Write for Hashed Out
Want to write for us? Hashed Out loves guest blog posts!
If you’ve got insights to share on cybersecurity & technology we want to hear them.
From humble beginnings, Hashed Out has grown into one of the most popular cybersecurity blogs on the internet. We welcome more than 2 million readers each year thanks to our coverage of industry news and our insights on the cybersecurity landscape. If you’ve got something to say – and you’re looking to be heard – then Hashed Out is a great place to be heard.
If you are a part of the IT or Cyber Security community, we would love you to write a guest blog post for us. That means you’re a professional – not a marketer or SEO. We’re looking for insights on a range of cyber security issues, as well as perspectives on encryption and digital privacy issues. If you fit the bill and would like to write a guest post for us, fill out the form below and pitch us an idea for your article.
Topics We’re Interested In
- SSL/TLS
- Digital Certificates
- Certificate Management
- Code Signing
- Email Security
- Digital Signatures
- PCI DSS
- GDPR Compliance
- Data Security
- Digital Privacy
- Endpoint Security
- Cloud Security
- Business Cyber Security
- Phishing
- Secure Programming Practices
- Cybersecurity News
- Newly disclosed exploits and vulnerabilities
- Upcoming browser changes
Guest Blog Post Guidelines
- Posts should be original works, it may not be published elsewhere and you agree that we may promote it, quote it, update it and republish it.
- All posts should be submitted as word files, minimum length is 750 words (although most posts are 1,000-3,000 words) and please take time to edit before submitting.
- If your article includes any quotes or statistics, please offer citation, preferably in the form of a link within your text.
- Please provide a two or three sentence bio explaining your credentials along with a headshot at least 300×300 pixels, preferably in front of a white background.
We do not pay for guest posts, nor do we charge a fee for publication. We also have a hard rule that we do not pitch products or companies (including our own) on this blog. We try to apply a press shop approach to Hashed Out, which means we have pretty high editorial standards. That also means sometimes we can picky. That’s why we request that you pitch the article before writing it, that way everyone saves some time.
How To Submit a Guest Blog Post
So, do you want to write for us? Send us an email and we’ll contact you within a few days. Be sure to include:
- Topic idea(s) you’d like to write guest posts on.
- Writing samples – previous articles you’ve written and published.
- Your qualifications/experience relevant to the proposed topic(s).
5 Ways to Determine if a Website is Fake, Fraudulent, or a Scam – 2018
in Hashing Out Cyber SecurityHow to Fix ‘ERR_SSL_PROTOCOL_ERROR’ on Google Chrome
in Everything EncryptionRe-Hashed: How to Fix SSL Connection Errors on Android Phones
in Everything EncryptionCloud Security: 5 Serious Emerging Cloud Computing Threats to Avoid
in ssl certificatesThis is what happens when your SSL certificate expires
in Everything EncryptionRe-Hashed: Troubleshoot Firefox’s “Performing TLS Handshake” Message
in Hashing Out Cyber SecurityReport it Right: AMCA got hacked – Not Quest and LabCorp
in Hashing Out Cyber SecurityRe-Hashed: How to clear HSTS settings in Chrome and Firefox
in Everything EncryptionRe-Hashed: The Difference Between SHA-1, SHA-2 and SHA-256 Hash Algorithms
in Everything EncryptionThe Difference Between Root Certificates and Intermediate Certificates
in Everything EncryptionThe difference between Encryption, Hashing and Salting
in Everything EncryptionRe-Hashed: How To Disable Firefox Insecure Password Warnings
in Hashing Out Cyber SecurityCipher Suites: Ciphers, Algorithms and Negotiating Security Settings
in Everything EncryptionThe Ultimate Hacker Movies List for December 2020
in Hashing Out Cyber Security Monthly DigestAnatomy of a Scam: Work from home for Amazon
in Hashing Out Cyber SecurityThe Top 9 Cyber Security Threats That Will Ruin Your Day
in Hashing Out Cyber SecurityHow strong is 256-bit Encryption?
in Everything EncryptionRe-Hashed: How to Trust Manually Installed Root Certificates in iOS 10.3
in Everything EncryptionHow to View SSL Certificate Details in Chrome 56
in Industry LowdownA Call To Let’s Encrypt: Stop Issuing “PayPal” Certificates
in Industry Lowdown