My portfolio

  • The Top Cybersecurity Threats in 2023

    …and advice on how to combat them in 2024.

  • How to Recognize Phishing

    Both from an end user’s perspective and a more technical one.

  • What Is Cybersecurity Compliance?

    And why should businesses care about compliance?

  • Proactive Cybersecurity: What It Is and Why It Matters

    And is it better than reactive cybersecurity?

  • What Is Cloud Computing?

    And why are so many businesses making the switch to the cloud?

  • Active Directory versus Microsoft Entra ID: What’s the Difference?

    Ah, yet another confusing Microsoft rebrand!

  • 5 Cyber Hygiene Best Practices

    This blog details five cyber hygiene best practices that can keep you safer online.

  • (Webinar) Cybersecurity Content

    My Tradecraft Tuesday presentation with John Hammond and Dray Agha from Huntress.

  • Making Cybersecurity Accessible for Women

    It’s past time to even the playing field.

  • The State of the Dark Web

    In 2022, the dark web is still weird.

  • Don't Get Schooled: How to Catch a Phish

    Threat actors love a good phish.

  • Pulling Back the Curtain: A Journey Through the Dark Web

    The dark web is a weird place.

  • Minimizing Cyber Risk: Lessons Learned from ProxyShell

    No vendor is infallible.

  • What Is the Zero Trust Security Model?

    Zero trust is a cyber must.

  • Why Persistence Is a Staple for Today's Hackers

    In cyber, persistence really is key.

  • Lessons Learned from the Colonial Pipeline Cyberattack

    Three top takeaways.