"Top50vpn" is a completely independent project that is fully free to use. To keep the unbiased site running & fighting the online privacy battle, please support us by donating. It would be highly appreciated!

Contributed by:  Dave Hatter: Cybersecurity Expert & Software Engineer

Dave Hatter

Cybersecurity Expert & Software Engineer

Dave is an accomplished, award-winning technology professional and servant leader with more than 25 years’ experience as a software engineer, project manager, and instructor. His entire career has been focused on software development and cybersecurity, during which he already delivered more than 200 successful software solutions and currently works as a cybersecurity consultant at Intrust IT, where he helps clients to improve their cybersecurity hygiene. Dave has earned numerous industry certifications including CISSP, CSSLP, CCSP, Security+, Network+, PMP, PMI-ACP, PMI-PBA, PSM 1, PSD 1, and ITIL Foundation V3 and holds a BS in Information Systems from NKU. He has written or contributed to 12 technology books and more than 100 technology-related articles for various publications including the Cincinnati Business Courier, the Boston Business Journal, and the Kentucky Post. Additionally, Dave has been quoted in many publications including The Wall Street Journal, MSNBC, Business Insider, and many others.

 

 

 

Contributed by:  Rameez Ghayas Usmani: Digital Marketing Executive at PureVPN

Rameez Ghayas Usmani

Digital Marketing Executive at PureVPN

Rameez Ghayas Usmani is a digital marketing and cybersecurity expert, with experience in the fields of Artificial Intelligence and Machine Learning. Rameez is currently working as a Digital Marketing Executive at PureVPN. Holding a Bachelor’s degree in Computer Science, Rameez has quickly established himself as a cybersecurity thought leader thanks to his work related to VPN implementation. Moreover, he has worked with several well-renowned companies to help them set up their remote VPN connections, guaranteeing anonymity, and safety for all their digital activities as a result. Rameez loves to code, travel, read books, and occasionally writes to spread his knowledge via blogs and discussions.

 

 

Contributed by:  Greg Scott: Cybersecurity Professional & Author

Greg Scott

Cybersecurity Professional & Author

Greg Scott is a published author and veteran of the tumultuous IT industry. Greg believes that the public deserves to know: we don’t need to be sitting ducks for cyberattacks. That's why he decided to do something about it and published “Bullseye Breach: Anatomy of an Electronic Break-In” in 2015 to show how an ad-hoc team in Minneapolis stopped overseas attackers after they stole 40 million customer credit card numbers from a fictional retailer, Bullseye Stores, during a busy Christmas shopping season. In “Virus Bomb”, published in 2019, after nobody heeded his warnings, a bald-headed, middle-aged IT contractor uncovered the largest cyberattack in history and saved millions of lives from the follow-on biological attack. Start reading either novel and you won’t want to put them down. According to Greg, sometimes we can use fiction to present truth better than the news. You can find more about Greg's novels here.

 

Contributed by:  John Watkins: vCIO at Capital Business Systems

John Watkins

vCIO at Capital Business Systems

John is vCIO at Capital Business Systems - a large IT provider in the Midwest - as well as an accomplished MSP professional with over a decade of experience in SMB Technologies, Cyber Security and IT Management Processes. Over the course of his career, John has gained hands-on experience with various methods of VPN implementation, including small workgroups using free VPN software, SMB firewalls using integrated VPN features along with remote VPN appliances, and even large purpose-built VPN concentrators that take up 3u’s of rack space.

Contributed by:  Mark Soto: Cybersecurity Expert,  Owner of Cybericus

Mark Soto

Cybersecurity Expert, Owner of Cybericus

As the owner of Cybericus - a cybersecurity firm in Milwaukee, Wisconsin, Mark Soto specializes in ransomware prevention and data recovery. He has a Bachelor's degree in Computer Science from UW-Milwaukee. With the huge increase of ransomware attacks that have occurred over the past years,
Mark and his company focuses on stopping the attacks and helping customers who have been victims
of these attacks get their data back.

