Re: [Full-disclosure] bloginfosec.com: We're looking for a few good columnists!



Fredrick Diggle would like to apply to contribute to your quality
publication. He offers the support of Diggle Security and all of its
resources. Please reply with your offer letter.

Thank you
Fredrick Diggle FDCSP


On Wed, Jul 9, 2008 at 8:24 PM, Kenneth F. Belva <ken@xxxxxxxxxxxxxxx> wrote:
Table of Contents
-----------------
1. Introduction
2. Reasons to Write on bloginfosec.com
3. bloginfosec.com Magazine Philosophy
4. bloginfosec.com Writing Commitment
5. Contact bloginfosec.com
6. Newsletter


Introduction
------------
We are expanding in size and are looking for a few qualified writers.
The project has developed substantially and we are looking to take it to
the next level!

Why write? See below! Also, please pass this opportunity to other
colleagues that may have an interest in writing for (or reading)
bloginfosec.com!


Reasons to Write on bloginfosec.com
-----------------------------------
* Graced the cover of computerworld.com over 10 times
* Have a readership in over 110 countries
* Website can be translated into over 36 languages
* Partnerships with major industry players
* Ranked as a top influencers for 2007
* Have a daily and constant growing readership who interact with
material
* Syndicated across various web channels to increase readership
* Join Outstanding Columnists


bloginfosec.com Magazine Philosophy
-----------------------------------
Our core philosophy is that working, "in the trenches" industry experts
know best. That's why each columnist determines the subject matter on
which they wish to write. bloginfosec.com believes in a laissez-faire
editorial style: editorial interference in content selection is kept to
a minimum.

Our core values include:
1. Have the best content written by top people
2. Expose content to the widest audience through network affiliates
3. Create synergy with other information security organizations


bloginfosec.com Writing Commitment
----------------------------------
Our requirement will be one column a month for the next twelve months on
any information security topic of your choice.

Please see columnist agreement for more information:
http://www.bloginfosec.com/columnists/columnist-agreement/


Contact bloginfosec.com
-----------------------
1. Email: authors@xxxxxxxxxxxxxxx
2. Website: http://www.bloginfosec.com/contact/

Newsletter
----------
Have bloginfosec.com information delivered directly to your inbox! See
the top right of the magazine for the subscription box.


Thanks for your time. I look forward to hearing from you.

Kenneth F. Belva
Publisher & Editor-in-Chief, bloginfosec.com

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Relevant Pages

  • ISO 27001 Newsletter: Edition 17 Released
    ... The latest issue of the newsletter covering the ISO information ... news and background with respect to the ISO security standards. ... Trials and Tribulations of an Information Security Officer ... Business Continuity Management: Preparation and Risk ...
    (comp.security.misc)
  • The ISO 27001 Newsletter: Issue 18 Published
    ... news and background with respect to the ISO security standards. ... Trials and Tribulations of an Information Security Officer Part 2 ...
    (comp.security.misc)
  • Issue 18 of The ISO 27000 Newsletter Released
    ... news and background with respect to the ISO security standards. ... Trials and Tribulations of an Information Security Officer Part 2 ...
    (alt.computer.security)
  • REVIEW: "The Information Security Dictionary", Urs E. Gattiker
    ... "The Information Security Dictionary", Urs E. Gattiker, 2004, ... %T "The Information Security Dictionary" ... The entry for Authentication does not list the ... listing is given for trade secrets or trade marks. ...
    (comp.security.misc)
  • REVIEW: "The Information Security Dictionary", Urs E. Gattiker
    ... "The Information Security Dictionary", Urs E. Gattiker, 2004, ... %T "The Information Security Dictionary" ... The entry for Authentication does not list the ... listing is given for trade secrets or trade marks. ...
    (alt.computer.security)