About

Unlocked is a cybersecurity content platform for IT and security professionals — written by a team of security engineers, identity specialists, and researchers with decades of combined experience.

What is Unlocked?

Unlocked is a cybersecurity content platform built for IT professionals, security teams, and technology decision-makers. We publish in-depth guides, product comparisons, threat analysis, and practical security advice — written by practitioners, not marketers.

Every week, over 30,000 subscribers receive our newsletter covering the latest breaches, emerging threats, and the tools that matter. On the site, we maintain a growing library of evergreen resources: authentication guides, password manager comparisons, identity and access management evaluations, and frameworks like NIST SP 800-63B explained in plain language.

Our goal is simple: help security professionals make better decisions faster. Whether you're evaluating MFA solutions for an enterprise rollout or explaining 2FA to your board, Unlocked gives you the research so you don't have to start from scratch.

Who publishes Unlocked?

Unlocked is published by EveryKey Inc., a cybersecurity company specializing in presence-based access management. While EveryKey builds security products, Unlocked operates with full editorial independence — EveryKey's own products receive no preferential treatment in our coverage. Our Editorial Policy documents this commitment in detail.

Our team

Unlocked is written and reviewed by a team of security engineers, identity specialists, and content professionals with direct experience building and deploying the systems we cover.

Editorial

Nick Marsteller — Head of Content. Background in tech and startup content management. Nick has driven digital content and branding across SaaS and cybersecurity companies.

Florian Radke — SEO and content strategy. Manages the Unlocked content operation and optimization pipeline.

Security Engineering

Kaden Rourke — Senior Security Engineer with 12+ years designing secure authentication systems used by millions. Kaden has led identity engineering at venture-backed SaaS companies and contributed to open-source cryptographic libraries.

Ethan Cole — Senior Security Engineer with 10+ years securing SaaS and cloud infrastructure. Specializes in IAM, anomaly detection, and secure pipelines.

Alex Rivera — Security Platform Engineer focused on identity architecture and modern authentication. Builds systems at the intersection of usability and security.

Kevin Patel — Threat intelligence and identity security specialist. Bridges technical vulnerabilities and human psychology — focused on cryptographically-backed trust and anomaly detection.

Platform & Infrastructure

Samuel Ortiz — Platform and backend engineer focused on identity, telemetry, and security automation. Works across Python, Go, and cloud-native tooling.

Kwaku Boohene — Software engineer with 5+ years building scalable systems. Specializes in authentication, SSO, and web security.

Jordan Hale — Backend and reliability engineer focused on secure access and cloud-native infrastructure.

Gerson Motta — Senior Software Engineer with 10+ years building enterprise platforms and IoT integrations.

AI & Research

Hafid Hamadene, PhD — PhD in AI with 20+ years in product development and SaaS. Turns complex ideas into market-ready solutions at the intersection of AI, IoT, and security.

Business & Operations

Mike McDonald — Cybersecurity Solutions Consultant with 20 years of entrepreneurial experience. Takes a people-first approach to access management.

John Botros — CFO with deep expertise in SaaS, tech, and cybersecurity finance. Has guided high-growth companies through expansion and fundraising.

Jay Berning — Project Manager with 20+ years in product development and software engineering.

Our standards

Every article on Unlocked follows a consistent set of editorial standards:

  • Accuracy first. We verify facts, link to primary sources, and correct errors promptly when we find them.
  • No pay-for-placement. Product rankings and recommendations are based on features, security, usability, and value — not advertising relationships.
  • Regular updates. Cybersecurity moves fast. We review and update our guides to reflect current threats, tools, and best practices.
  • Affiliate transparency. Some comparison guides contain affiliate links. These never influence our editorial recommendations. Read our full Editorial Policy for details.

Contact

Questions about our content, corrections, or partnership inquiries:

EveryKey Inc.
Email: editorial@everykey.com