Contributed by:  Steve Tcherchian: CISO at XYPRO

Steve Tcherchian

CISO at XYPRO

Steve is Chief Information Security Officer at XYPRO, a leading cybersecurity analytics company. He is on the ISSA CISO Advisory Board, the NonStop Under 40 executive board and is part of the ANSI X9 Security Standards Committee. He is a regular contributor to and presenter at the EC-Council. With almost 20 years in the cybersecurity field, Steve is responsible for strategy, innovation and development of XYPRO’s security product line as well as overseeing XYPRO’s risk, compliance and security to ensure the best experience to customers in the Mission-Critical computing marketplace. Steve is often quoted in major media on cybersecurity issues and events.

Contributed by:  Paul Lipman: CEO at BullGuard

Paul Lipman

CEO at BullGuard

Paul Lipman is CEO of BullGuard, an award-winning cybersecurity company focused on the consumer and small business markets. He has extensive experience building and leading security and consumer technology companies and is a recognized thought leader on cybersecurity, data privacy, and IoT. Before joining BullGuard, Paul was CEO at iSheriff, a recognized cloud security innovator acquired by Mimecast. Prior to this, he held the CEO role for Total Defense, a high growth consumer security business, which was acquired by Untangle. Paul has also held leadership positions at Webroot, Keynote Systems and Accenture. Paul holds an MBA from Stanford and a Bachelor's in Physics from Manchester University. He is also a member of the Forbes Technology Council. Outside of work, Paul is an avid snowboarder, amateur astronomer, and dabbles in quantum computing. 

Contributed by:  Chase Norlin: Cybersecurity Entrepreneur, CEO of Transmosis

Chase Norlin

Cybersecurity Entrepreneur, CEO of Transmosis

Chase Norlin is the CEO of Transmosis, a nationally recognized Cyber Security Workforce Developer, and the developer of CyberOps - a military-grade cybersecurity platform designed to protect small businesses from cyber attacks. Norlin is a serial technology entrepreneur that founded the Internet's first online video-sharing platform and one of the first video search engines, photo sharing services, and video ad networks.

Contributed by:  Braden Perry: Cybersecurity Attorney

Braden Perry

Cybersecurity Attorney

Braden Perry is a litigation, regulatory and government investigations attorney with Kennyhertz Perry, LLC. Mr. Perry has the unique tripartite experience of a white-collar criminal defense and government compliance, investigations, and litigation attorney at a national law firm; a senior enforcement attorney at a federal regulatory agency; and the Chief Compliance Officer/Chief Regulatory Attorney of a global financial institution. Mr. Perry has extensive experience advising clients in federal inquiries and investigations, particularly in enforcement matters involving novel or emerging issues. He couples his technical knowledge and experience defending clients in front of federal agencies with a broad-based understanding of compliance from an institutional and regulatory perspective. 

Contributed by:  Benjamin Dynkin: Co-Founder & CEO of Atlas Cybersecurity

Benjamin Dynkin

Co-Founder & CEO of Atlas Cybersecurity

As the Co-Founder and CEO of Atlas Cybersecurity and the Co-Executive Director of the American Cybersecurity Institute, Benjamin has been fortunate to work in a broad array of situations in cybersecurity. Benjamin specializes in cybersecurity and law and, according to him, bringing together technical and operational capabilities with a strategic vision is critical to staying ahead of cyber adversaries.

Contributed by:  Dan Fusco: Cyber Security Speaker, Owner of InnerPC

Dan Fusco

Cyber Security Speaker, Owner of InnerPC

Dan Fusco is the owner of InnerPC Computer Solutions. He founded InnerPC in 2011 and has migrated many businesses to the cloud. To help support the companies and their cloud computing needs, Dan has developed an IT support desk that answers questions and provides solutions for is clients. Dan is also a guest speaker for the Chamber of Commerce and NCCPAP where he helps educate business owners on cybersecurity.

Contributed by:  David Johnson: CTO at Mulytic Labs & Founder of Clear Blue Data

David Johnson

CTO at Mulytic Labs & Founder of Clear Blue Data

David Johnson, MBA, BA Computer Science, has worked in the tech industry for 20 years leading global teams and technology initiatives in US, Europe, and APAC for companies like IBM and Sungard. He is currently Chief Technology Officer at Mulytic Labs where he leads a global team providing data and security-driven solutions to diverse customers. Also, David is the founder of Clear Blue Data, data, and technology management consultancy. David has hands-on experience with Cisco and Juniper equipment, along with emerging technology such as ZTNA and SDP.