalization rulesets and fringe cases, who really has the time?</p><!--kg-card-begin: html--><p>If your company sells to the federal government, guidance comes from the US Government Publishing Office. It published a <a href="https://www.govinfo.gov/content/pkg/GPO-STYLEMANUAL-2008/pdf/GPO-STYLEMANUAL-2008-5.pdf" title="US Government Publishing Office: Capitalization Rules" rel="nofollow">42-page document on Capitalization Rules</a> [PDF] in headlines and beyond.</p><!--kg-card-end: html--><p>You may need a break after reading it. Reward yourself and enjoy the flowchart below, courtesy of The Millions:</p><!--kg-card-begin: html--><p align="center"><img src="https://blog.cybersecurity-writers.com/content/images/2021/03/headline-capitalization-rules-white-board-the-millions--1-.jpg" alt="Do We Really Need Headline Capitalization Tools?" width="100%"><!--kg-card-end: html--></p><p><em>Please note: The information on the whiteboard is true to the style of The Millions and Publishers Weekly specifically.</em></p><!--kg-card-begin: html--><p align="right"><i>Photo: <a href="https://themillions.com/2019/08/this-is-the-right-way-to-capitalize-headlines.html" title="This is the right way to capitalize headlines - John Maher / The Millions" target="_blank" rel="nofollow">John Maher / The Millions</a></i><!--kg-card-end: html--></p><p>As for the initial question - should you capitalize your headlines? &#xA0;- don&apos;t expect much more help from the web.<br></p><h2 id="research-which-headline-style-do-people-prefer">Research: Which headline style do people prefer?</h2><p><br>In the US, title capitalization was taught in school. It is expected in book titles and academic writing. All major newspapers, magazines, and other leading news sources used to capitalize their headlines.</p><p>This has changed.</p><p>Yes, some - The New York Times and The New Yorker are two examples - still do. But many others have changed their headline style rules over the past two decades. That group includes ABC News, The Boston Globe, CNN, NBC News, The Washington Post, &#xA0;and The Los Angeles Times.</p><!--kg-card-begin: html--><p>So why do we still use title style headlines on industry blogs and other <a href="https://blog.cybersecurity-writers.com/hungry-for-b2b-cybersecurity-content/" title="Hungry for B2B Content (Cybersecurity Writers Tips &amp; Tools Blog)">B2B content</a>, including this one?</p><!--kg-card-end: html--><p>Because readers prefer title case headlines, they perceive them as more credible and authoritative.</p><p>Or so we learned. Does <a href="https://blog.cybersecurity-writers.com/tag/research/">research</a> really back this up?</p><p>When I prepared this post, I couldn&apos;t find any current research that would support that assumption. (If I missed something significant, <a href="mailto:gerd@cybersecurity-writers.com">drop me an email</a>; I will amend this post with a link and credit you.)</p><!--kg-card-begin: html--><p>A few <a href="https://blog.cybersecurity-writers.com/tag/content-marketing/" title="Content marketing-related posts on the Cybersecurity Writers Blog" target="_blank">content marketing</a> blogs mention a contributed post from 2013 on the Moz Blog, <a href="https://moz.com/blog/5-data-insights-into-the-headlines-readers-click" title="5 Data Insights into the Headlines Readers Click (MOZ Blog)" rel="nofollow" target="_blank">5 Data Insights into the Headlines Readers Click</a>. It references a study conducted by marketing firm Conductor.</p><!--kg-card-end: html--><p>The agency asked 750 US-based online users about their preferences. At the time, 64% of readers preferred a title case headline (&quot;The 5 Steps to Prepare for the Impending Zombie Apocalypse&quot;).</p><p>The Conductor study also found that 21% liked to be yelled at in uppercase (&quot;THE 5 STEPS TO PREPARE FOR THE IMPENDING ZOMBIE APOCALYPSE&quot;). Only 7% preferred the sentence case headline (&quot;The 5 steps to prepare for the impending zombie apocalypse&quot;).</p><p>Mind you, those were responses to a question.</p><p>The proof is in the click on the actual headline. Perhaps online advertising experts have more current data?</p><h2 id="test-headline-capitalization-in-pay-per-click-ads">Test: Headline capitalization in pay-per-click ads</h2><p></p><p>Recent insights come from Pay-Per-Click (PPC) online ads, courtesy of Kristin Palmer. She conducted a test for Clix Marketing in 2019.</p><p>The campaign manager wondered if ads with title case would draw more clicks than those with sentence case, or vice versa. Palmer used the headlines of two clients&apos; Google and Microsoft ads to find out.</p><!