Mirren McDade is a senior writer and journalist at Expert Insights, spending each day researching, writing, editing and publishing content, covering a variety of topics and solutions, and interviewing industry experts.
She is an experienced copywriter with a background in a range of industries, including cloud business technologies, cloud security, information security and cyber security, and has conducted interviews with several industry experts.
Mirren holds a First Class Honors degree in English from Edinburgh Napier University.
Comprehensive guide to enterprise identity platforms for hybrid and multi-cloud environments
Explore the top Legal Practice Management Software solutions offering features including matter management, billing, and vendor management to streamline legal department operations and improve efficiency.
We spoke to OpenText’s EVP of Cybersecurity Engineering, Muhi Majzoub, at the 2025 OpenText World conference in Nashville.
Discover the top Microsoft Entra ID backup solutions. Explore their capabilities and features like storage and retention, encryption, and granular recovery.
90% of all data breaches stem from impersonation or spoofing based phishing attacks. Explore the best solutions for tackling these threats.
Explore the zero-trust security model and discover interesting statistics on the market, the implementation, and the use cases.
Explore vulnerability management and discover best practices for keeping your organizations secured.
Discover key statistic on the usage and security capabilities of VPNs.
Discover how to make enterprise VPN’s work for your organization.
How to choose the right Enterprise VPN software.
You’ve heard of Zero Trust and you’ve considered using a VPN, but how do they compare, and can you substitute one for the other?
We mapped CISA's zero trust pillars to a phased IAM deployment roadmap your team can start using this quarter.
Discover Single Sign-One (SSO), explore current market statistics, and understand why you should consider implementing it.
A compilation of the latest and relevant statistics regarding multi-factor authentication, its importance, and the wider threat landscape.
Discover the top LastPass alternatives on the password management market. Explore features such as encrypted password vaults, secure password sharing, and auto-fill browser extensions.
Discover the best alternatives to Mimecast email security. Explore features such as phishing and malware protection, data loss prevention, and advanced reporting.
We put together a list of valuable password manager features you should consider prioritizing in your search for the perfect solution.
Research shows that far too many of us are still using the same password across many different accounts. We explore password reuse vulnerability, the ramifications of password recycling and why you should stop reusing passwords for good.
Discover the best framework for vulnerability management and explore the benefits of implementation.
Discover key statistics on common software vulnerabilities, the market, and predicted trends.
How does Mobile Device Management work? MDM helps organizations defend themselves against theft or unauthorized access to corporate resources and data, and protects against intellectual property loss.
Both RMM and MDM solutions aim to enhance IT management by enabling remote monitoring, streamlined administration, and improved security across devices and systems.
An RMM (Remote Monitoring and Management) strategy allows businesses to proactively monitor, manage, and secure remote IT infrastructure and devices. When thinking about implementing an RMM strategy at your organization, it is important to think how your organization can operate, ensuring that it addresses relevant security concerns, particularly with devices distributed across large areas. It...
Organizations should be aware of these key Mobile Device Management (MDM) statistics and trends currently shaping the industry.
MDM helps to secure, manage, and optimize the use of mobile devices within an organization. Discover the pros and cons of various MDM capabilities.
Mobile devices have become common components of modern workplaces. Ensuring that these ubiquitous devices are secure and properly managed is essential to protecting sensitive company data and ensuring smooth business operations. Effective mobile security requires a combination of technical controls, employee training, and continuous monitoring to detect and mitigate potential risks. In addition to these foundational...
by Mirren McDade
Assess the top Risk Management Solutions offering risk identification, assessment, and mitigation features to proactively manage and mitigate risks across projects and operations.
Expert Insights interviews Saket Modi, CEO and Co-Founder of Safe Security, to discuss the importance of cyber risk quantification.
Explore the best email archiving solutions on the market that are compatible with Microsoft 365.
Compare the Top Landing Page Building Solutions. Explore key features like drag-and-drop editing, A/B testing, and customizable templates.
CVSS measures severity, not risk. A vulnerability prioritization strategy built on exploitability, asset context, and business impact will always outperform one that sorts by score.
How can Managed Detection and Response (MDR) improve your organization’s security posture.