3 Min Read

Source: Radharc Images via Alamy Stock Photo
COMMENTARY
It’s been about two months since we re-launched the Dark Reading Commentary section to focus on opinions. Today, we clarify two other types of Commentary submissions that we publish on Dark Reading.
There are numerous cybersecurity technology tools and platforms available, and cybersecurity professionals regu…
3 Min Read

Source: Radharc Images via Alamy Stock Photo
COMMENTARY
It’s been about two months since we re-launched the Dark Reading Commentary section to focus on opinions. Today, we clarify two other types of Commentary submissions that we publish on Dark Reading.
There are numerous cybersecurity technology tools and platforms available, and cybersecurity professionals regularly tell us at Dark Reading that they want to know how their peers — other practitioners — are utilizing technology to address their challenges. Or understanding the pros and cons of new tools and applications before they become part of the enterprise cybersecurity stack. What kind of things should they be thinking about regarding new standards and protocols?
Those Commentary bylines will make up Tech Talkson DR Technology. These include thought leadership articles on how to use a specific technology or solve a specific use case. We welcome pieces that describe recommended configuration settings, how to set up or deploy technology to avoid certain outcomes, or even how a security team rolled out a tool to solve a specific problem. Even mistakes are valuable — tell us when something didn’t work so that others can avoid making the same mistake.
In a nutshell, Tech Talk is less "what does this technology do," and more "this is how we can use this technology." In non-cybersecurity terms, we are not looking for articles explaining "why you should have a knife for cutting things," but rather "this is why you bring a machete to the jungle and not a chef’s knife."
Related:How to Submit a Column to Dark Reading
And the second thing the Dark Reading team consistently hears from cybersecurity professionals is that they value advice from others working in the cybersecurity trenches. We publish Commentary pieces offering advice or useful takeaways as Ask the Experton The Edge. These pieces focus on a specific problem and are less big-picture. Rather than trying to address every angle and providing a broad (and often vague) explanation, these pieces delve deep and offer specific examples.
Do you have something to say about post-quantum cryptography and the necessity of migration? An "Ask the Expert" piece would focus on a specific aspect of migration and discuss how organizations should approach it. Is there an End-of-life deadline coming up? The goal is to provide practical guidance on the necessary steps to take. In some cases, we even state the question right at the top of the article to make it clear what the advice is about.
Dark Reading Submission Guidelines
We should not have to say this, but here goes: Dark Reading does not accept any submissions generated by AI or LLMs.
The submitted column should be specific and offer takeaways that other practitioners can use. Be thoughtful, clear, and provide concrete examples. We read every single pitch and draft and consider whether they would be a fit for Tech Talk or Ask the Expert, so don’t feel like you need to say which one you are submitting, although you are absolutely welcome to do so.
For Tech Talks and Ask the Expert submissions, please aim for a length of around 700 words, and no more than 800 words. (This is different from Opinion.)
Please do not submit articles that have been published anywhere else; Dark Reading publishes only original work.
Please consider whether the topic you are submitting poses a conflict of interest. For experts at security companies, we recognize that it is extremely hard to talk about how to use technology without violating this rule, so focus on best practices and use cases. Being specific will really help you here.
Related:How We Ditched the SaaS Status Quo for Time-Series Telemetry
Send your Tech Talk and Ask the Expert columns and pitches to [email protected]. An automated email will acknowledge receipt and the submission will enter the editors’ review/edit pipeline. We currently take three weeks to consider and respond with an acceptance, rejection, or a request for modification. Once accepted, we will provide a final, edited copy of the article and the date the article will appear.
Related:Securing the Win: What Cybersecurity Can Learn From the Paddock
As we mentioned back in October, Dark Reading has always been a destination for cybersecurity professionals to meet, connect, and discuss their day-to-day challenges. We need your help to keep doing that.
About the Author
Managing Editor, Features, Dark Reading
As Dark Reading’s managing editor for features, Fahmida Y Rashid focuses on stories that provide security professionals with the information they need to do their jobs. She has spent over a decade analyzing news events and demystifying security technology for IT professionals and business managers. Prior to specializing in information security, Fahmida wrote about enterprise IT, especially networking, open source, and core internet infrastructure. Before becoming a journalist, she spent over 10 years as an IT professional – and has experience as a network administrator, software developer, management consultant, and product manager. Her work has appeared in various business and test trade publications, including VentureBeat, CSO Online, InfoWorld, eWEEK, CRN, PC Magazine, and Tom’s Guide.