--kg-card-begin: html--><p align><img src="https://blog.cybersecurity-writers.com/content/images/2021/03/clix-results-title-case-ads-test--1-.png" alt="Do We Really Need Headline Capitalization Tools?" width="100%"></p><!--kg-card-end: html--><!--kg-card-begin: html--><p>I recommend reading her post. Palmer published the methodology and findings of her <a href="http://www.clixmarketing.com/blog/2019/11/25/results-from-testing-title-case-in-ppc-ads/" title="Kristin Palmer: Results from Testing Title Case in PPC Ads - Clix Marketing Blog" target="_blank">title case test on the Clix Marketing Blog</a>.</p><!--kg-card-end: html--><p>The results were decidedly - inconclusive.</p><h2 id="headline-capitalization-yes-or-no">Headline capitalization - yes or no?</h2><!--kg-card-begin: html--><p>Where does all this leave us in <a href="https://blog.cybersecurity-writers.com/tag/content-marketing/" title="Cybersecurity content marketing-related posts on the Cybersecurity Writers Blog">cybersecurity content marketing</a>?</p><!--kg-card-end: html--><!--kg-card-begin: html--><p>IT security is a conservative industry. Most cybersecurity blogs and portals continue to capitalize headlines, a glance at feed aggregator platform <a href="https://securityboulevard.com/author/gerd-meissner/" title="Cybersecurity: Posts by Gerd Meissner on Security Boulevard" rel="nofollow" target="_blank">Security Boulevard</a> confirms.</p><!--kg-card-end: html--><!--kg-card-begin: html--><p align="center"><img src="https://blog.cybersecurity-writers.com/content/images/2021/03/security-boulevard-headlines-snapshot--1-.png" alt="Do We Really Need Headline Capitalization Tools?" width="100%"></p><!--kg-card-end: html--><p>In most whitepapers and research reports of this engineering-driven community, headlines are capitalized. Such content often reflects the academic style - for better or <a href="https://blog.cybersecurity-writers.com/is-your-cybersecurity-content-too-weak/">for worse</a> - of computer science and engineering departments, where capitalizing publication titles is the norm.</p><p>Change is underway, though. Influential IT security blogs and websites have found that opting for sentence-case headlines didn&apos;t harm their chances with fellow cybersecurity professionals.</p><!--kg-card-begin: html--><p>Out of 27 sources named on Upguard&apos;s <a href="https://www.upguard.com/blog/cybersecurity-websites" title="The Top Cybersecurity Websites and Blogs of 2020" target="_blank">The Top Cybersecurity Websites and Blogs of 2020</a>, for example, more than one-third use sentence case in their post headlines.</p><!--kg-card-end: html--><p>Bottom line: With quality content, it doesn&apos;t matter if you use sentence case headlines or capitalize titles on blog posts and marketing collateral.</p><p>What matters is consistency.</p><h2 id="three-title-capitalization-tools-that-help-ensure-consistency">Three title capitalization tools that help ensure consistency</h2><p><br>Applying headline style consistently matters. It speaks to a company&apos;s ability to organize its content as a brand.</p><p>Stick to the style your team has settled on. Does that require title case in headlines and perhaps also subheadings on your business blog, for example?</p><p>Then it should be applied consistently and in sync with the chosen ruleset for each post.</p><p>You may have memorized the main rules. But what about the fringe cases? Sooner or later, you&apos;ll need a headline capitalization tool.</p><p>Web-based title capitalization tools save time, because they have the rules baked in and instantly apply them to any headline you enter. They help prevent mistakes that could weaken our message and become a distraction for readers and viewers.</p><p>Check out my recommendations below. I&apos;ve picked three free <a href="https://blog.cybersecurity-writers.com/tag/writing/">writing</a> <a href="https://blog.cybersecurity-writers.com/tag/tools/">tools</a> that offer quick and straightforward help with headline capitalization:<br></p><!--kg-card-begin: html--><h3><a href="https://capitalizemytitle.com/" rel="nofollow" title="Capitalize My Title" target="_blank">Capitalize My Title</a></h3><!--kg-card-end: html--><p>Capitalize My Title pioneered the free headline capitalization tool genre. The site has since developed into one of the most versatile free online multitools for bloggers, writers, content marketers, and educators.</p><!--kg-card-begin: html--><p>Capitalize My Title is my go-to online tool for headline capitalization. It offers a straightforward conversion form for capitalizing headlines and subheadings based on the APA style guide, the Chicago Manual of Style, the Associated Press (AP) Stylebook, the MLA Handbook, the New York Times style guidelines, Wikipedia&apos;s capitalization rules, or a separate ruleset for email (<a href="https://capitalizemytitle.com/#capitalizationrules" title="Capitalization rules on Capitalize My Title" target="_blank" rel="nofollow">the differences are explained here</a>).