Mirren McDade Journalist & Content Writer

Mirren McDade is a senior writer and journalist at Expert Insights, spending each day researching, writing, editing and publishing content, covering a variety of topics and solutions, and interviewing industry experts.

She is an experienced copywriter with a background in a range of industries, including cloud business technologies, cloud security, information security and cyber security, and has conducted interviews with several industry experts.

Mirren holds a First Class Honors degree in English from Edinburgh Napier University.

Articles By: Mirren McDade

208 results
10 Best Alternatives To Microsoft Entra ID
Shortlists

Best Alternatives To Microsoft Entra ID

Comprehensive guide to enterprise identity platforms for hybrid and multi-cloud environments

Mirren McDade by Mirren McDade
May 11, 2026
Best Legal Practice Management Software
Shortlists

Best Legal Practice Management

Explore the top Legal Practice Management Software solutions offering features including matter management, billing, and vendor management to streamline legal department operations and improve efficiency.

Mirren McDade by Mirren McDade
May 7, 2026
Interview: Re-Engineering Cybersecurity for the AI-Driven Enterprise
Interviews

Interview: Re-Engineering Cybersecurity for the AI-Driven Enterprise

We spoke to OpenText’s EVP of Cybersecurity Engineering, Muhi Majzoub, at the 2025 OpenText World conference in Nashville.

Mirren McDade by Mirren McDade
May 7, 2026
Top 8 Backup Solutions for Microsoft Entra ID
Shortlists

Backup For Microsoft Entra ID

Discover the top Microsoft Entra ID backup solutions. Explore their capabilities and features like storage and retention, encryption, and granular recovery.

Mirren McDade by Mirren McDade
May 6, 2026
Best Anti Impersonation And Spoofing Solutions
Shortlists

Best Anti Impersonation And Spoofing Solutions

90% of all data breaches stem from impersonation or spoofing based phishing attacks. Explore the best solutions for tackling these threats.

Mirren McDade by Mirren McDade
May 6, 2026
Zero Trust Adoption Statistics and Trends in 2025
Articles

Zero Trust Adoption Statistics and Trends in 2025

Explore the zero-trust security model and discover interesting statistics on the market, the implementation, and the use cases.

Mirren McDade by Mirren McDade
May 6, 2026
Best Ways to Track and Manage Vulnerabilities in Your Organization
Articles

Best Ways to Track and Manage Vulnerabilities in Your Organization

Explore vulnerability management and discover best practices for keeping your organizations secured.

Mirren McDade by Mirren McDade
May 6, 2026
VPN Usage and Security Statistics and Trends
Articles

VPN Usage and Security Statistics and Trends

Discover key statistic on the usage and security capabilities of VPNs.

Mirren McDade by Mirren McDade
May 6, 2026
How to Set Up an Enterprise VPN: A Step-by-Step Guide
Articles

How to Set Up an Enterprise VPN: A Step-by-Step Guide

Discover how to make enterprise VPN’s work for your organization.

Mirren McDade by Mirren McDade
May 6, 2026
Enterprise VPNs Buyers’ Guide 2026
Articles

Enterprise VPNs Buyers’ Guide 2026

How to choose the right Enterprise VPN software.

Mirren McDade by Mirren McDade
May 6, 2026
Does Zero Trust Replace VPN? A Detailed Comparison
Articles

Does Zero Trust Replace VPN? A Detailed Comparison

You’ve heard of Zero Trust and you’ve considered using a VPN, but how do they compare, and can you substitute one for the other?

Mirren McDade by Mirren McDade
May 6, 2026
Zero Trust IAM: A 4-Phase Roadmap From Perimeter to Continuous Verification
Articles

Zero Trust IAM: A 4-Phase Roadmap From Perimeter to Continuous Verification

We mapped CISA's zero trust pillars to a phased IAM deployment roadmap your team can start using this quarter.

Mirren McDade by Mirren McDade
May 6, 2026
Single Sign-On in 2025: A Deep Dive into SSO Stats & Security Trends
Articles

Single Sign-On in 2025: A Deep Dive into SSO Stats & Security Trends

Discover Single Sign-One (SSO), explore current market statistics, and understand why you should consider implementing it.

Mirren McDade by Mirren McDade
May 6, 2026
Multi-Factor Authentication (MFA) Statistics You Need To Know In 2025
Articles

Multi-Factor Authentication (MFA) Statistics You Need To Know In 2025

A compilation of the latest and relevant statistics regarding multi-factor authentication, its importance, and the wider threat landscape.

Mirren McDade by Mirren McDade
May 6, 2026
Best Alternatives To LastPass
Shortlists

Best Alternatives To LastPass

Discover the top LastPass alternatives on the password management market. Explore features such as encrypted password vaults, secure password sharing, and auto-fill browser extensions.

Mirren McDade by Mirren McDade
May 6, 2026
The Top 10 Mimecast Alternatives For Email Security
Shortlists

Best Mimecast Email Security Alternatives

Discover the best alternatives to Mimecast email security. Explore features such as phishing and malware protection, data loss prevention, and advanced reporting.

Mirren McDade by Mirren McDade
May 6, 2026
8 Features To Look For When Choosing A Password Management Solution
Articles

8 Features To Look For When Choosing A Password Management Solution

We put together a list of valuable password manager features you should consider prioritizing in your search for the perfect solution.

