My portfolio
-
The Top Cybersecurity Threats in 2023
…and advice on how to combat them in 2024.
-
How to Recognize Phishing
Both from an end user’s perspective and a more technical one.
-
What Is Cybersecurity Compliance?
And why should businesses care about compliance?
-
Proactive Cybersecurity: What It Is and Why It Matters
And is it better than reactive cybersecurity?
-
What Is Cloud Computing?
And why are so many businesses making the switch to the cloud?
-
Active Directory versus Microsoft Entra ID: What’s the Difference?
Ah, yet another confusing Microsoft rebrand!
-
5 Cyber Hygiene Best Practices
This blog details five cyber hygiene best practices that can keep you safer online.
-
(Webinar) Cybersecurity Content
My Tradecraft Tuesday presentation with John Hammond and Dray Agha from Huntress.
-
Making Cybersecurity Accessible for Women
It’s past time to even the playing field.
-
The State of the Dark Web
In 2022, the dark web is still weird.
-
Don't Get Schooled: How to Catch a Phish
Threat actors love a good phish.
-
Pulling Back the Curtain: A Journey Through the Dark Web
The dark web is a weird place.
-
Minimizing Cyber Risk: Lessons Learned from ProxyShell
No vendor is infallible.
-
What Is the Zero Trust Security Model?
Zero trust is a cyber must.
-
Why Persistence Is a Staple for Today's Hackers
In cyber, persistence really is key.
-
Lessons Learned from the Colonial Pipeline Cyberattack
Three top takeaways.