</p><!--kg-card-end: html--><!--kg-card-begin: html--><p>I&apos;ve mentioned the site before in my short <a href="https://blog.cybersecurity-writers.com/your-key-to-unique-remote-work-headlines/" title="Headline analyzer tools overview on the Cybersecurity Writers blog">headline analyzer tools overview</a> on the Cybersecurity Writers blog. Conveniently, headline analysis can be applied directly from the capitalization interface.</p><!--kg-card-end: html--><p></p><!--kg-card-begin: html--><h3><a href="https://www.prospercircle.org/tools/title-capitalization" target="_blank" rel="nofollow" title="Title Capitalization">Title Capitalization</a></h3><!--kg-card-end: html--><p>This tool offers a minimalist take on the genre. It also presents a variation of the headline for each major style with a short rules overview on the same page.<br></p><!--kg-card-begin: html--><h3><a href="https://titlecaseconverter.com/" title="Title Case Converter" target="_blank" rel="nofollow">Title Case Converter</a></h3><!--kg-card-end: html--><p>The Title Case Converter&apos;s clean interface enables headline capitalization based on the most-used rulesets - with a twist.</p><p>This helpful feature turns the Title Case Converter into a learn-as-you-go tool. Once a headline has been converted, the converter explains why each word was capitalized or lower-cased.</p><!--kg-card-begin: html--><p>The tooltip tutor enables <a href="https://blog.cybersecurity-writers.com/tag/writing/" title="Tips and tools for cyber secruity content writers on Cybersecurity Writers">writers</a> and <a href="https://blog.cybersecurity-writers.com/tag/editing/" title="Tips and tools for cyber security content editors on Cybersecurity Writers">editors</a> to learn or refresh their command of a selected style while applying it.</p><!--kg-card-end: html--><!--kg-card-begin: html--><center>*</center><!--kg-card-end: html--><p>Expect further hands-on tips in our upcoming posts and <a href="http://eepurl.com/hcyaL5">mailings</a>. Are you looking for subject matter experts who plan, create, and promote targeted IT security content fast? <a href="https://www.cybersecurity-writers.com">Let us know.</a><br></p><p>Contact<a href="https://www.cybersecurity-writers.com"> Cybersecurity Writers</a> to learn about our process and</p><!--kg-card-begin: html--><center><h3><a href="https://www.cybersecurity-writers.com/" title="Schedule a consultation with Cybersecurity Writers">Schedule a Free Initial Consultation</a></h3></center><!--kg-card-end: html-->]]></content:encoded></item><item><title><![CDATA[This Cliché Will Harm Your Content Marketing]]></title><description><![CDATA[Nothing screams “I don’t know what I’m writing about, and for whom” as loud as publishing a B2B blog post that starts with “In today’s digital age…” So why is this cliché still a staple of cybersecurity content marketing?]]></description><link>https://blog.cybersecurity-writers.com/this-cliche-will-harm-your-content-marketing/</link><guid isPermaLink="false">605f7a8c2ae533ba3e2ce92a</guid><category><![CDATA[Cybersecurity]]></category><category><![CDATA[Content Marketing]]></category><category><![CDATA[Writing]]></category><dc:creator><![CDATA[Gerd Meissner]]></dc:creator><pubDate>Thu, 15 Oct 2020 18:55:04 GMT</pubDate><media:content url="https://blog.cybersecurity-writers.com/content/images/2021/03/CW-Blog-Featured-Image-10-21-2020-min--1--1.png" medium="image"/><content:encoded><![CDATA[<img src="https://blog.cybersecurity-writers.com/content/images/2021/03/CW-Blog-Featured-Image-10-21-2020-min--1--1.png" alt="This Clich&#xE9; Will Harm Your Content Marketing"><p></p><p>&#x201C;Oh please... &#x201D; - that was my first thought when it popped up on my screen this morning. One more blog post from an IT security vendor that began with: &#x201C;In today&#x2019;s digital age&#x2026;&#x201D;</p><p>You&#x2019;ve seen your share of openings like this, I&#x2019;m sure. Usually, I would not have taken a second look. Life is too short.</p><p>Talking about starting with a whimper and snail-pacing downhill from there. I won&#x2019;t link to the post here.</p><p>That&#x2019;s to protect the innocent. It&#x2019;s also because of what I found next.</p><p>The blog seemed to target buyers in the retail sector. Maybe they would read past that opening hurdle and lap the rest right up?</p><p>Perhaps I&#x2019;m just too picky, I told myself.