Editorial Process & Standards
At PurpleSec we go to great lengths to provide original, timely, and above all else actionable content for our audience. In a world of seemingly similar search results, we aim to take a different perspective in our articles, resources, and videos to deliver value.
Our dedication to helping the security community comes from our genuine love for cybersecurity. We’re nerds who love helping enthusiasts and students to learn the basics and to break into the profession.
We’re also committed to providing strategic direction for organizations seeking more than “checkbox security.” As such, we take pride in developing strict editorial guidelines and processes for EVERY page that is published on our site.
Our Process:
- Every topic selected is determined and reviewed by PurpleSec’s leadership and advisory teams.
- Outlines are drafted before writing and rigorously reviewed by a technical and independent 3rd party.
- Once reviewed, PurpleSec’s executive team reviews, edits, and approves the outline.
- The approved outline is then sent to a writer who has proven technical capabilities and hands-on experience with the subject matter they are writing about. For example, if we publish an article on penetration testing, then the author themselves has technical competencies in performing and delivering penetration test reports to clients.
- Disclaimer: We use AI to generate draft content to assist the writing process. All of our content is reviewed and edited by human experts before publishing.
- Once the first draft is delivered our Editor-In-Chief reviews the content before sending it over for final technical review. If the article does not meet our standards of quality then it is kicked back to the writer for further edits. This process is repeated until we’re satisfied that the quality of the content meets our standards.
- PurpleSec’s executive team reviews the final draft of the article with no less than three technical experts’ approval being required before it can be published online.
- Content is reassessed and updated over a 30, 60, and 90-day period to ensure technical accuracy and to best match the intent of the article with that of the user’s search.
What We Won’t Accept:
- Unsolicited requests for content collaboration that would result in a guest post on our site. This does not mean that we don’t accept guest posts, however, we have a thorough process to control quality standards for vetting those who wish to collaborate with us.
- Link exchanges of any kind – especially those that violate Google’s guidelines.
- 3rd party paid placements, advertisements, or endorsements of products, people, or services.
Wrapping Up
We greatly appreciate and respect your journey into cyber security, regardless of where you are at today.
To our current and future readers – THANK YOU for all of your support. Our team is committed more than ever to providing value to the communities we serve.
Chief Executive Officer
P.S. We want you to help keep us honest and accountable to our promises listed above.
Send any and all feedback to [email protected].
Last Updated: June 25, 2024