Writing Samples
Don’t see what you want? Ask me for content samples.
You can reach me at [email protected] for rates, availability, and details or schedule a quick chat.
- Anticipating the War’s Direction – Communications of the ACM
- BlackByte Ransomware Bites Critical Infrastructure, the San Francisco 49ers – Communications of the ACM
- A Source of Security Challenges for Years to Come – Communications of the ACM
- Leveraging Compliance with the ISA/IEC 62443 Standard for ICS – Industrial Defender
- Rushed digital transformation is creating security risks – Enterprise.NXT from HPE
- What Caused the Facebook Outage?– Communications of the ACM
- Active Defenders, a Docker, Kubernetes-based self-healing cybersecurity solution– Communications of the ACM
- Cyber Risk in Digital Transformation– Communications of the ACM
- Are We Engaged in a Cyber-war?– Communications of the ACM
- Keeping Control of the Wheel, automotive cybersecurity– Communications of the ACM
- Is 5G Opening Security Holes in the Internet of Things?– Communications of the ACM
- Cyber-securing the Home Office– Communications of the ACM
- Avoiding Coronavirus Infections to the Email– Communications of the ACM
- Tracking the Hackers, unique coverage of the SolarWinds breach– Communications of the ACM
- U.S. HHS Battles DDoS– Communications of the ACM
- Give Tax Time Phishing Attacks the Slip– Communications of the ACM
- Handling Holiday Hackers– Communications of the ACM
- Machine Learning vs. Machine Learning, cyber defenders vs. criminals– Communications of the ACM
- An innovation war: Cybersecurity vs. cybercrime– MIT Technology Review
- Decrypting Basic Encryption — A Layperson’s Guide to Words and Phrases– IronMountain Infogoto
- Hackers are Hurting the Internet of Things in More Ways Than You Think– IronMountain Infogoto
- InfoSec Travel Phrasebook, a guide to creating a common language with your board (eBook)– SAI Global Compliance
- The Making of the Modern CISO (eBook)– SAI Global Compliance
- Flying Blind Into The Threat Visibility Gap– Security Boulevard link for ThreatX
- Fileless Malware: Computer Infections Undress for Success– IronMountain InfoGoTo
- Top cloud security risks that keep experts up at night– TechTarget’s SearchCloudSecurity
- 7 Hard Truths About Blockchain Security– IronMountain InfoGoTo
- API Security Lives at the Heart of the Breach– Security Boulevard for ThreatX
- Medical Informatics Engineering Breach: The Gift That Keeps on Giving– Centrify, The Aftermath of a Data Breach
- Digital Security: Preventing Unauthorized Access to Company Data– IronMountain InfoGoTo
- Cryptojacking: Hackers Mining Bitcoin on Your Dime!– IronMountain InfoGoTo
- Dissecting Dixons Carphone’s Breach & New Cybersecurity Mitigation Steps– Centrify, The Aftermath of a Data Breach
- Cyber Leader Shake-up Causes Head-Scratching, Second-Guesses on Who to Trust– Centrify, The Aftermath of a Data Breach
- Incident response frameworks for enterprise security teams– TechTarget’s SearchSecurity
- How studying the black hat community can help enterprises (part two)– TechTarget’s SearchSecurity
- How white hat hackers can tell you more than threat intelligence (part one)– TechTarget’s SearchSecurity
- DeOS attacks: How enterprises can mitigate the threat– TechTarget’s SearchSecurity
- What GDPR requirements mean for U.S. companies– TechTarget’s SearchSecurity
- Advice for mitigating cybersecurity threats– CGMA Magazine
- State-of-the-art multifactor authentication (MFA) technologies– CSO Magazine / CSOonline.com
- Securing risky network ports– CSO Magazine / CSOonline.com
- 7 sexy high-tech enterprise ‘surveillance engineering’ techniques that criminal hackers use– CSO Magazine / CSOonline.com
- How to respond to device and software backdoors inserted or left by vendors– CSO Magazine / CSOonline.com
- 6 of the most effective social engineering techniques– CSO Magazine / CSOonline.com
- Ransomware picks off broader targets with greater severity– CSO Magazine / CSOonline.com