</p><p></p><h2 id="coffee-beats-bromide-until-it-doesn-t-">Coffee beats bromide. Until it doesn&#x2019;t.</h2><p><br>Any other day, I would have moved right on. This morning, one sip of coffee later, I smelled a blogging opportunity.</p><p>With a more positive outlook, I dared a quick scan. This is what I learned:</p><p>For content that begins with &#x201C;In today&#x2019;s digital age&#x2026;&#x201D;, you cannot set your expectations low enough.</p><p>After so many years, I should have known better. It made me wonder, though.</p><h2 id="clich-as-a-hook-read-it-as-a-warning-label-">Clich&#xE9; as a &#x201C;hook&#x201D;? Read it as a warning label.</h2><p></p><p>How often does the opening line &#xA0;&#x201C;In today&#x2019;s digital age&#x2026;&#x201D; still appear on <a href="https://blog.cybersecurity-writers.com/is-your-cybersecurity-content-too-weak/">IT security blogs</a>? Or in other B2B content?</p><p>And why? As a warning?</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.cybersecurity-writers.com/content/images/2021/03/more-boring-content-ahead-1-1.png" class="kg-image" alt="This Clich&#xE9; Will Harm Your Content Marketing" loading="lazy" width="390" height="196"><figcaption>Safe to disregard for this post.</figcaption></figure><p>So I googled it. Before we get to the results, a bit of background first.</p><p>I&#x2019;ve written, edited, and broadcast about IT security, data protection, and privacy for general and business audiences since <em>before</em> the term &#x201C;cybersecurity&#x201D; or &#x201C;cyber security&#x201D; (<a href="https://www.linkedin.com/pulse/which-word-should-i-use-cybersecurity-cyber-security-linda-rawson">take your pick</a>) was coined.</p><p>To put things in perspective, that&#x2019;s about as long as professional journalists, writers, and editors have avoided the clich&#xE9; &#x201C;In today&#x2019;s digital age...&#x201D;</p><p>Some have not.</p><p>This is where it gets disturbing. According to Google, <a href="https://www.google.com/search?q=%22In+Today&apos;s+Digital+Age%22%2B%22IT+security%22+after%3A2020%2F01%2F01">it&#x2019;s still a thing in 2020</a>, even in <a href="https://www.google.com/search?q=intitle%3A%22In+Today%27s+Digital+Age%22%2Bcybersecurity">headlines</a>.</p><h2 id="in-21st-century-cybersecurity-content-marketing-why-is-this-clich-still-a-thing">In 21st-century cybersecurity content marketing, why is this clich&#xE9; still a thing?</h2><p><br>Look, I get it. We are not <a href="https://blog.cybersecurity-writers.com/tag/writing/">writing</a> for an audience of professional writers or editors. But that doesn&#x2019;t mean it&#x2019;s okay to underestimate all other readers.</p><p>The problem with this particular clich&#xE9; is the airs it puts on.</p><p>It reads and sounds like a heads-up for someone who spent the past 50 years herding camels in the Mongolian desert, without contact with the rest of the world.</p><p>The gut reaction of anyone else, especially in IT, to such twaddle: &#x201C;Don&#x2019;t waste my time.&#x201D;</p><p>What&#x2019;s the big deal then, you ask? They&#x2019;ll not read further, so what? Content marketing #fail. Case closed.</p><p>Not so fast. Starting with a non-starter isn&#x2019;t the only problem here. Let&#x2019;s also consider the collateral brand damage.</p><h2 id="three-reasons-to-ban-in-today-s-digital-age-from-your-content">Three reasons to ban &#x201C;in today&#x2019;s digital age&#x2026;&#x201D; from your content</h2><p></p><!--kg-card-begin: html--><p>Here are three reasons why smart cybersecurity companies ban this clich&#xE9; from their <a href="https://blog.cybersecurity-writers.com/tag/content-marketing/" title="Content marketing on the Cybersecurity Writers Blog" target="_blank">content marketing</a> altogether:</p><!--kg-card-end: html--><ul><li><strong>It&#x2019;s a throwaway line, one that qualified as a truism already decades ago.<br></strong><br>It doesn&#x2019;t add anything of value for today&#x2019;s readers. It seems oblivious to their time constraints, treats them as if they were yokels without a clue, and expects them to read on no matter what.<br><br><strong>What it signals about the brand behind the copy:</strong> &#x201C;We just want to sell stuff and couldn&#x2019;t care less about you as a prospect or customer. Now go buy our solution already.&#x201D;</li></ul><!--kg-card-begin: html--><br><br><!--kg-card-end: html--><ul><li><strong>It&#x2019;s a bromide at best and lazy at worst.</strong><br><br>The writer could have gone straight to the core of a subject matter or at least laid the groundwork. To deploy the mother of all cyber platitudes instead reveals a breathtaking lack of research and preparation.