Tom King Cybersecurity Analyst

Tom King is an Information Security Engineer and Junior SOC Analyst. He works with Expert Insights’ product testing team to conduct independent technical reviews of cybersecurity solutions and services across a range of software categories, including threat detection and response, email security, identity and access management, and network protection. He also analyzes market landscapes, product features, and industry trends to support the content team in delivering insightful recommendations for cybersecurity buyers. Tom holds a First-Class Honours Degree in Cybersecurity from Sheffield Hallam University, where he specialized in cybersecurity forensics, counterterrorism, and incident response.

Articles By: Tom King

36 results
User Authentication (MFA) Buyers’ Guide 2026
Articles

User Authentication (MFA) Buyers’ Guide 2026

How to choose the right User Authentication software.

Alex Zawalnyski by Alex Zawalnyski
May 6, 2026
Single Sign-On (SSO) Buyers’ Guide 2026
Articles

Single Sign-On (SSO) Buyers’ Guide 2026

How to choose the right Single Sign-On software.

Alex Zawalnyski by Alex Zawalnyski
May 6, 2026
Network Observability Buyers’ Guide 2026
Articles

Network Observability Buyers’ Guide 2026

How to choose the right network observability solution.

Caitlin Harris by Caitlin Harris
May 6, 2026
Unified Endpoint Management (UEM) Buyers’ Guide 2026
Articles

Unified Endpoint Management (UEM) Buyers’ Guide 2026

How to choose the right Unified Endpoint Management software.

Caitlin Harris by Caitlin Harris
May 6, 2026
Mobile Device Management (MDM) Buyers’ Guide 2026
Articles

Mobile Device Management (MDM) Buyers’ Guide 2026

How to choose the right mobile device management software.

Alex Zawalnyski by Alex Zawalnyski
May 6, 2026
Email Archiving Buyers’ Guide 2026
Articles

Email Archiving Buyers’ Guide 2026

How to choose the right email archiving solution.

Caitlin Harris by Caitlin Harris
May 6, 2026
Data Loss Prevention Buyers’ Guide 2026
Articles

Data Loss Prevention Buyers’ Guide 2026

How to choose the right Data Loss Prevention solution.

Caitlin Harris by Caitlin Harris
May 6, 2026
Cloud Security Buyers’ Guide 2026
Articles

Cloud Security Buyers’ Guide 2026

How to choose the right cloud security solution.

Caitlin Harris by Caitlin Harris
May 6, 2026
Dynamic Application Security Testing (DAST) Tools Buyers’ Guide 2026
Articles

Dynamic Application Security Testing (DAST) Tools Buyers’ Guide 2026

How to choose the right DAST software.

Alex Zawalnyski by Alex Zawalnyski
May 6, 2026
Container Security Buyers’ Guide 2026
Articles

Container Security Buyers’ Guide 2026

How to choose the right container security solution.

Caitlin Harris by Caitlin Harris
May 6, 2026
Cloud Native Application Protection Platform (CNAPP) Buyers’ Guide 2026
Articles

Cloud Native Application Protection Platform (CNAPP) Buyers’ Guide 2026

How to choose the right CNAPP.

Caitlin Harris by Caitlin Harris
May 6, 2026
Static Application Security Testing (SAST) Tools Buyers’ Guide 2026
Articles

Static Application Security Testing (SAST) Tools Buyers’ Guide 2026

How to choose the right SAST software.

Alex Zawalnyski by Alex Zawalnyski
May 6, 2026
Application Security Buyers’ Guide 2026
Articles

Application Security Buyers’ Guide 2026

How to choose the right application security solution.

Caitlin Harris by Caitlin Harris
May 6, 2026
API Security Buyers’ Guide 2026
Articles

API Security Buyers’ Guide 2026

How to choose the right API security solution.

Caitlin Harris by Caitlin Harris
May 6, 2026
API Gateways Buyers’ Guide 2026
Articles

API Gateways Buyers’ Guide 2026

How to choose the right API Gateway software.

Alex Zawalnyski by Alex Zawalnyski
May 6, 2026
DMARC Buyers’ Guide 2026
Articles

DMARC Buyers’ Guide 2026

How to choose the right DMARC solution.