Mirren McDade by Mirren McDade
May 6, 2026
5 Reasons To Avoid Password Reuse
Articles

5 Reasons To Avoid Password Reuse

Research shows that far too many of us are still using the same password across many different accounts. We explore password reuse vulnerability, the ramifications of password recycling and why you should stop reusing passwords for good.

Mirren McDade by Mirren McDade
May 6, 2026
What is the Best Framework for Vulnerability Management
Articles

What is the Best Framework for Vulnerability Management

Discover the best framework for vulnerability management and explore the benefits of implementation.

Mirren McDade by Mirren McDade
May 6, 2026
Software Vulnerability Statistics And Trends In 2025
Articles

Software Vulnerability Statistics And Trends In 2025

Discover key statistics on common software vulnerabilities, the market, and predicted trends.

Mirren McDade by Mirren McDade
May 6, 2026
What Is Mobile Device Management And How Does It Work?
Articles

What Is Mobile Device Management And How Does It Work?

How does Mobile Device Management work? MDM helps organizations defend themselves against theft or unauthorized access to corporate resources and data, and protects against intellectual property loss.

Mirren McDade by Mirren McDade
May 6, 2026
RMM vs. MDM: Key Differences and Use Cases
Articles

RMM vs. MDM: Key Differences and Use Cases

Both RMM and MDM solutions aim to enhance IT management by enabling remote monitoring, streamlined administration, and improved security across devices and systems.

Mirren McDade by Mirren McDade
May 6, 2026
RMM Strategy Deep Dive: How to Protect & Manage Employee Devices Effectively
Articles

RMM Strategy Deep Dive: How to Protect & Manage Employee Devices Effectively

An RMM (Remote Monitoring and Management) strategy allows businesses to proactively monitor, manage, and secure remote IT infrastructure and devices. When thinking about implementing an RMM strategy at your organization, it is important to think how your organization can operate, ensuring that it addresses relevant security concerns, particularly with devices distributed across large areas. It...

Mirren McDade by Mirren McDade
May 6, 2026
25+ Stats And Trends For Mobile Device Management (MDM) In 2025
Articles

25+ Stats And Trends For Mobile Device Management (MDM) In 2025

Organizations should be aware of these key Mobile Device Management (MDM) statistics and trends currently shaping the industry.

Mirren McDade by Mirren McDade
May 6, 2026
What Problems Does Mobile Device Management (MDM) Solve? Pros and Cons Explained
Articles

What Problems Does Mobile Device Management (MDM) Solve? Pros and Cons Explained

MDM helps to secure, manage, and optimize the use of mobile devices within an organization. Discover the pros and cons of various MDM capabilities.

Mirren McDade by Mirren McDade
May 6, 2026
How to Secure & Manage Mobile Devices: A Deep Dive into Best Practices
Articles

How to Secure & Manage Mobile Devices: A Deep Dive into Best Practices

Mobile devices have become common components of modern workplaces. Ensuring that these ubiquitous devices are secure and properly managed is essential to protecting sensitive company data and ensuring smooth business operations. Effective mobile security requires a combination of technical controls, employee training, and continuous monitoring to detect and mitigate potential risks. In addition to these foundational...

Mirren McDade by Mirren McDade
May 6, 2026
The Top 10 Risk Management Solutions
Shortlists

Best Risk Management Solutions (RMS)

Assess the top Risk Management Solutions offering risk identification, assessment, and mitigation features to proactively manage and mitigate risks across projects and operations.

Mirren McDade by Mirren McDade
May 6, 2026
Interview: Safe Security’s Co-Founder And CEO Talks Cyber Risk Quantification And Improving Business Communication
Interviews

Interview: Safe Security’s Co-Founder And CEO Talks Cyber Risk Quantification And Improving Business Communication

Expert Insights interviews Saket Modi, CEO and Co-Founder of Safe Security, to discuss the importance of cyber risk quantification.

Mirren McDade by Mirren McDade
May 6, 2026
Best Email Archiving Solutions For Microsoft 365
Shortlists

Best Email Archiving Solutions For Microsoft 365

Explore the best email archiving solutions on the market that are compatible with Microsoft 365.

Mirren McDade by Mirren McDade
May 6, 2026
Best 10 Landing Page Building Solutions
Shortlists

Best Landing Page Building Solutions

Compare the Top Landing Page Building Solutions. Explore key features like drag-and-drop editing, A/B testing, and customizable templates.

Mirren McDade by Mirren McDade
May 6, 2026
Vulnerability Prioritization: Why CVSS Scores Alone Aren’t Enough
Articles

Vulnerability Prioritization: Why CVSS Scores Alone Aren’t Enough

CVSS measures severity, not risk. A vulnerability prioritization strategy built on exploitability, asset context, and business impact will always outperform one that sorts by score.

Mirren McDade by Mirren McDade
May 6, 2026
Does Managed Detection and Response (MDR) Really Work?
Articles

Does Managed Detection and Response (MDR) Really Work?

How can Managed Detection and Response (MDR) improve your organization’s security posture.

Mirren McDade by Mirren McDade
May 6, 2026