Featured articles & appearances
-

(Guest blog) A day in the life of a cybersecurity content marketer
The Cybersecurity Marketing Society
-

(Podcast) How to make technical content worth reading
Content Amplified Podcast
-

(Guest quote) Will these snack brand commercials be the best of Super Bowl LIX?
Zappi.io
-

(Guest blog) Why persistence is a staple for today's hackers
MSSP Alert
-

(Guest blog) Minimizing cyber risk: Lessons learned from ProxyShell
CPO Magazine
Cybersecurity & technical content
-

How to recognize phishing
-

What is cybersecurity compliance?
-

What is proactive cybersecurity?
-

Top cybersecurity threats in 2023
-

5 cyber hygiene best practices
-

(Webinar) Cybersecurity content
-

Making cyber accessible for women
-

(2022) The state of the dark web
-

(2021) A journey through the dark web
-

How to catch a phish
-

Lessons learned from ProxyShell
-

What is the zero trust security model?
-

Why persistence is a staple for hackers
-

Lessons learned from Colonial Pipeline
-

How to prioritize vulnerabilities
-

How to conduct a vulnerability assessment
-

What is a vulnerability scanner?
-

Patch management vs. vulnerability management
-

How to silently uninstall PuTTY
-

How to manage Windows updates
-

How to deploy Office 365
-

Active Directory vs. Microsoft Entra ID
Other select work
-

Sysadmins vs. AI: 5 ways humans beat the bots
-

Reference computer options for Windows imaging
-

How to build an IT resume
-

What is the 3-2-1 backup rule?
-

Guide to the different types of Microsoft and Office 365 licenses
-

What is Microsoft Volume Licensing?
-

The State of Sysadmin: Women in IT