<br><br><strong>What it signals about the brand:</strong> &#x201C;We lack focus and couldn&#x2019;t be bothered with doing our homework, but hope &#xA0;you hang in there with us anyway.&#x201D;</li></ul><!--kg-card-begin: html--><br><br><!--kg-card-end: html--><ul><li><strong>It&#x2019;s cheap.<br></strong><br>This kind of copy is typically cranked out by freelance writers who lack experience, don&#x2019;t know the subject area, or both. Sarah Rickerd wrote about it on the Content Marketing Institute&#x2019;s blog: <a href="https://contentmarketinginstitute.com/2016/12/freelance-content-writers-results/">Why Freelance Writers Aren&#x2019;t Getting the Results You Want</a>.<br><br>Often they are generalists who get paid a few cents per word to create content around SEO keywords.<br><br><strong>What it signals about the brand:</strong> &#x201C;We are too cheap for basic quality control and don&#x2019;t care if our content reflects poorly on our products or services.&#x201D;</li></ul><!--kg-card-begin: html--><br><br><!--kg-card-end: html--><p>If you are in cybersecurity, those are messages you don&#x2019;t want to send. So why do some companies still think that this hokum could work as a &#x201C;hook&#x201D;?</p><p>Perhaps they simply haven&#x2019;t found an editor yet who knows and cares about such details and how to fix them.</p><p>If that describes someone you know, feel free to forward them this post with <a href="mailto:gerd@cybersecurity-writers.com">my email address</a>.</p><!--kg-card-begin: html--><center>*</center><!--kg-card-end: html--><p>Expect further hands-on tips in my upcoming posts and mailings. Are you looking for subject matter experts who plan, create, and promote data-driven, targeted IT security content fast? <a href="https://www.cybersecurity-writers.com">Let us know.</a></p><p>Contact<a href="https://www.cybersecurity-writers.com"> Cybersecurity Writers</a> to learn about our process and</p><!--kg-card-begin: html--><center><h3><a href="https://www.cybersecurity-writers.com/" title="Schedule a Free Inititial Consultation with Cybersecurity Writers">Schedule a Free Inititial Consultation</a></h3></center>]]></content:encoded></item><item><title><![CDATA[Your Key to Unique ‘Remote Work’ Headlines]]></title><description><![CDATA[On IT security blogs, industry portals, and email newsletters, "remote work" dominates headlines and subject lines. How can you make your cybersecurity content stand out? For measurable results, take a science-based approach.]]></description><link>https://blog.cybersecurity-writers.com/your-key-to-unique-remote-work-headlines/</link><guid isPermaLink="false">605f7a8c2ae533ba3e2ce929</guid><category><![CDATA[Cybersecurity]]></category><category><![CDATA[Content Marketing]]></category><category><![CDATA[Writing]]></category><category><![CDATA[Research]]></category><category><![CDATA[Editing]]></category><category><![CDATA[Tools]]></category><dc:creator><![CDATA[Gerd Meissner]]></dc:creator><pubDate>Sun, 04 Oct 2020 16:26:24 GMT</pubDate><media:content url="https://blog.cybersecurity-writers.com/content/images/2021/03/your-key-to-unique-remote-work-headlines-cw-blog-featured-image-10-7-2020-min--1-.png" medium="image"/><content:encoded><![CDATA[<img src="https://blog.cybersecurity-writers.com/content/images/2021/03/your-key-to-unique-remote-work-headlines-cw-blog-featured-image-10-7-2020-min--1-.png" alt="Your Key to Unique &#x2018;Remote Work&#x2019; Headlines"><p></p><p>Okay, I&apos;ve fibbed in the headline, but only a bit. There&apos;s not just <em>one</em> key. There are several, and they won&apos;t magically unlock a secret vault of headlines that somehow will rocket your content to the top of Search Engine Results Page (SERP) #1.</p><p>So you still have to come up with your own headline. This becomes even more challenging when it entails a topic that&apos;s hot in the industry, such as the <a href="https://www.google.com/search?q=intitle%3A%22remote+work%22+cybersecurity">cybersecurity risks of remote work</a>.<a href="https://blog.cybersecurity-writers.com/your-key-to-unique-remote-work-headlines#remote-work">*</a></p><p>Since magic is off the list, let&apos;s eliminate the ineffective guesswork involved with B2B headline <a href="https://blog.cybersecurity-writers.com/tag/writing/">writing</a> next. Why not use <a href="https://blog.cybersecurity-writers.com/tag/tools/">tools</a> that deploy psycholinguistics and inferential statistics instead?</p><p>Three of these headline analyzers helped me with the title of this post. Check them out below. Did it work?</p><p>You decide. If you&apos;ve read this far and are an old hand at headline writing, feel free to skip the next two sections and scroll right down to the goodies below.