ZCyber Security guest post guidelines for Contributors
Thank you for your interest in writing for the ZCySec blog. We value your expertise and the insights you can share with our audience. Let’s work together to make sure your content meets our standards for publication.
Please keep these guidelines in mind when you submit a guest post.
Our Audience
- Business Associates
- Chief Information Security Officers (CISO)
- Chief Privacy Officers (CPO)
- Compliance Officers
- Covered Entities
- Cyber Risk Management Professionals
- IT Administrators
- Technology Vendors
- Software Developers
Topics to Write On
- Cyber security regulations and compliance
- Ransomware
- Artificial Intelligence
- Network Security
- Internet of Things
- DevOps
- DevSecOps
- Incident Response
- Phishing attacks
- Cyber security training and courses
- Malware
- Cyber Ethics
- Passwords and Authentication
- Distributed denial-of-service (DDoS) attacks
- Mobile Device Security
- Security at Home
- Cyberbullying Topics
- Data breaches
- Compliance Audit and Assessment
- Cloud Security & Risk
- Working remotely
- Business Continuity Management
Prepwork
Before writing a draft of your article, let us know as you finalize a topic and keywords.
Length
1.5 to 2-2.5K words. (No less than 1,500 words unless agreed upon ahead of time.)
Depth
We strive for well-written, deep-dive articles that compliment ZCySec’s own expertise. Your article should offer our audience something new, either in the form of actionable content or deeply insightful, research-based information.
Although external data is appropriate in some cases, the content you present should draw as much as possible from your own (individual or brand) insight.
Tone
Please familiarize yourself with a few of our recent blog articles to get a sense of our tone. In general, we look for writing that is engaging but not breezy, in-depth but not overly jargonny.
Above all, make sure your tone is not self-promotional or salesy. Let your expertise speak for itself.
SEO and organization
Please follow best practices for SEO-focused writing. Including:
- Target keywords in title and (whenever possible) H2s
- Easily scannable text, broken up by subheadings, bullets, and/or numbered lists
- Short, mobile-friendly paragraphs
Images
- Include high-resolution screenshots if they add value to the text
- Properly source all images
Links and data attribution
- Include 1 link to your own content
- Include at least three links to relevant ZCySec content
- Link externally only if you are citing data (always cite data!) or providing readers with additional resources. We aren’t against external links, but we just don’t want a click-fest.
Edits
Please edit your work carefully before submitting. That being said, plan to work on at least one round of edits. We want to help you make your work the best it can possibly be.
Publishing Process
Our publication process is very simple. Just send your article via email to info@zcybersecurity and our editors will review it. However, since our articles mainly cater to the US audience, we suggest that you get your article written in the US English language and review them accordingly for grammar and spellings before sending it over to us. Once we receive the article it will be reviewed by our team to ensure it meets all our criteria and is relevant to our requirement.
Note- We may do minor edits to align the article to our audience’s needs and to make it SEO-friendly. It will then be published.