about us
Get in Touch with GOWTN
At GOWTN.COM, we believe that cybersecurity is fundamentally a community effort. The digital landscape evolves rapidly, and staying ahead of emerging threats requires collaboration, knowledge sharing, and open dialogue between security professionals, researchers, and the broader Canadian tech community.
Whether you’re a fellow cybersecurity practitioner looking to share insights, a journalist seeking expert commentary on the latest security developments, or simply someone with questions about protecting your digital assets, we’re here to connect and contribute to Canada’s cybersecurity ecosystem.
About the Team Behind GOWTN
Lead Security Researcher: Marcus Chen
Marcus brings over twelve years of experience in cybersecurity, specializing in threat intelligence and incident response. After completing his Master’s degree in Computer Science at the University of Waterloo, he spent six years working with the Canadian Centre for Cyber Security before transitioning to the private sector. His expertise spans network security, malware analysis, and emerging threats in the IoT ecosystem.
Marcus is particularly passionate about bridging the gap between academic cybersecurity research and real-world implementation. He regularly speaks at Canadian security conferences including SecTor and NorthSec, and has contributed to several open-source security tools widely adopted by the Canadian financial services sector.
When he’s not analyzing the latest APT campaigns or reverse-engineering suspicious binaries, Marcus enjoys hiking in the Canadian Rockies and experimenting with home automation security—often discovering vulnerabilities in his own smart home setup that become material for future blog posts.
Contact Information:
- Email: marcus.chen@gowtn.com
- Signal: +1-647-555-0892
- Jabber/XMPP: mchen@secure.xmpp.ca
- PGP Key ID: 4F2A 8B17 E394 C6D8 9A2F 1B45 7E93 D102 5C48 A6B3
Our Mission and Editorial Approach
GOWTN.COM was founded on the principle that effective cybersecurity begins with accessible, accurate information. Too often, security guidance is either overly technical for general audiences or oversimplified to the point of being ineffective. We strive to find that crucial middle ground—providing actionable insights that security professionals can implement while remaining comprehensible to IT managers, business leaders, and privacy-conscious individuals.
Our editorial focus centers on threats and solutions particularly relevant to the Canadian context. This includes coverage of privacy legislation impacts, analysis of threats targeting Canadian infrastructure, and examination of how global cybersecurity trends manifest within our unique regulatory and business environment. We maintain relationships with researchers at major Canadian universities including McGill University, University of Calgary, Simon Fraser University, and York University, practitioners in both public and private sectors, and international security vendors with significant Canadian operations.
We’re committed to editorial independence and transparency. When we review security products or services, we disclose any relationships or potential conflicts of interest. Our threat analysis draws from multiple sources, and we always strive to provide context about confidence levels and potential biases in the intelligence we present.
Collaboration Opportunities
The cybersecurity field benefits tremendously from diverse perspectives and collaborative research. We actively seek opportunities to work with:
Academic Researchers: If you’re conducting cybersecurity research at a Canadian university and looking to bridge the gap between academic findings and practical implementation, we’d love to discuss collaboration opportunities. We maintain active relationships with research teams at University of Toronto, University of British Columbia, Carleton University, Concordia University, and Royal Military College of Canada. We’re particularly interested in research related to privacy-preserving technologies, critical infrastructure protection, and emerging threats in the Canadian context.
Industry Practitioners: Frontline security professionals often have insights that don’t make it into formal threat intelligence reports. If you’re dealing with interesting attack patterns, novel defense strategies, or implementation challenges, we’re always interested in hearing about real-world experiences that could benefit the broader community.
Policy and Regulatory Experts: Canada’s cybersecurity landscape is shaped by evolving privacy laws, critical infrastructure requirements, and international cooperation frameworks. We welcome insights from legal experts, policy researchers, and regulatory professionals who can help our audience understand how these developments impact practical security implementations.
Content Submission Guidelines
We welcome guest contributions from the Canadian cybersecurity community. Our editorial standards prioritize accuracy, practical value, and clear communication. Submissions should include:
- Technical Accuracy: All technical claims should be verifiable and include appropriate references or evidence
- Canadian Relevance: Content should address challenges, regulations, or opportunities specific to the Canadian market
- Practical Application: Readers should be able to implement insights or recommendations in their own environments
- Clear Attribution: Any research, tools, or methodologies developed by others must be properly credited
We particularly encourage submissions that challenge conventional wisdom, present novel approaches to common problems, or provide post-mortem analysis of significant security incidents (with appropriate anonymization where necessary).
Media and Speaking Inquiries
Marcus is available for media commentary on cybersecurity developments affecting Canada. Areas of expertise include:
- Threat Intelligence and Attribution: Analysis of APT campaigns, ransomware trends, and nation-state activities
- Critical Infrastructure Security: Threats and defenses for energy, transportation, and telecommunications sectors
- Privacy and Regulatory Compliance: Impacts of PIPEDA, provincial privacy laws, and international frameworks
- Incident Response: Best practices for detection, containment, and recovery from security breaches
- Emerging Technologies: Security implications of AI, IoT, cloud adoption, and digital transformation initiatives
For speaking engagements, media interviews, or expert commentary, please reach out via the contact information provided above. We typically respond to media inquiries within 4-6 hours during business hours.
Security and Privacy Commitment
We take the security and privacy of our communications seriously. All email communications are encrypted in transit, and we strongly encourage the use of encrypted channels for sensitive discussions. Our PGP key is available through major keyservers and is cross-signed by several prominent members of the Canadian cybersecurity community.
We do not retain logs of encrypted communications longer than necessary for operational purposes, and we will never share contact information or communication details with third parties without explicit consent, except as required by applicable Canadian law.
For particularly sensitive communications, we recommend using our Signal or Jabber contacts, both of which provide end-to-end encryption and forward secrecy. When using our Jabber service, please verify our certificate fingerprint: SHA-256: A7:3F:2D:8E:B1:45:C9:7A:D2:18:F6:32:E8:94:A5:C3:71:86:B4:29:57:D8:E1:4F:A6:73:92:B8:15:C7:38:E6
GOWTN.COM is committed to advancing cybersecurity knowledge and practice across Canada. We believe that a more secure digital environment benefits everyone, and we’re dedicated to contributing our expertise to that shared goal.