Caitlin Harris by Caitlin Harris
Apr 10, 2026
Security Information and Events Management (SIEM) Buyers’ Guide
Articles

Security Information and Events Management (SIEM) Buyers’ Guide

How to choose the right SIEM software.

Alex Zawalnyski by Alex Zawalnyski
Mar 30, 2026
Endpoint Detection and Response (EDR) Buyers’ Guide 2026
Articles

Endpoint Detection and Response (EDR) Buyers’ Guide 2026

How to choose the right Endpoint Detection and Response software.

Caitlin Harris by Caitlin Harris
Mar 10, 2026
Microsoft 365 Backup And Recovery Buyers’ Guide 2026
Articles

Microsoft 365 Backup And Recovery Buyers’ Guide 2026

How to choose the right Microsoft 365 backup and recovery solution.

Caitlin Harris by Caitlin Harris
Mar 10, 2026
Governance, Risk, And Compliance (GRC) Buyers’ Guide 2026
Articles

Governance, Risk, And Compliance (GRC) Buyers’ Guide 2026

How to choose the right GRC solution.

Caitlin Harris by Caitlin Harris
Feb 9, 2026
Phishing Simulation And Testing Buyers’ Guide 2026
Articles

Phishing Simulation And Testing Buyers’ Guide 2026

How to choose the right phishing simulation and testing solution.

Caitlin Harris by Caitlin Harris
Dec 17, 2025
Virtual Desktop Infrastructure Buyers’ Guide 2026
Articles

Virtual Desktop Infrastructure Buyers’ Guide 2026

How to choose the right virtual desktop infrastructure solution.

Caitlin Harris by Caitlin Harris
Dec 17, 2025
Vulnerability Management Buyers’ Guide 2026
Articles

Vulnerability Management Buyers’ Guide 2026

How to choose the right vulnerability management software for your unique business needs. Assess the key features you should look out for.

Caitlin Harris by Caitlin Harris
Dec 17, 2025
Privileged Access Management (PAM) Buyers’ Guide 2026
Articles

Privileged Access Management (PAM) Buyers’ Guide 2026

How to choose the right Privileged Access Management software.

Caitlin Harris by Caitlin Harris
Dec 17, 2025
Dark Web Monitoring Buyers’ Guide 2026
Articles

Dark Web Monitoring Buyers’ Guide 2026

How to choose the right Dark Web Monitoring software.

Alex Zawalnyski by Alex Zawalnyski
Dec 17, 2025
Workplace Identity And Access Management (IAM) Buyers’ Guide 2026
Articles

Workplace Identity And Access Management (IAM) Buyers’ Guide 2026

How to choose the right IAM software.

Caitlin Harris by Caitlin Harris
Dec 17, 2025
Security Orchestration, Automation, And Response (SOAR) Buyers’ Guide 2026
Articles

Security Orchestration, Automation, And Response (SOAR) Buyers’ Guide 2026

How to choose the right SOAR software.

Caitlin Harris by Caitlin Harris
Dec 17, 2025
Customer Identity And Access Management (CIAM) Security Buyers’ Guide 2026
Articles

Customer Identity And Access Management (CIAM) Security Buyers’ Guide 2026

How to choose the right CIAM solution.

Caitlin Harris by Caitlin Harris
Dec 17, 2025
Intrusion Prevention Buyers’ Guide 2026
Articles

Intrusion Prevention Buyers’ Guide 2026

A guide to the Intrusion Prevention Systems (IPS) market.

Alex Zawalnyski by Alex Zawalnyski
Dec 17, 2025
Endpoint Security Buyers’ Guide 2026
Articles

Endpoint Security Buyers’ Guide 2026

How to choose the right endpoint security software.

Caitlin Harris by Caitlin Harris
Dec 17, 2025
Attack Surface Management Buyers’ Guide 2026
Articles

Attack Surface Management Buyers’ Guide 2026

How to choose the right Attack Surface Management solution.

Caitlin Harris by Caitlin Harris
Dec 16, 2025
Know Your Customer (KYC) Buyers’ Guide 2026
Articles

Know Your Customer (KYC) Buyers’ Guide 2026

How to choose the right KYC solution.

Caitlin Harris by Caitlin Harris
Dec 16, 2025