My portfolio
Featured articles & appearances
-
(Guest blog) A day in the life of a cybersecurity content marketer
The Cybersecurity Marketing Society
-
(Podcast) How to make technical content worth reading
Content Amplified Podcast
-
(Guest quote) Will these snack brand commercials be the best of Super Bowl LIX?
Zappi.io
-
(Guest blog) Why persistence is a staple for today's hackers
MSSP Alert
-
(Guest blog) Minimizing cyber risk: Lessons learned from ProxyShell
CPO Magazine
Cybersecurity & technical content
-
How to recognize phishing
-
What is cybersecurity compliance?
-
What is proactive cybersecurity?
-
Top cybersecurity threats in 2023
-
5 cyber hygiene best practices
-
(Webinar) Cybersecurity content
-
Making cyber accessible for women
-
(2022) The state of the dark web
-
(2021) A journey through the dark web
-
How to catch a phish
-
Lessons learned from ProxyShell
-
What is the zero trust security model?
-
Why persistence is a staple for hackers
-
Lessons learned from Colonial Pipeline
-
How to prioritize vulnerabilities
-
How to conduct a vulnerability assessment
-
What is a vulnerability scanner?
-
Patch management vs. vulnerability management
-
How to silently uninstall PuTTY
-
How to manage Windows updates
-
How to deploy Office 365
-
Active Directory vs. Microsoft Entra ID
Other select work
-
Sysadmins vs. AI: 5 ways humans beat the bots
-
Reference computer options for Windows imaging
-
How to build an IT resume
-
What is the 3-2-1 backup rule?
-
Guide to the different types of Microsoft and Office 365 licenses
-
What is Microsoft Volume Licensing?
-
The State of Sysadmin: Women in IT