</p><h2 id="on-a-deadline-mind-your-headline">On a deadline, mind your headline</h2><p>On a deadline, it&apos;s easy to forget that the whole effort&apos;s success ultimately rides on the headline.</p><p>Will it stand out? Does it &quot;speak&quot; to our audience? And does it address the question on the mind of busy professionals when they quick-scroll through their feed readers or email inboxes and come across your post: &quot;What&apos;s in it for me?&quot;</p><p>If our headline or subject line cannot answer that last question upfront, they won&apos;t feel compelled to click. Only a few hardened souls (thanks, mom!) will read our post or landing page or whitepaper or email.</p><!--kg-card-begin: html--><p>And forget about them making it anywhere near the call-to-action button. The blog post may be a masterpiece of <a href="https://blog.cybersecurity-writers.com/tag/content-marketing/" title="IT Security content marketing posts on the Cybersecurity Writers Blog" target="_blank">IT security content marketing</a>, but nobody will ever know without a headline that works. Game over, before it has even begun.</p><!--kg-card-end: html--><p></p><h2 id="how-to-improve-your-headline-in-under-2-minutes">How to improve your headline in under 2 minutes</h2><p>Science-based headline analyzer apps measure a title&apos;s or subject line&apos;s potential to grab human readers&apos; attention online. Before we conscript them to serve as our free data-driven<a href="https://en.wikipedia.org/wiki/Headline"> copy editors</a>, let&apos;s take care of a few basics first.</p><p>Does our headline meet essential SEO requirements, such as including a relevant keyword? After all,<a href="https://www.silverbackstrategies.com/blog/how-to-write-seo-headlines-that-both-people-and-bots-will-love"> bots have to pick up on a headline so that people can find and click on it</a>.</p><p>B2B headlines that set specific expectations drive more traffic. Options range from<a href="https://smartblogger.com/how-to-write-a-headline-that-converts/"> including a number</a> to directly addressing the target audience (&quot;...for IT Admins&quot;) to promising valuable insights on the fly (&quot;&#x2026;In Under 3 Minutes&quot;).</p><p>Can the content deliver on what your headline is promising? Keep in mind that most IT security professionals have no tolerance for clickbait. There&apos;s a reason why even Buzzfeed stays away from<a href="https://getcodeless.com/buzzfeed-headline-tricks/"> Buzzfeed-style</a> headlines for<a href="https://www.buzzfeed.com/tag/cybersecurity"> cybersecurity</a> topics.</p><figure class="kg-card kg-image-card"><img src="https://blog.cybersecurity-writers.com/content/images/2021/03/your-key-to-unique-remote-work-headlines-analyzer-screenshot-aminstitute-com-1-1.png" class="kg-image" alt="Your Key to Unique &#x2018;Remote Work&#x2019; Headlines" loading="lazy" width="1177" height="556" srcset="https://blog.cybersecurity-writers.com/content/images/size/w600/2021/03/your-key-to-unique-remote-work-headlines-analyzer-screenshot-aminstitute-com-1-1.png 600w, https://blog.cybersecurity-writers.com/content/images/size/w1000/2021/03/your-key-to-unique-remote-work-headlines-analyzer-screenshot-aminstitute-com-1-1.png 1000w, https://blog.cybersecurity-writers.com/content/images/2021/03/your-key-to-unique-remote-work-headlines-analyzer-screenshot-aminstitute-com-1-1.png 1177w" sizes="(min-width: 720px) 720px"></figure><!--kg-card-begin: html--><a id="3-free-tools-to-adjust-your-headline-in-a-hurry"><p align="right"><i>Screenshot: Blog post title score on the <a href="https://aminstitute.com/headline/" title="Score for Cybersecurity Writers blog post htitle on the Adbvanced Marketing Institute&apos;s EMV Headline Analyzer" target="_blank">EMV Headline Analyzer</a></i></p><!--kg-card-end: html--><h2 id="three-free-tools-to-adjust-your-headline-in-a-hurry">Three free tools to adjust your headline in a hurry</h2><p>Do you have a solid headline draft? Then it&apos;s time to run it through one or more headline analyzer apps and use their feedback to calibrate your message.</p><p>I selected three of these online tools for copywriters to tweak the title for this blog post. Each of them has its own advantages:</p><ul><li>CoSchedule&apos;s<a href="https://coschedule.com/headline-analyzer"> Free Headline Analyzer</a> covers the basics. It&apos;s designed for quick assessments of a headline&apos;s sentiment, word balance, and length.</li></ul><!--kg-card-begin: html--><p>&#x1F44D; for the headline &quot;Skimmability&quot; gauge. It marks the words most readers will focus on.</p><br><!