Writing Samples
Additional samples are available on request.
You can reach me at [email protected] for rates, availability, and details, or schedule a quick chat.
- 4 Robots That Teach Children Science and Math in Engaging Ways – ScientificAmerican
- Invincea FreeSpace and ForeScout CounterACT: More than the sum of their parts– CSO Magazine / CSOonline.com
- Mobile device management and containerization– CSO Magazine / CSOonline.com
- Formulating BYOD policies and user agreements– CSO Magazine / CSOonline.com
- DrChrono mobile EHR app review – PracticeLink Magazine
- How 5G Wireless Could Transform Business – BizTech
- How to review and test backup procedures to ensure data restoration– CSO Magazine / CSOonline.com
- Can data lakes solve cloud security challenges?– CSO Magazine / CSOonline.com
- How to Securely Get Started Using SDN– CSO Magazine / CSOonline.com
- SDN: The security pros and cons of using it in your organization– CSO Magazine / CSOonline.com
- Life on the Network Edge – Fortune
- Li-Fi: High-Speed communication via LED Modulation– ArchitecturalLighting
- SDN and NFV: What are the features and benefits?– TechBeacon
- SDN to support Internet of Things devices– TechTarget
- How to audit external service providers– CSO Magazine / CSOonline.com
- How to protect security product investments– CSO Magazine / CSOonline.com
- Endpoint security still inadequate despite growing threats– CSO Magazine / CSOonline.com
- Attackers are building big data warehouses of stolen credentials and PII– CSO Magazine / CSOonline.com
- Can you keep Linux-based ransomware from attacking your servers?– CSO Magazine / CSOonline.com
- 7 security maneuvers to stay ahead of password exposures– CSO Magazine / CSOonline.com
- Electromagnetic Pulse weapons could knock enterprises offline– CSO Magazine / CSOonline.com
- Are vendors on the wrong path where smart plant security is concerned?– CSO Magazine / CSOonline.com
- Did Microsoft shove Windows 10 down people’s throats?– CSO Magazine / CSOonline.com
- Security risks increase as cloud data centers change– CSO Magazine / CSOonline.com
- How to identify and thwart insider threats– CSO Magazine / CSOonline.com
- Dropbox security chief defends security and privacy in the cloud– CSO Magazine / CSOonline.com
- How to kill Remote Access Trojans– CSO Magazine / CSOonline.com
- Why are there still so many website vulnerabilities? – CSO Magazine / CSOonline.com
- What the enterprise should do when helpless employees lose hope in fighting cyber attacks– CSO Magazine / CSOonline.com
- Is there really a correlation between effective risk management and profit margin growth?– CSO Magazine / CSOonline.com
- Malware remodeled: New tricks, new suits slamming enterprise resources– CSO Magazine / CSOonline.com
- It’s time to research new ways to fight DDoS attacks– CSO Magazine / CSOonline.com
- 7 of the most famous spies– CSO Magazine / CSOonline.com
- Beware of hot foreign spies who want to steal your data– CSO Magazine / CSOonline.com
- How corporate spies access your company’s secrets– CSO Magazine / CSOonline.com
- The Internet of Robotic Things: Secure, harmless helpers or vulnerable, vicious foes?– CSO Magazine / CSOonline.com
- Lack of security in small companies means big risk for the enterprise– CSO Magazine / CSOonline.com
- Why smart devices and wearables will be security’s new headache– CSO Magazine / CSOonline.com
- 10 changes you can make to achieve security serenity now!– CSO Magazine / CSOonline.com
- Why the board of directors will go off on security in 2015– CSO Magazine / CSOonline.com
- How to maintain security in continuous deployment environments– CSO Magazine / CSOonline.com
- What happens when enterprises promote employees with low security IQs– CSO Magazine / CSOonline.com
- New NSA-Funded Programming Language Could Close Long-Standing Security Holes– CSO Magazine / CSOonline.com
- File Sync and Share Security Slip Ups– CSO Magazine / CSOonline.com
- Dark Wallet–Threat or No Threat?– CSO Magazine / CSOonline.com
- Box, Dropbox, or drop both?– CSO Magazine / CSOonline.com
- Why security should monitor social media to prevent violence– CSO Magazine / CSOonline.com
- 3 things to consider before buying into Disaster Recovery as a Service– CSO Magazine / CSOonline.com
- FP&A meets artificial intelligence– FM Magazine
- Big Data Security, Privacy Concerns Remain Unanswered– CSO Magazine / CSOonline.com
- An In-Depth Look Into Machine Learning– CyberCoders.com
- Top In-Demand Skills for Cloud Security– CyberCoders.com
- Where is the demand for Microsoft Windows skills in 2015?– CyberCoders.com
- How to Transition Your IT Support Gig Into a Higher Level Tech Job– CyberCoders.com
- What is the demand for iOS skills?– CyberCoders.com
- Six Emerging Startup Cities for 2015– CyberCoders.com
- How to Add Experience In DevOps To Your Resume– CyberCoders.com
- Three Big-Paying, Big Data Jobs– CyberCoders.com
- Why is There Such a Talent Drought for Build-Release Engineers?– CyberCoders.com
- Why Linux is in extremely high demand– CyberCoders.com
- The Internet of Things: Top Five Threats to IoT Devices– CSO Magazine / CSOonline.com
- Apps Make It Possible (PDF)
- Luxury gadget reviews (PDF)
My Services Include
- Content Marketing Writing
- Ghostwriting
- Technical Writing
- Copywriting
- Thought-leadership Writing
EMAIL AT: [email protected]