COMMUNICATION AND PR OFFICER

We’re always open to other security experts weighing in on cybersecurity topics.

If you think you have something valuable to contribute to our blog, we welcome your ideas.

Before you send us a pitch, please note the following:

  • We are busy people, so it may take up to one week for you to get an answer after the initial email. Be patient, we’re getting to you soon.
  • The Heimdal Security blog is the winner of the Most Educational Blog Award Europe in 2016, and we focus on writing well-documented and helpful content for our readers. Therefore, only top-quality guest posts will be accepted. If your content is not up to par, we don’t have time to do any major edits or give you extensive feedback, you will just get rejected.
  • Your content also needs to be original (not published anywhere else before). Also, and obviously, your content cannot infringe on any copyright laws.
  • We will also retain the copyright to all content you publish with us (you can’t resubmit it someplace else).

How to proceed?

First, send us an email at guestauthors@heimdalsecurity.com, with one or a few topics you can confidently write about. Think of how you are helping our readers and the community protect themselves better from cyber-threats with the info you are bringing to the table.

Before pitching any idea, do a quick search on our blog and make sure the topic is not something we already covered. Also, do not send us completed articles. Unsolicited manuscripts will be ignored! We need to approve the topic idea first.

If you’re accepted…

Then make sure you edit your piece according to the following guidelines before you send us the completed version.

  • Recommended length: between 1000 and 1500 words.
  • Personal opinions, stories, and experience are always more valuable to us than general information compiled from online sources.
  • Don’t make any claims or use facts and figures without mentioning the source for your data.
  • Graphs and charts that accompany your content are more than welcome and encouraged.
  • We can include one link to your website or blog in your author bio, so don’t try to include links throughout the text, as we’ll remove them anyway.

Looking forward to your contributions and to working together!

Best,

The Heimdal Security Content team.

Comments

hello I want security services for my organization

Hello Seth! Thank you for your interest in our services. For business needs, we have Thor Enterprise, our corporate product, which provides proactive and reactive security in one complete package for leading-edge endpoint protection. You can find out more details about our security product here: https://heimdalsecurity.com/en/products/thor-enterprise and do not hesitate to contact us if you have any question. Thanks!

medam
my photos were attacked by ramsomware and convert in to verasto file type plz how to decrypt my file as it is help me soon

Hello,
My system is affected with ransomware and my files have been locked with file extension .tuuqmjqseh.

You are requested to suggest any decryption tools for unlocking the same

Hello there! Sorry to hear that! We suggest using this link and upload your file to better identify the type of ransomware you’ve been infected with: https://id-ransomware.malwarehunterteam.com/ After that, you can read this article and see if there’s any free decryptor available for it: https://heimdalsecurity.com/blog/ransomware-decryption-tools/. Thanks and hope this helps.

Hello! So sorry to hear that! Unfortunately, we don’t know of any decryptor available for this ransomware strain. Maybe it can help this guide: https://www.2-spyware.com/remove-grovas-ransomware.html Stay safe!

In which country do you provide security services?

Miriam Cihodariu on March 22, 2019 at 3:11 pm

Hello Alex,

Thank you for stopping by. Our security products (software solutions) can be used regardless of location.

Leave a Reply

Your email address will not be published. Required fields are marked *

GO TO TOP