Hackers, Assemble! Here we are with the results announcement of the cybersecurity writing contest!! For those who are reading about it for the first time - & HackerNoon are excited to host a Here’s your chance to win money from a $1,000 monthly prize pool. It could be any story on . Twingate Cybersecurity Writing Contest! #cybersecurity You can share your expertise and stories on all offensive and defensive mechanisms to secure the internet. You can also discuss the latest cybersecurity incidents, interviews, and philosophical questions related to cybersec! Share your ! cybersecurity stories today The Cybersecurity Writing Contest June 2022 Nominations We picked all the stories tagged with the tag on HackerNoon, published in June, 2022. Then we chose the top stories using weightage respectively to: #cybersecurity 60:30:10 Number of hours read The number of people reached The freshness of the content Here are the top 10 nominations: by An Intro to Zero Trust Architecture @weswright by LUNA Debacle: A Planned Attack or an Imperfection in the System? @dankhomenko by Security Infrastructure and the Multi-Cloud @thecloudarchitect by Cyber Deterrence is More Important than Nuclear Deterrence @nebojsa.todorovic by If You Wanna BYOD, You Gotta Get with Cybersecurity @nemmanuel by Combating Crypto Breaches: Smart Cybersecurity Practices You Should Know @devinpartida by What Are the Most Common Malware Attacks on Macs? @zacamos by Tor: Love and Cybersecurity Thunder @nebojsa.todorovic by What will IBM's Acquisition of Randori Mean for Cybersecurity? @ShannonFlynn by Myths and Misconceptions About Private Browsing @alexbobes Winners! The editors then voted for the top stories. Here are the winners for the month of June: In the first place, we have by LUNA Debacle: A Planned Attack or an Imperfection in the System? @dankhomenko Congratulations on winning You have won 500 USD! :) @dankhomenko Algorithmic stablecoins are in their infancy stage, and once the technology is developed, we might face a different financial world. For now, though, these coins are too vulnerable, and if a system has a vulnerability, even a small one, there will be somebody willing to exploit it. by has won the second position! Cyber Deterrence is More Important than Nuclear Deterrence @nebojsa.todorovic There’s one final and “prevalent” difference between nuclear and cyber deterrence. Nuclear retaliation has its limits. First come, first served. First nuked, first destroyed, not completely, but with enough “resources” left to strike back. Cyber retaliations let your sick imagination run wild for as long as and as many times as you want. Great story ! You have won 300 USD! @nebojsa.todorovic In the third place, we have by If You Wanna BYOD, You Gotta Get with Cybersecurity @nemmanuel Allowing workers to have their own devices for work, with appropriate use and safety considerations, might be an ideal workplace policy for some firms. BYOD, on the other hand, can pose a severe threat to the security of business data and systems if it is not fully understood and properly regulated. Yay ! You have won 100 USD this month! @nemmanuel The most-read story this month is by An Intro to Zero Trust Architecture @weswright Congratulations You’ve won 100 USD. @weswright All in all, it’s hard to overstate the sheer number of cybersecurity-related challenges currently facing organizations. Admittedly, for many, it’s a case of figuring out how to secure systems, data, and users in the immediate term. But once they’re done firefighting, implementing ZTA – grounded in an effective identity and access management strategy – is a no-brainer. Let’s wrap up the announcement! We will contact the winners shortly. Keep an eye on to see the current and upcoming writing contests! contests.hackernoon.com