--kg-card-end: html--><ul><li>The<a href="https://capitalizemytitle.com/headline-analyzer/"> Headline Analyzer</a> at CapitalizeMyTitle.com evaluates the headline or email subject based on more than 50 different data points and rates it on a scale of 1-100. It emphasizes readability and SEO impact.</li></ul><!--kg-card-begin: html--><p>&#x1F44D; for the built-in <a href="https://www.tckpublishing.com/weasel-words/" title="Weasel Words: Get Rid of These Words to Improve Your Writing (TCK Publishing Blog)">weasel word</a> detector.</p><br><!--kg-card-end: html--><ul><li>The Advanced Marketing Institute&apos;s no-frills <a href="https://aminstitute.com/headline/">Emotional Marketing Value Headline Analyzer</a>, the pioneer in this category of copywriting tools, doesn&apos;t concern itself with SEO. It estimates the emotional and intellectual impact of word choices.</li></ul><!--kg-card-begin: html--><p>&#x1F44D; for how easy the EMV Headline Analyzer makes it to home in on a headline that predominantly appeals to most people&apos;s intellectual sphere.</p><br><!--kg-card-end: html--><p>Such headlines are &quot;especially effective when offering products and services that require reasoning or careful evaluation,&quot; according to the site, so it&apos;s a logical choice for <a href="https://blog.cybersecurity-writers.com/is-your-cybersecurity-content-too-weak/">cybersecurity industry blogs</a>, ads, and email subject lines.</p><p>To fine-tune my headline for this post, I first ran my drafts through all three tools. Then I let the EMV Headline Analyzer tip the scale when I chose the final title, because I write for people, not (Google) bots.</p><p>I&apos;ve found in the past that an EMV score above 50 means that a headline will fulfill its purpose. Did it work?</p><p>You be the judge.</p><!--kg-card-begin: html--><center>*</center><!--kg-card-end: html--><p>Expect further hands-on tips in my upcoming posts and mailings. Are you looking for subject matter experts who plan, create, and promote targeted &#xA0;IT security content fast? <a href="https://www.cybersecurity-writers.com">Let us know.</a></p><p>Contact<a href="https://www.cybersecurity-writers.com"> Cybersecurity Writers</a> to learn about our process and</p><!--kg-card-begin: html--><center><h3><a href="https://www.cybersecurity-writers.com/" title="Schedule a free cybersecurity content marketing consultation now.">Schedule a Free Initial Consultation</a></h3></center><!--kg-card-end: html--><p></p><!--kg-card-begin: html--><a id="remote-work"><!--kg-card-end: html--><p>*<em> I picked this example because it&apos;s one many cybersecurity bloggers, IT industry copywriters, and content owners/managers are familiar with in 2020.</em></p></a></a>]]></content:encoded></item><item><title><![CDATA[Is Your Cybersecurity Content Too Weak?]]></title><description><![CDATA[Wordy blog posts, lengthy whitepapers, and unfocused press releases are diluting the message of many IT security companies. How can your team avoid this trap?]]></description><link>https://blog.cybersecurity-writers.com/is-your-cybersecurity-content-too-weak/</link><guid isPermaLink="false">605f7a8c2ae533ba3e2ce928</guid><category><![CDATA[Cybersecurity]]></category><category><![CDATA[Content Marketing]]></category><category><![CDATA[Writing]]></category><dc:creator><![CDATA[Gerd Meissner]]></dc:creator><pubDate>Wed, 23 Sep 2020 15:37:00 GMT</pubDate><media:content url="https://blog.cybersecurity-writers.com/content/images/2021/03/is-your-cybersecurity-content-too-weak-image-min--1-.png" medium="image"/><content:encoded><![CDATA[<img src="https://blog.cybersecurity-writers.com/content/images/2021/03/is-your-cybersecurity-content-too-weak-image-min--1-.png" alt="Is Your Cybersecurity Content Too Weak?"><p>Have you ever overheard bystanders recount a car crash to the first police officer on the scene?<br></p><p>More often than not, they can&#x2019;t contain their excitement. With great enthusiasm, such incidental eyewitnesses share a torrent of unstructured and unfiltered details, insights, and observations. Leave it to the officer to sort out what&#x2019;s relevant and what&#x2019;s not.<br></p><p>Many IT security firms suffer from a similar affliction when they create content. In my experience, this holds true for startups as well as for the <a href="https://blog.cybersecurity-writers.com/tag/content-marketing/">content marketing</a> programs of enterprise-level Software-as-a-Service (SaaS) providers.<br></p><p>Instead of engaging the target audience, it often results in confusion and <a href="https://blog.cybersecurity-writers.com/what-every-cybersecurity-content-writer-should-do/">numbness</a>. Countless cybersecurity blog posts, whitepapers, marketing collateral, even press releases include everything and the kitchen sink*. They are wordy and awash in non-essential, irrelevant information.