- How to get your infrastructure in shape to shake off scriptable attacks– CSO Magazine / CSOonline.com
- How to protect your data, your vehicles, and your people against automotive cyber threats?– CSO Magazine / CSOonline.com
- How to wake the enterprise from IoT security nightmares– CSO Magazine / CSOonline.com
- SWIFT has not seen its last ‘bank robbery’– CSO Magazine / CSOonline.com
- Fixing the communications breakdown between IT security and the board and c-suite– CSO Magazine / CSOonline.com
- How to mitigate hackers who farm their victims– CSO Magazine / CSOonline.com
- Emerging technologies are poking holes in security– CSO Magazine / CSOonline.com
- How to keep viral memes from spreading malware in your enterprise– CSO Magazine / CSOonline.com
- The evolution of DevOps: the perfect storm for instituting secure coding practices– CSO Magazine / CSOonline.com
- The enterprise is in an arm’s race with cybercriminals– CSO Magazine / CSOonline.com
- What is the right DDoS protection cloud service for your organization?– CSO Magazine / CSOonline.com
- Which security products do enterprises expect too much from?– CSO Magazine / CSOonline.com
- Can enterprises keep mobile security threats from driving customers away?– CSO Magazine / CSOonline.com
- Meet the man-in-the-middle of your next security crisis– CSO Magazine / CSOonline.com
- Keep these cyberthug holidays marked on your calendar– CSO Magazine / CSOonline.com
- 7 sexy legacy deception techniques that still work today– CSO Magazine / CSOonline.com
- Send attackers on a wild goose chase with deception technologies– CSO Magazine / CSOonline.com
- Attackers clone malware-laden copies of popular apps– CSO Magazine / CSOonline.com
- The cybercrime economy personified– CSO Magazine / CSOonline.com
- POS Malware Mayhem– CSO Magazine / CSOonline.com
- State-Of-The-Art Spear Phishing and Defenses– CSO Magazine / CSOonline.com
- Hackers inside Chinese military steal U.S. corporate trade secrets– CSO Magazine / CSOonline.com
- Hackers capture dynamic data to prepare for effective, stealthy attacks– CSO Magazine / CSOonline.com
- Bad bots on the rise: A look at mobile, social, porn, and spam bots– CSO Magazine / CSOonline.com
- Statistics Point to Increased Physical Danger Risks of Cyberterrorism– CSO Magazine / CSOonline.com
- Ransomware like Cryptolocker uses Bitcoin, other virtual currencies for payment– CSO Magazine / CSOonline.com
- Data breach notification laws, state and federal– CSO Magazine / CSOonline.com
- The Dangers of QR Codes for Security– CSO Magazine / CSOonline.com
- 4 Robots That Teach Children Science and Math in Engaging Ways – ScientificAmerican
- Robotics Design Software Tools – Desktop Engineering
- A Platform to Reduce Product Complexity – Desktop Engineering
- Engineering Students Turn the Chevy Camaro into a Hybrid Vehicle – Desktop Engineering
- Concept Development with Engineering Service Providers – Desktop Engineering
- Invincea FreeSpace and ForeScout CounterACT: More than the sum of their parts– CSO Magazine / CSOonline.com
- Mobile device management and containerization– CSO Magazine / CSOonline.com
- Formulating BYOD policies and user agreements– CSO Magazine / CSOonline.com
- DrChrono mobile EHR app review – PracticeLink Magazine
- How 5G Wireless Could Transform Business – BizTech
- How to review and test backup procedures to ensure data restoration– CSO Magazine / CSOonline.com
- Can data lakes solve cloud security challenges?– CSO Magazine / CSOonline.com
- How to Securely Get Started Using SDN– CSO Magazine / CSOonline.com
- SDN: The security pros and cons of using it in your organization– CSO Magazine / CSOonline.com
- Life on the Network Edge– Fortune
- Li-Fi: High-Speed communication via LED Modulation– ArchitecturalLighting
- SDN and NFV: What are the features and benefits?– TechBeacon
- SDN to support Internet of Things devices– TechTarget
- How to audit external service providers– CSO Magazine / CSOonline.com
- How to protect security product investments– CSO Magazine / CSOonline.com
