Caitlin Harris Deputy Head Of Content

Caitlin Harris is the Deputy Head of Content at Expert Insights. As an experienced content writer and editor, Caitlin helps cybersecurity leaders to cut through the noise in the cybersecurity space with expert analysis and insightful recommendations.

Prior to Expert Insights, Caitlin worked at QA Ltd, where she produced award-winning technical training materials, and she has also produced journalistic content over the course of her career.

Caitlin has 8 years of experience in the cybersecurity and technology space, helping technical teams, CISOs, and security professionals find clarity on complex, mission critical topics like security awareness training, backup and recovery, and endpoint protection.

Caitlin also hosts the Expert Insights Podcast and co-writes the weekly newsletter, Decrypted.

Articles By: Caitlin Harris

311 results
Microsoft 365 Vs. Google Workspace: A Complete Comparison
Articles

Microsoft 365 Vs. Google Workspace: A Complete Comparison

We compare Microsoft 365 and Google Workspace—the two market leaders in productivity application suites—and take a look at their key features and benefits.

Caitlin Harris by Caitlin Harris
May 6, 2026
Securing The Agentic Workspace: Collaboration And Innovation In A Market Set To Boom
News

Securing The Agentic Workspace: Collaboration And Innovation In A Market Set To Boom

PROOFPOINT PROTECT 2025, NASHVILLE – The cybersecurity industry is facing one of its most profound shifts since the rise of the cloud. At this year’s Proofpoint Protect conference, one concept dominated conversations above all others: the agentic workspace.  Just as the digital workspace has transformed business operations over the past two decades, the agentic workspace represents...

Caitlin Harris by Caitlin Harris
May 6, 2026
VPN Vs. ZTNA: What’s The Difference?
Articles

VPN Vs. ZTNA: What’s The Difference?

What is the difference between a VPN and a ZTNA solution, and which one does your business need?

Caitlin Harris by Caitlin Harris
May 6, 2026
Best Zero Trust Network Access (ZTNA) Solutions
Shortlists

Best Zero Trust Network Access (ZTNA) Solutions

Discover the best Zero Trust Network Access (ZTNA) solutions with features like app micro-segmentation, user and device authentication, and access policy configuration.

Caitlin Harris by Caitlin Harris
May 6, 2026
Interview: Why Zero Trust Is The Most Effective Approach To Cybersecurity
Interviews

Interview: Why Zero Trust Is The Most Effective Approach To Cybersecurity

Paul Martini, CEO of iboss, discusses why Zero Trust is the best approach to tackling today’s cyberthreats, and how organizations can adopt Zero Trust technologies and principles to meet the Biden Administration’s recent guidelines.

Caitlin Harris by Caitlin Harris
May 6, 2026
The Top Enterprise VPN Solutions
Shortlists

Best Enterprise VPN Solutions

Discover the top best business VPNs. Explore features such as device compatibility, encryption, scalability, central management and activity management.

Caitlin Harris by Caitlin Harris
May 6, 2026
Interview: Why Hybrid Organizations Need A Remote Access Solution—And How To Choose One
Interviews

Interview: Why Hybrid Organizations Need A Remote Access Solution—And How To Choose One

Andrew Woodhouse, CIO at RealVNC, discusses the benefits of a modern remote access solution over legacy VPNs, how to choose a remote access solution, and why businesses shouldn’t trust vendors when they say they’re secure.

Caitlin Harris by Caitlin Harris
May 6, 2026
How To Choose The Best VPN App For Your Business
Articles

How To Choose The Best VPN App For Your Business

What is a virtual private network (VPN), how do they work, and how can you choose the best VPN app for your business?

Caitlin Harris by Caitlin Harris
May 6, 2026
Interview: A Passwordless Future Starts With A Zero Trust Mindset
Interviews

Interview: A Passwordless Future Starts With A Zero Trust Mindset

Jim Taylor, Chief Product Officer at RSA, discusses the biggest roadblocks when it comes to implementing authentication, the journey to passwordless authentication, and what “zero trust” really means.

Caitlin Harris by Caitlin Harris
May 6, 2026
“SSO Everything And Add MFA Everywhere”: The Road To Passwordless Authentication
Interviews

“SSO Everything And Add MFA Everywhere”: The Road To Passwordless Authentication

Expert Insights speaks to Aubrey Turner of Ping Identity to discover how organizations can embark on the journey to passwordless authentication and secure their user accounts against credential-related breaches.

Caitlin Harris by Caitlin Harris
May 6, 2026
Looking Authentication In The Face
Interviews

Looking Authentication In The Face

Expert Insights speaks to Joe Palmer of iProov Inc. to discover how organizations can use biometric authentication to secure access to employee and end user accounts.

Caitlin Harris by Caitlin Harris
May 6, 2026
Interview: Why Passwords Are Dead And How Frictionless Authentication Is Replacing Them
Interviews

Interview: Why Passwords Are Dead And How Frictionless Authentication Is Replacing Them

Paul Trulove, CEO at SecureAuth, discusses the death of passwords, the age of frictionless authentication, and the importance of user experience versus security when it comes to modern authentication solutions.

Caitlin Harris by Caitlin Harris
May 6, 2026
Interview: How To Choose A Secure, User-Friendly MFA Solution
Interviews

Interview: How To Choose A Secure, User-Friendly MFA Solution

Ronnie Manning, Chief Marketing Officer at Yubico, discusses the journey to passwordless authentication, the importance of user experience when implementing MFA, and phishing-resistant MFA.

Caitlin Harris by Caitlin Harris
May 6, 2026
Business Guide To Multi-Factor Authentication (MFA)
Articles

Business Guide To Multi-Factor Authentication (MFA)

How to protect your organization against credential theft and account takeover attacks with MFA.