<br></p><p>Throw in an &#x201C;APT&#x201D; here and a &#x201C;SIEM&#x201D; there, and we should be good. Wait - don&#x2019;t forget to mention &#x201C;Ransomware&#x201D; in the <a href="https://blog.cybersecurity-writers.com/your-key-to-unique-remote-work-headlines/">headline</a>. Making sense of it all? Let&#x2019;s leave that part to the readers.<br></p><figure class="kg-card kg-image-card"><img src="https://blog.cybersecurity-writers.com/content/images/2021/03/Copy-of-Untitled-1.png" class="kg-image" alt="Is Your Cybersecurity Content Too Weak?" loading="lazy" width="800" height="1200" srcset="https://blog.cybersecurity-writers.com/content/images/size/w600/2021/03/Copy-of-Untitled-1.png 600w, https://blog.cybersecurity-writers.com/content/images/2021/03/Copy-of-Untitled-1.png 800w" sizes="(min-width: 720px) 720px"></figure><h2 id="how-poor-writing-waters-down-your-message">How poor <a href="https://blog.cybersecurity-writers.com/tag/writing/">writing</a> waters down your message<br></h2><p>Cynics will argue that this is not a bug of content creation in the cybersecurity industry - it&#x2019;s a feature: the verbosity of snake oil traders. I disagree, for mainly three reasons:<br></p><ol><li>Unfair generalizations like this underestimate the audience. Most industry readers or <a href="https://blog.cybersecurity-writers.com/7-new-cybersecurity-podcasts-you-should-follow-in-2021/">cybersecurity podcast</a> listeners won&#x2019;t fall for empty posturing. Besides, other technology sectors grapple with similar content challenges.</li><li>Lack of substance isn&#x2019;t the problem. What weakens the message is the lack of IT security engineers who know how (and have the time) to structure and write impactful cybersecurity B2B blog posts or product marketing collateral.</li><li>Most importantly, web metrics prove that most cybersecurity professionals have little patience for meandering content. They prefer relevant, straightforward, and actionable pieces that add value and don&#x2019;t waste their time.<br></li></ol><p>For a few examples, check out Feedspot&#x2019;s <a href="https://blog.feedspot.com/cyber_security_blogs/">Top 100 Cyber Security Blogs and Websites in 2020 For IT Security Pros</a>. </p><p>What do the highest-ranking blogs on this list have in common? They attract new readers and turn them into loyal followers with posts that meet these quality standards.<br></p><h2 id="cybersecurity-writers-and-researchers-wanted">Cybersecurity writers and researchers wanted</h2><p>Experts who are skilled at planning and crafting such content are much in demand. They are also hard to find. The writers and editors at <a href="https://blog.cybersecurity-writers.com/this-cliche-will-harm-your-content-marketing/">non-specialized marketing agencies</a>, on the other hand, lack the required subject matter expertise.<br></p><p>How to create a strong cybersecurity blog post or piece of collateral? Start with a clear understanding of the purpose and key target audience. Then structure the content so that it fits the audience and <a href="https://blog.cybersecurity-writers.com/what-every-cybersecurity-content-writer-should-do/">supports the purpose</a>.<br></p><!--kg-card-begin: html--><p>A thought leadership post on data protection and compliance, for example, will require a different approach and Call to Action (CTA) than a <a href="https://blog.cybersecurity-writers.com/your-key-to-unique-remote-work-headlines/" title="Your Key to Remote Work Cybersecurity Headlines" (cybersecurity writers tips & tools blog)>remote work cybersecurity</a> tip sheet for IT admins or a <a href="https://blog.cybersecurity-writers.com/hungry-for-b2b-cybersecurity-content/" title="Hungry for B2B Cybersecurity Content: The Case for Webinar Executive Summaries (Cybersecurity Writers Tips &amp; Tools Blog)">webinar executive summary</a>.</p>  <!--kg-card-end: html--><p>Expect more detailed, hands-on tips in our upcoming posts and mailings. Does your team need expert help with creating and promoting quality cybersecurity content fast? Let us know.<br></p><p>Contact <a href="https://www.cybersecurity-writers.com">Cybersecurity Writers</a> to learn about our process and </p><!--kg-card-begin: html--><center><h3><a href="https://www.cybersecurity-writers.com/">Schedule a Free Initial Consultation</a></h3></center><!--kg-card-end: html--><h3 id><br></h3><p><em>*Check out this post on another <a href="https://blog.cybersecurity-writers.com/this-cliche-will-harm-your-content-marketing/">clich&#xE9; to avoid in cybersecurity writing</a>. </em><br></p>]]></content:encoded></item></channel></rss>