- Endpoint security still inadequate despite growing threats– CSO Magazine / CSOonline.com
- Attackers are building big data warehouses of stolen credentials and PII– CSO Magazine / CSOonline.com
- Can you keep Linux-based ransomware from attacking your servers?– CSO Magazine / CSOonline.com
- 7 security maneuvers to stay ahead of password exposures– CSO Magazine / CSOonline.com
- Electromagnetic Pulse weapons could knock enterprises offline– CSO Magazine / CSOonline.com
- Are vendors on the wrong path where smart plant security is concerned?– CSO Magazine / CSOonline.com
- Did Microsoft shove Windows 10 down people’s throats?– CSO Magazine / CSOonline.com
- Security risks increase as cloud data centers change– CSO Magazine / CSOonline.com
- How to identify and thwart insider threats– CSO Magazine / CSOonline.com
- Dropbox security chief defends security and privacy in the cloud– CSO Magazine / CSOonline.com
- How to kill Remote Access Trojans– CSO Magazine / CSOonline.com
- Why are there still so many website vulnerabilities? – CSO Magazine / CSOonline.com
- What the enterprise should do when helpless employees lose hope in fighting cyber attacks– CSO Magazine / CSOonline.com
- Is there really a correlation between effective risk management and profit margin growth?– CSO Magazine / CSOonline.com
- Malware remodeled: New tricks, new suits slamming enterprise resources– CSO Magazine / CSOonline.com
- It’s time to research new ways to fight DDoS attacks– CSO Magazine / CSOonline.com
- 7 of the most famous spies– CSO Magazine / CSOonline.com
- Beware of hot foreign spies who want to steal your data– CSO Magazine / CSOonline.com
- How corporate spies access your company’s secrets– CSO Magazine / CSOonline.com
- The Internet of Robotic Things: Secure, harmless helpers or vulnerable, vicious foes?– CSO Magazine / CSOonline.com
- Lack of security in small companies means big risk for the enterprise– CSO Magazine / CSOonline.com
- Why smart devices and wearables will be security’s new headache– CSO Magazine / CSOonline.com
- 10 changes you can make to achieve security serenity now!– CSO Magazine / CSOonline.com
- Why the board of directors will go off on security in 2015– CSO Magazine / CSOonline.com
- How to maintain security in continuous deployment environments– CSO Magazine / CSOonline.com
- What happens when enterprises promote employees with low security IQs– CSO Magazine / CSOonline.com
- New NSA-Funded Programming Language Could Close Long-Standing Security Holes– CSO Magazine / CSOonline.com
- File Sync and Share Security Slip Ups– CSO Magazine / CSOonline.com
- Dark Wallet–Threat or No Threat?– CSO Magazine / CSOonline.com
- Box, Dropbox, or drop both?– CSO Magazine / CSOonline.com
- Why security should monitor social media to prevent violence– CSO Magazine / CSOonline.com
- 3 things to consider before buying into Disaster Recovery as a Service– CSO Magazine / CSOonline.com
- FP&A meets artificial intelligence– FM Magazine
- Big Data Security, Privacy Concerns Remain Unanswered– CSO Magazine / CSOonline.com
- An In-Depth Look Into Machine Learning– CyberCoders.com
- Top In-Demand Skills for Cloud Security– CyberCoders.com
- Where is the demand for Microsoft Windows skills in 2015?– CyberCoders.com
- How to Transition Your IT Support Gig Into a Higher Level Tech Job– CyberCoders.com
- What is the demand for iOS skills?– CyberCoders.com
- Six Emerging Startup Cities for 2015– CyberCoders.com
- How to Add Experience In DevOps To Your Resume– CyberCoders.com
- Three Big-Paying, Big Data Jobs– CyberCoders.com
- Why is There Such a Talent Drought for Build-Release Engineers?– CyberCoders.com
- Why Linux is in extremely high demand– CyberCoders.com
- The Internet of Things: Top Five Threats to IoT Devices– CSO Magazine / CSOonline.com
- Apps Make It Possible (PDF)
- Luxury gadget reviews (PDF)
My Services Include
- Content Marketing Writing
- Ghostwriting
- Technical Writing
- Copywriting
- Thought-leadership Writing
EMAIL AT: [email protected]