Skip to content

Contributing

At LSHFT, we thrive on the collective wisdom and experience of our cybersecurity community. We welcome insightful contributions from professionals, enthusiasts, and thought leaders in the field of application security. Share your knowledge, engage with peers, and help us shape a safer digital future.

Why Contribute?

  • Visibility: Your work will be featured on a premier platform, gaining exposure to a wide audience of cybersecurity professionals.
  • Community Engagement: Engage with other experts, receive feedback, and participate in discussions.
  • Professional Growth: Enhance your reputation, expand your professional network, and position yourself as a thought leader in the industry.
  • Continuous Learning: Gain new insights as you research and write, staying at the forefront of application security trends.

Submission Rules

To maintain the highest quality of content, we have established the following rules for post submissions:

  • Originality: All submissions must be your original work and not published elsewhere.
  • Relevance: Content must pertain to application security, including but not limited to: tool reviews, best practices, case studies, security concepts, and industry trends.
  • Accuracy: Claims should be factual and backed by data or real-world experiences. Sources must be cited where applicable.
  • Clarity: Posts should be well-written and easy to understand. Avoid jargon unless explained, and keep paragraphs concise.
  • Respect: We do not accept content that is defamatory, discriminatory, or in violation of any laws or regulations.
  • Non-Promotional: While we welcome product reviews and comparisons, posts should not be promotional or advertorial in nature.

Types of Posts We’re Looking For

We are interested in a variety of post types, including but not limited to:

  • In-Depth Tool Reviews: Hands-on analyses of application security tools, with insights into usability, features, and effectiveness.
  • How-To Guides: Step-by-step instructions that provide actionable advice on implementing security practices or using tools.
  • Opinion Pieces: Thought-provoking essays on trends, future predictions, or philosophical aspects of application security.
  • Case Studies: Real-world examples of application security successes or failures, with a detailed examination of lessons learned.
  • Comparative Analyses: Comparisons of methodologies, tools, or practices, offering a balanced view of pros and cons.
  • Research Summaries: Breakdowns of recent application security research papers or findings in a way that is accessible to practitioners.

How to Submit

Ready to share your insights with our community? Here’s how to get started:

  1. Sign Up: Fill out our contributor form to create your contributor profile.
  2. Write: Draft your post, adhering to our guidelines and focusing on delivering value to our readers.
  3. Submit: Send us your draft via the submission form on your contributor profile page.
  4. Review: Our editorial team will review your submission and may provide feedback or request revisions.
  5. Publish: Once approved, we’ll schedule your post for publication.

We look forward to your valuable contributions. Together, we can advance the conversation on application security and make a collective impact on the field.

Join us—share your knowledge, and let’s build a secure future.