Caitlin Harris is the Deputy Head of Content at Expert Insights. As an experienced content writer and editor, Caitlin helps cybersecurity leaders to cut through the noise in the cybersecurity space with expert analysis and insightful recommendations.
Prior to Expert Insights, Caitlin worked at QA Ltd, where she produced award-winning technical training materials, and she has also produced journalistic content over the course of her career.
Caitlin has 8 years of experience in the cybersecurity and technology space, helping technical teams, CISOs, and security professionals find clarity on complex, mission critical topics like security awareness training, backup and recovery, and endpoint protection.
Caitlin also hosts the Expert Insights Podcast and co-writes the weekly newsletter, Decrypted.
We compare Microsoft 365 and Google Workspace—the two market leaders in productivity application suites—and take a look at their key features and benefits.
PROOFPOINT PROTECT 2025, NASHVILLE – The cybersecurity industry is facing one of its most profound shifts since the rise of the cloud. At this year’s Proofpoint Protect conference, one concept dominated conversations above all others: the agentic workspace. Just as the digital workspace has transformed business operations over the past two decades, the agentic workspace represents...
What is the difference between a VPN and a ZTNA solution, and which one does your business need?
Discover the best Zero Trust Network Access (ZTNA) solutions with features like app micro-segmentation, user and device authentication, and access policy configuration.
Paul Martini, CEO of iboss, discusses why Zero Trust is the best approach to tackling today’s cyberthreats, and how organizations can adopt Zero Trust technologies and principles to meet the Biden Administration’s recent guidelines.
Discover the top best business VPNs. Explore features such as device compatibility, encryption, scalability, central management and activity management.
Andrew Woodhouse, CIO at RealVNC, discusses the benefits of a modern remote access solution over legacy VPNs, how to choose a remote access solution, and why businesses shouldn’t trust vendors when they say they’re secure.
What is a virtual private network (VPN), how do they work, and how can you choose the best VPN app for your business?
Jim Taylor, Chief Product Officer at RSA, discusses the biggest roadblocks when it comes to implementing authentication, the journey to passwordless authentication, and what “zero trust” really means.
Expert Insights speaks to Aubrey Turner of Ping Identity to discover how organizations can embark on the journey to passwordless authentication and secure their user accounts against credential-related breaches.
Expert Insights speaks to Joe Palmer of iProov Inc. to discover how organizations can use biometric authentication to secure access to employee and end user accounts.
Paul Trulove, CEO at SecureAuth, discusses the death of passwords, the age of frictionless authentication, and the importance of user experience versus security when it comes to modern authentication solutions.
Ronnie Manning, Chief Marketing Officer at Yubico, discusses the journey to passwordless authentication, the importance of user experience when implementing MFA, and phishing-resistant MFA.
How to protect your organization against credential theft and account takeover attacks with MFA.
What are brute force password crack attacks, what makes them so effective, and how can you defend your organization against them?
Discover the top password policy enforcement software for businesses. Explore features such as password requirement configuration, blacklisting and Active Directory synchronization.
We explore some of the most significant password-related breaches of the last year, including their causes and consequences, to help stop you from falling victim to a similar attack.
Expert Insights speaks to Darren Guccione of Keeper Security to discover how organizations can keep their accounts safe from one of the most prevalent types of cybercrime they’re facing today: credential theft
Sponsored Content: How to protect your business passwords in the workplace – whether your employees are in the office, at home, or on the go.
Darren Guccione, Chief Executive Officer and Co-Founder at Keeper Security, discusses the importance of password management in an increasingly passwordless world, and how security should lie at the core of identity security solutions—and the vendors that create them.
Darren Guccione, Chief Executive Officer and Co-Founder at Keeper Security, discusses the importance of password security in a world that’s becoming increasingly passwordless.
Find out how to create a secure password policy and manifest a culture of security, from setting basic complexity requirements through to implementing technical solutions
Sponsored Content: We compare Dashlane and Google Password Manager, two leading password management solutions, and take a look at their key features and benefits.
Discover the best critical event management solutions. Explore features such as risk assessment, real-time monitoring, communication tools, and incident response management.
How to choose the right network observability solution.
How to choose the right network monitoring and diagnostics solution.
Expert Insights speaks to Eldad Chai, co-founder and CEO of Satori to discover how organizations can better manage and secure their cloud data.
Chris Rouland, CEO of Phosphorus Cybersecurity, discusses the biggest IoT offenders in the workplace, the risk of connecting personal IoT devices to the corporate network, and how businesses can improve their IoT security.
How to choose the right cloud orchestration solution.
Kion’s Randall Shore, VP of Delivery and Support, discusses how organizations can achieve true cloud enablement.
How to choose the right Unified Endpoint Management software.
Discover the best Mobile Device Management (MDM) solutions for macOS. Explore features such as remote monitoring, app management, and device status reporting.