Hornetsecurity Methodology

At the heart of our content, we prioritize accuracy and reliability.

Every piece of information and data shared is meticulously double-checked and proofread. Our team of experts conducts thorough analyses and verifications to ensure the utmost precision. We are committed to providing content that is not only insightful but also trustworthy and dependable. Your confidence in the quality of our information is our top priority.


1. About our authors

Our team of authors comprises seasoned experts in the cybersecurity sector, bringing a wealth of knowledge and hands-on experience to the forefront. Each author is carefully selected based on their extensive background in the field, ensuring that our content is not only informative but also backed by real-world expertise.

Our team of authors consists of many experts, starting with Paul Schnackenburg who holds over 50 IT certifications, such as Microsoft Certified Trainer, Microsoft Cybersecurity Architect Expert Azure Security Engineer Associate; Andy Syrewicze, our technical evangelist with more than 20 years experience and multiple certifications including a 2023 Microsoft MVP; Christ Taylor, with more than a decade of hands-on experience, a finalist in the Microsoft Global Partner Security Awards for the past two years and several certifications from Microsoft, VMware, Zscaler and Sophos.


2. Comprehensive Research 

In-Depth Research and Data Analytics

Our research and analytics process involves a meticulous blend of primary and secondary research methods, tailored specifically for the cybersecurity sector. Primary research is conducted through expert interviews and participation in key industry events, coupled with targeted surveys.

These activities enable us to gather firsthand insights and current trends directly from industry leaders and practitioners. In parallel, our secondary research involves an in-depth analysis of industry reports and cybersecurity databases. This allows us to incorporate a broad view of market dynamics, technological advancements, and evolving threats.

Integrating these research methods ensures a well-rounded and accurate understanding of the cybersecurity landscape. This approach not only deepens our analysis but also reinforces the trustworthiness and credibility of our findings, adhering to the highest standards of information verification in cybersecurity.


3. Transparent Citation

Clarity and Openness in Our Sources

We emphasize the importance of clarity and openness in referencing our sources. We are committed to enabling our audience to easily verify the information we provide. Each piece of data, insight, or finding is carefully attributed to its original source. In every instance, our citations are thorough and clear, detailing the author, publication date, and other relevant information, including direct links where possible.

Our sources range from reputable cybersecurity reports and expert opinions to peer-reviewed studies, ensuring the information’s reliability and relevance. Moreover, we actively encourage our readers to explore these sources. This practice not only enhances the transparency of our work but also instills confidence in our audience about the accuracy and credibility of the information we present. By upholding these stringent citation standards, we aim to foster a culture of trust and informed understanding within the cybersecurity community.


4. Peer Review

Rigorous Peer Review Process

We have established a thorough process to ensure the accuracy and relevance of our content, maintaining the highest standards of quality in cybersecurity information.

The process starts with our researchers and writers submitting content focused on current cybersecurity topics. This content undergoes an initial review by our internal team for factual accuracy and relevance.

Next, the content is subjected to an external peer review by experts in the cybersecurity field. These experts critically assess the content for its validity, comprehensiveness, and contribution to the field, providing feedback and suggesting revisions if necessary.

After incorporating the expert feedback, our team revises the content for enhanced clarity and accuracy. The final step is a comprehensive quality check by our editorial team to ensure the content meets our strict standards and aligns with our commitment to providing trustworthy and reliable information.

This transparent and stringent peer review process is vital to our methodology, reflecting our dedication to delivering content that is not only informative but also rigorously vetted and trustworthy, thereby fostering confidence and informed understanding within our audience.


5. Regular Updates

Keeping Our Information Current

We focus on keeping our information current to ensure that our content reflects the latest developments in the dynamic field of cybersecurity. Staying abreast of the fast-evolving cybersecurity landscape is crucial, and our methodology for content updates is designed to capture the most recent and relevant information.

Our team consistently monitors a variety of sources for the latest updates and news in the industry. This includes tracking cybersecurity journals, news outlets, industry reports, and updates from leading cybersecurity agencies and organizations. By paying close attention to these sources, we can identify significant changes, emerging threats, and new best practices in real-time.

Once new information is identified, we initiate our update process. This involves revisiting our existing content and evaluating the need for revisions. When updates are necessary, our team of experts and researchers works diligently to incorporate the new information, ensuring that it is accurate, relevant, and adds value to our audience’s understanding of cybersecurity.


