The Cybersecurity Writing Contest 2022: Round 1 Results Announced!

\
Hackers, Assemble! Here we are with the results announcement of the cybersecurity writing contest!! For those who are reading about it for the first time – Twingate & HackerNoon are excited to host a Cybersecurity Writing Contest! Here’s your chance to win money from a $1,000 monthly prize pool. It could be any story on #cybersecurity.

\
You can share your expertise and stories on all offensive and defensive mechanisms to secure the internet. You can also discuss the latest cybersecurity incidents, interviews, and philosophical questions related to cybersec!

\
Share your cybersecurity stories today!

\

The Cybersecurity Writing Contest June 2022 Nominations

We picked all the stories tagged with the #cybersecurity tag on HackerNoon, published in June, 2022. Then we chose the top stories using 60:30:10 weightage respectively to:

\

  • Number of hours read
  • The number of people reached
  • The freshness of the content

\
Here are the top 10 nominations:

\

  1. An Intro to Zero Trust Architecture by @weswright
  2. LUNA Debacle: A Planned Attack or an Imperfection in the System? by @dankhomenko
  3. Security Infrastructure and the Multi-Cloud by @thecloudarchitect
  4. Cyber Deterrence is More Important than Nuclear Deterrence by @nebojsa.todorovic
  5. If You Wanna BYOD, You Gotta Get with Cybersecurity by @nemmanuel
  6. Combating Crypto Breaches: Smart Cybersecurity Practices You Should Know by @devinpartida
  7. What Are the Most Common Malware Attacks on Macs? by @zacamos
  8. Tor: Love and Cybersecurity Thunder by @nebojsa.todorovic
  9. What will IBM’s Acquisition of Randori Mean for Cybersecurity? by @ShannonFlynn
  10. Myths and Misconceptions About Private Browsing by @alexbobes

Winners!

The editors then voted for the top stories. Here are the winners for the month of June:

In the first place, we have LUNA Debacle: A Planned Attack or an Imperfection in the System? by @dankhomenko

Congratulations on winning @dankhomenko You have won 500 USD! 🙂

\

Algorithmic stablecoins are in their infancy stage, and once the technology is developed, we might face a different financial world. For now, though, these coins are too vulnerable, and if a system has a vulnerability, even a small one, there will be somebody willing to exploit it.

Cyber Deterrence is More Important than Nuclear Deterrence by @nebojsa.todorovic has won the second position!

\

There’s one final and “prevalent” difference between nuclear and cyber deterrence. Nuclear retaliation has its limits. First come, first served. First nuked, first destroyed, not completely, but with enough “resources” left to strike back. Cyber retaliations let your sick imagination run wild for as long as and as many times as you want.

\
Great story @nebojsa.todorovic! You have won 300 USD!

In the third place, we have If You Wanna BYOD, You Gotta Get with Cybersecurity by @nemmanuel

Allowing workers to have their own devices for work, with appropriate use and safety considerations, might be an ideal workplace policy for some firms. BYOD, on the other hand, can pose a severe threat to the security of business data and systems if it is not fully understood and properly regulated.

\
Yay @nemmanuel! You have won 100 USD this month!

The most-read story this month is An Intro to Zero Trust Architecture by @weswright

Congratulations @weswright You’ve won 100 USD.

\

All in all, it’s hard to overstate the sheer number of cybersecurity-related challenges currently facing organizations. Admittedly, for many, it’s a case of figuring out how to secure systems, data, and users in the immediate term. But once they’re done firefighting, implementing ZTA – grounded in an effective identity and access management strategy – is a no-brainer.

\
Let’s wrap up the announcement! We will contact the winners shortly. Keep an eye on contests.hackernoon.com to see the current and upcoming writing contests!

Leave a Reply

Your email address will not be published. Required fields are marked *

Instagram

Why do People Say: "Developers are Lazy"?
The saying “work smart, not hard” is applicable for programmers.
.
https://hackernoon.com/why-do-people-say-developers-are-lazy

.
Author: Aga Wozniak
.
.
.
.
.
#blog #100Daysofcode #javascript #vuejs #datascientist #peoplewhocode #learntocode #coding #developerlife #frontenddeveloper #backenddeveloper #fullstackdeveloper #developer #webdeveloper #thedevlife #phpdeveloper #computerscience #programmer #programmingisfun #codingdays
...

Mitigating the DDOS Threats Facing Banks and Fintechs
As much as digitization and cyber simplified banking, the Fintech sector has left digital payment activity exposed to malicious and suspicious activity.
.
https://hackernoon.com/mitigating-the-ddos-threats-facing-banks-and-fintechs

.
Author: Josh Horowitz
.
.
.
.
.
#blog #100Daysofcode #javascript #vuejs #datascientist #peoplewhocode #learntocode #coding #developerlife #frontenddeveloper #backenddeveloper #fullstackdeveloper #developer #webdeveloper #thedevlife #phpdeveloper #computerscience #programmer #programmingisfun #codingdays
...

24 Best JavaScript Blogs and Websites
In this overview, we have compiled a list of popular sites, as well as JS blogs that are worth reading and keeping in your bookmarks.
.
https://hackernoon.com/24-best-javascript-blogs-and-websites

.
Author: natashatsybliyenko
.
.
.
.
.
#blog #100Daysofcode #javascript #vuejs #datascientist #peoplewhocode #learntocode #coding #developerlife #frontenddeveloper #backenddeveloper #fullstackdeveloper #developer #webdeveloper #thedevlife #phpdeveloper #computerscience #programmer #programmingisfun #codingdays
...

The Projects Working to Lower Ethereum Gas Fees
As more investors try their hand at DeFi, gas fees are shooting over the roof, making engaging with decentralized apps uneconomical for most users.
.
https://hackernoon.com/ethereum-gas-fees-are-there-any-projects-working-to-optimize-eth-gas-fees

.
Author: CryptoVirally SLR
.
.
.
.
.
#blog #100Daysofcode #javascript #vuejs #datascientist #peoplewhocode #learntocode #coding #developerlife #frontenddeveloper #backenddeveloper #fullstackdeveloper #developer #webdeveloper #thedevlife #phpdeveloper #computerscience #programmer #programmingisfun #codingdays
...

On the Edge of a New Year: IT Predictions for 2022
The single biggest cause of network errors are people.
.
https://hackernoon.com/an-interview-with-uplogix-ceo-lisa-frankovitch

.
Author: Mignonette Garnier
.
.
.
.
.
#blog #100Daysofcode #javascript #vuejs #datascientist #peoplewhocode #learntocode #coding #developerlife #frontenddeveloper #backenddeveloper #fullstackdeveloper #developer #webdeveloper #thedevlife #phpdeveloper #computerscience #programmer #programmingisfun #codingdays
...

How to Modernize IBM i Applications
If you’re like most IBM i users, you know how much value your IBM i data and applications bring to your business. Your end-users, however, may not. In today’s world of rich user experience, fast-paced application development, and constantly evolving customer expectations, IBM i applications are unde…
.
https://hackernoon.com/how-to-modernize-ibm-i-applications

.
Author: Lansa
.
.
.
.
.
#blog #100Daysofcode #javascript #vuejs #datascientist #peoplewhocode #learntocode #coding #developerlife #frontenddeveloper #backenddeveloper #fullstackdeveloper #developer #webdeveloper #thedevlife #phpdeveloper #computerscience #programmer #programmingisfun #codingdays
...