Caitlin Harris by Caitlin Harris
May 6, 2026
What Are Brute Force Attacks And How Can You Protect Your Organization Against Them?
Articles

What Are Brute Force Attacks And How Can You Protect Your Organization Against Them?

What are brute force password crack attacks, what makes them so effective, and how can you defend your organization against them?

Caitlin Harris by Caitlin Harris
May 6, 2026
Best Enterprise Password Policy Enforcement Software
Shortlists

Best Enterprise Password Policy Enforcement Software

Discover the top password policy enforcement software for businesses. Explore features such as password requirement configuration, blacklisting and Active Directory synchronization.

Caitlin Harris by Caitlin Harris
May 6, 2026
The Most Significant Password Breaches Of 2021
Articles

The Most Significant Password Breaches Of 2021

We explore some of the most significant password-related breaches of the last year, including their causes and consequences, to help stop you from falling victim to a similar attack.

Caitlin Harris by Caitlin Harris
May 6, 2026
Keeper Security’s CEO Explains How To Secure Your Digital Workplace
Interviews

Keeper Security’s CEO Explains How To Secure Your Digital Workplace

Expert Insights speaks to Darren Guccione of Keeper Security to discover how organizations can keep their accounts safe from one of the most prevalent types of cybercrime they’re facing today: credential theft

Caitlin Harris by Caitlin Harris
May 6, 2026
Protecting Your Passwords In The Office And Beyond
Articles

Protecting Your Passwords In The Office And Beyond

Sponsored Content: How to protect your business passwords in the workplace – whether your employees are in the office, at home, or on the go.

Caitlin Harris by Caitlin Harris
May 6, 2026
Interview: Password Security In A World Beyond Passwords
Interviews

Interview: Password Security In A World Beyond Passwords

Darren Guccione, Chief Executive Officer and Co-Founder at Keeper Security, discusses the importance of password management in an increasingly passwordless world, and how security should lie at the core of identity security solutions—and the vendors that create them.

Caitlin Harris by Caitlin Harris
May 6, 2026
Keeper Security CEO On Recovering From Breaches And The Relevance Of Password Managers In A Passwordless World
Interviews

Keeper Security CEO On Recovering From Breaches And The Relevance Of Password Managers In A Passwordless World

Darren Guccione, Chief Executive Officer and Co-Founder at Keeper Security, discusses the importance of password security in a world that’s becoming increasingly passwordless.

Caitlin Harris by Caitlin Harris
May 6, 2026
How To Create A Secure Password Policy For Your Organization
Articles

How To Create A Secure Password Policy For Your Organization

Find out how to create a secure password policy and manifest a culture of security, from setting basic complexity requirements through to implementing technical solutions

Caitlin Harris by Caitlin Harris
May 6, 2026
Dashlane Vs Google Password Manager
Articles

Dashlane Vs Google Password Manager

Sponsored Content: We compare Dashlane and Google Password Manager, two leading password management solutions, and take a look at their key features and benefits.

Caitlin Harris by Caitlin Harris
May 6, 2026
Best Critical Event Management Solutions
Shortlists

Best Critical Event Management (CEM) solutions

Discover the best critical event management solutions. Explore features such as risk assessment, real-time monitoring, communication tools, and incident response management.

Caitlin Harris by Caitlin Harris
May 6, 2026
Network Observability Buyers’ Guide 2026
Articles

Network Observability Buyers’ Guide 2026

How to choose the right network observability solution.

Caitlin Harris by Caitlin Harris
May 6, 2026
Network Diagnostics Buyers’ Guide 2026
Articles

Network Diagnostics Buyers’ Guide 2026

How to choose the right network monitoring and diagnostics solution.

Caitlin Harris by Caitlin Harris
May 6, 2026
Successful Cloud Adoption Lies In A New Operational Model: DataSecOps
Interviews

Successful Cloud Adoption Lies In A New Operational Model: DataSecOps

Expert Insights speaks to Eldad Chai, co-founder and CEO of Satori to discover how organizations can better manage and secure their cloud data.

Caitlin Harris by Caitlin Harris
May 6, 2026
Interview: How—And Why—Businesses Should Secure Their IoT Devices
Interviews

Interview: How—And Why—Businesses Should Secure Their IoT Devices

Chris Rouland, CEO of Phosphorus Cybersecurity, discusses the biggest IoT offenders in the workplace, the risk of connecting personal IoT devices to the corporate network, and how businesses can improve their IoT security.

Caitlin Harris by Caitlin Harris
May 6, 2026
Cloud Orchestration Buyers’ Guide 2026
Articles

Cloud Orchestration Buyers’ Guide 2026

How to choose the right cloud orchestration solution.

Caitlin Harris by Caitlin Harris
May 6, 2026
Cloud Enablement: Achieving The Most From Your Cloud Environment
Interviews

Cloud Enablement: Achieving The Most From Your Cloud Environment

Kion’s Randall Shore, VP of Delivery and Support, discusses how organizations can achieve true cloud enablement.

Caitlin Harris by Caitlin Harris
May 6, 2026
Unified Endpoint Management (UEM) Buyers’ Guide 2026
Articles

Unified Endpoint Management (UEM) Buyers’ Guide 2026

How to choose the right Unified Endpoint Management software.

Caitlin Harris by Caitlin Harris
May 6, 2026
Best MDM Solutions For MacOS
Shortlists

Best MDM Solutions For MacOS

Discover the best Mobile Device Management (MDM) solutions for macOS. Explore features such as remote monitoring, app management, and device status reporting.

Caitlin Harris by Caitlin Harris
May 6, 2026