6. Technical Analysis

Advanced Technical Analysis

In our advanced technical analysis for cybersecurity content, like blog posts, we blend thorough research with a structured analytical framework. This approach starts with in-depth research into current cybersecurity trends, emerging threats, and new technologies. Our expert team then applies a rigorous framework to distill this information into key insights and actionable strategies, ensuring our content is both informative and practical.

Critical peer review and collaborative discussions among our cybersecurity experts ensure technical accuracy and a diversity of perspectives. This collaborative process refines our content, ensuring clarity and comprehensiveness. Finally, we carefully edit our content to balance technical depth with readability, making complex topics accessible and engaging. Throughout, we maintain a balance between transparency and discretion, providing valuable insights while safeguarding sensitive methodologies and proprietary knowledge to protect our competitive edge in the cybersecurity landscape.


7. Scam Watch and Content Auditing

Vigilant Against Threats and Scams

We are vigilant against threats, dedicating ourselves to identifying and auditing content for potential scams and misinformation. This is a critical aspect of our work, especially in the cybersecurity space, where the landscape is constantly evolving with new threats. Our approach to scam watch and content auditing involves a multi-layered strategy.

First, our team stays updated with the latest cybersecurity trends and scam tactics. This involves continuous monitoring of cybersecurity news, reports from security agencies, and updates from trusted cybersecurity forums. We also employ advanced tools and techniques for detecting scams and verifying the authenticity of our content. These tools include software identifying patterns and markers often associated with fraudulent activities.

In addition to technological solutions, we have a team of cybersecurity experts who manually review content for any signs of scams or misinformation. Every piece of content goes through this rigorous auditing process. If any content is flagged for potential issues, it undergoes a thorough review and, if necessary, is revised or removed to ensure the integrity and reliability of our information.


Adherence to Legal and Ethical Standards

We ensure that we fully comply with legal standards and adhere to the highest principles of journalism ethics. This involves a meticulous review process to align our publications with relevant laws and ethical guidelines, especially concerning data privacy and protection.

Central to this process is our commitment to the General Data Protection Regulation (GDPR) and other EU regulations, which serve as a benchmark for our global operations. We integrate GDPR principles into our content, ensuring transparency, accuracy, and the safeguarding of personal data. This adherence not only aligns with legal requirements but also reinforces trust with our audience.

We have established protocols for regularly consulting with our legal team, particularly when navigating complex legal landscapes or when there are updates in legislation. This collaboration ensures that our content remains compliant with current laws and industry standards. Our legal team’s expertise is crucial in interpreting laws and regulations, guiding us to avoid legal pitfalls, and ensuring that we stay abreast of any changes in the legal environment.

Furthermore, we are committed to upholding journalism ethics in our content creation. This includes ensuring accuracy, fairness, and impartiality in our reporting, and being transparent about our sources and methodologies. By intertwining legal compliance with ethical journalism, we maintain the integrity and credibility of our cybersecurity content.


9. Testing Products and Platforms

Exhaustive Testing and Review

We detail our comprehensive process for evaluating cybersecurity products and platforms. This rigorous testing regimen is essential to provide unbiased, accurate assessments of the tools and solutions in the cybersecurity industry. Our testing process begins with a selection of products and platforms chosen based on relevance, popularity, and potential impact in the cybersecurity field.

Once selected, each product undergoes a thorough examination in a controlled environment to evaluate its performance, security features, user-friendliness, and compliance with industry standards. We employ a variety of tests, including functional testing to check the features and capabilities as claimed by the developers, security vulnerability assessments to identify any potential weaknesses or flaws, and usability testing to ensure the product is user-friendly and accessible.

In addition to technical assessments, we also consider customer feedback and industry reviews to provide a well-rounded evaluation. This holistic approach allows us to understand the product from multiple perspectives, ensuring our review is comprehensive and reliable. Finally, our findings are compiled into detailed reports, offering our audience clear, insightful, and honest reviews. This process not only helps users make informed decisions but also encourages developers to maintain high standards in their products and platforms.


10. CyberSECURITY Report

Our annual Cybersecurity Report offers an extensive overview of the latest cybersecurity threats and trends. This report is a key resource for anyone looking to stay informed about the evolving landscape of cybersecurity threats.

