Featured articles & appearances
- 
      
      
      
        
  
      

(Guest blog) A day in the life of a cybersecurity content marketer
The Cybersecurity Marketing Society
 - 
      
      
      
        
  
      

(Podcast) How to make technical content worth reading
Content Amplified Podcast
 - 
      
      
      
        
  
      

(Guest quote) Will these snack brand commercials be the best of Super Bowl LIX?
Zappi.io
 - 
      
      
      
        
  
      

(Guest blog) Why persistence is a staple for today's hackers
MSSP Alert
 - 
      
      
      
        
  
      

(Guest blog) Minimizing cyber risk: Lessons learned from ProxyShell
CPO Magazine
 
Cybersecurity & technical content
- 
      
      
      
        
  
      

How to recognize phishing
 - 
      
      
      
        
  
      

What is cybersecurity compliance?
 - 
      
      
      
        
  
      

What is proactive cybersecurity?
 - 
      
      
      
        
  
      

Top cybersecurity threats in 2023
 - 
      
      
      
        
  
      

5 cyber hygiene best practices
 - 
      
      
      
        
  
      

(Webinar) Cybersecurity content
 - 
      
      
      
        
  
      

Making cyber accessible for women
 - 
      
      
      
        
  
      

(2022) The state of the dark web
 - 
      
      
      
        
  
      

(2021) A journey through the dark web
 - 
      
      
      
        
  
      

How to catch a phish
 - 
      
      
      
        
  
      

Lessons learned from ProxyShell
 - 
      
      
      
        
  
      

What is the zero trust security model?
 - 
      
      
      
        
  
      

Why persistence is a staple for hackers
 - 
      
      
      
        
  
      

Lessons learned from Colonial Pipeline
 - 
      
      
      
        
  
      

How to prioritize vulnerabilities
 - 
      
      
      
        
  
      

How to conduct a vulnerability assessment
 - 
      
      
      
        
  
      

What is a vulnerability scanner?
 - 
      
      
      
        
  
      

Patch management vs. vulnerability management
 - 
      
      
      
        
  
      

How to silently uninstall PuTTY
 - 
      
      
      
        
  
      

How to manage Windows updates
 - 
      
      
      
        
  
      

How to deploy Office 365
 - 
      
      
      
        
  
      

Active Directory vs. