Editorial Process & Standards

 

At PurpleSec we go to great lengths to provide original, timely, and above all else actionable content for our audience. In a world of seemingly similar search results, we aim to take a different perspective in our articles, resources, and videos to deliver value.

 

Our dedication to helping the security community comes from our genuine love for cyber security. We’re nerds who love helping enthusiasts and students to learn the basics and to break into the profession.

 

We’re also committed to providing strategic direction for organizations seeking more than “checkbox security.”

 

As such, we take pride in developing strict editorial guidelines and processes for EVERY page that is published on our site.

 

Here’s Our Editorial Process:

 

  1. Every topic selected is determined and reviewed by PurpleSec’s executive team of security experts.
  2. Outlines are drafted prior to writing and rigorously reviewed by a technical and independent 3rd party.
  3. Once reviewed, PurpleSec’s executive team reviews, edits, and approves the outline.
  4. The approved outline is then sent to a writer who has proven technical capabilities and hands-on experience with the subject matter they are writing about. For example, if we publish an article on penetration testing, then the author themselves has technical competencies in performing and delivering penetration test reports to clients.
    • Disclaimer: We use AI to assist with generating content. All of our content is reviewed and edited by human experts before publishing.
  5. Once the first draft is delivered we again have a technical and independent 3rd party review, edit, and approve the article. If the article does not meet our standards of quality than it is kicked back to the technical content writer for further edits. This process is repeated until we’re satisfied that the quality of the content meets our standards.
  6. PurpleSec’s executive team reviews the final draft of the article with no less than three technical experts’ approval being required before it can be published online.
  7. Content is reassessed and updated over a 30, 60, and 90 day period to ensure technical accuracy and to best match the intent of the article with that of the user’s search.

 

What We Won’t Accept:

 

  1. Unsolicited requests for content collaboration that would result in a guest post on our site. This does not mean that we don’t accept guest posts, however, we have a thorough process to control quality standards for vetting those who wish to collaborate with us.
  2. Link exchanges of any kindespecially those that violate Google’s guidelines.
  3. 3rd party paid placements, advertisements, or endorsements of products, people, or services.

 

Wrapping Up

 

We greatly appreciate and respect your journey into cyber security, regardless of where you are at today.

 

To our current and future readers – THANK YOU for all of your support.

 

Our experts are committed more than ever to providing value to the communities we serve.

 

Jason Firch, MBA

Chief Executive Officer

 

P.S. We want you to help keep us honest and accountable to our promises listed above.

 

Send any and all feedback to [email protected].

 

Last Updated: February 10, 2023

Jason Firch MBA - cyber security expert

Jason Firch

CEO / CMO

Michael Swanagan

Michael Swanagan

Technical Editor-In-Chief

Dalibor Gašić - cyber security expert

Dalibor Gašić

Head Of Security Research

Dušan Trojanović - cyber security expert

Dušan Trojanović

Senior Security Researcher

Eva Georgieva - cyber security expert

Eva Georgieva

Senior Security Researcher

Kenneth Thomas - cyber security expert

Kenneth Thomas

Senior Security Researcher

Liam Smith - cyber security expert

Liam Smith

Security Researcher

Eryk Waligora - cyber security expert

Eryk Waligora

Technical Writer

Strahinja Stankovic - cyber security expert

Strahinja Stankovic

Technical Writer