The Cybersecurity Report is meticulously crafted to provide comprehensive insights into current cybersecurity challenges. It encompasses a wide range of topics, including emerging threats, attack methodologies, threat actor profiles, and the impact of these threats on various sectors. Our team of experts analyzes data from multiple sources, such as security incidents, threat intelligence feeds, and industry research, to ensure a well-rounded and accurate portrayal of the cybersecurity landscape.

Each aspect of the report is designed to be both informative and accessible, catering to professionals and enthusiasts alike. We delve into complex topics, breaking them down into understandable segments, and highlight key takeaways that are relevant to a broad audience. While the report provides a thorough summary of current threats and trends, we also offer more detailed information on our dedicated Cyber Threat Report page. This page serves as a repository of in-depth analyses, detailed statistics, and comprehensive studies, allowing users to explore specific areas of interest in greater detail.


11. Webinars and Podcasts

Engaging and Informative Multimedia Content

We offer a diverse range of webinars and podcasts focusing on various cybersecurity aspects. These multimedia resources are designed to provide professionals and enthusiasts with valuable insights into cybersecurity. Our webinars and podcasts cover a wide array of topics, including emerging cybersecurity threats, best practices in the industry, and insightful analyses of current cybersecurity trends.

These sessions are led by experts in the field, including seasoned cybersecurity professionals, thought leaders, and researchers who bring a wealth of knowledge and experience. Their expertise adds significant depth to the discussions, making these sessions not only informative but also authoritative sources of information.

The content is carefully curated to ensure it’s relevant, up-to-date, and actionable. These multimedia offerings are invaluable for anyone looking to expand their understanding of cybersecurity. They serve as a platform for learning, discussion, and networking, offering insights and perspectives that are crucial for both seasoned professionals and those new to the field.


12. Security Lab Insights

Cutting-Edge Research from Our Security Lab

Our Security Lab is crucial in investigating new threats and developing advanced security measures, positioning itself at the forefront of cybersecurity research and innovation. By employing the latest technologies and methodologies, the lab’s team of experts conducts in-depth research to understand these threats better. This includes dissecting malware, tracking cybercriminal activities, and studying the evolving tactics and techniques used in cyber attacks.

Additionally, the Security Lab is instrumental in developing advanced security solutions. The team works on creating and refining tools and strategies to enhance cyber defense capabilities. This not only includes technological advancements but also involves devising new frameworks and best practices for threat mitigation and response. Visitors interested in the cutting-edge work of our Security Lab are encouraged to explore the Security Lab Insights page. Here, they can find a wealth of information, including detailed reports, analyses, and findings from the lab’s latest research. This page serves as a valuable resource for anyone looking to stay informed about the latest developments and innovative solutions in the field of cybersecurity.


13. Survey

Getting Unique Data from our Community

We gather and present unique data sourced directly from our IT professionals community. This initiative is integral to understanding the pulse of the industry and capturing the insights of those at its forefront. Our surveys are meticulously designed to tap into the wealth of knowledge and experience within our community.

We pose questions that are relevant to current trends and challenges in cybersecurity, aiming to gather diverse perspectives on various topics such as emerging threats, best practices, and industry developments. The responses we receive are a goldmine of information, reflecting the collective wisdom and firsthand experiences of professionals from across the industry. We analyze this data carefully, looking for patterns, insights, and emerging trends.

This analysis is not just about numbers; it’s about understanding the story behind the data, the real-world implications for cybersecurity professionals. Once analyzed, we present this data to our audience in a clear, engaging, and accessible format. We use visual aids like charts and infographics to make the data easy to understand and actionable. Our goal is to provide our community with valuable insights that can inform their decisions and strategies in the cybersecurity landscape.


14. IT Pro Tuesday

Handy tools and resources for sysadmins & MSPs

This practical, weekly newsletter features a list of useful items that are intended to help make life easier for professional sysadmins & MSPs, as well as providing resources that can help them get better at their jobs. Thousands of subscribers have signed up to receive this practical email each week that delivers a unique list of five free, helpful technology-focused items—most of which have been recommended by fellow sysadmins.

In addition to the newsletter, this initiative includes an ever-growing database of tools, tips, articles, podcasts, scripts, cheatsheets, blogs, training resources, and whatever else comes our way that might be of interest to IT Pros. The searchable IT Pro Tuesday library is loaded with all the items that have ever been featured… a perfect way to find out about some little-known gems that have been shared by the community over the years.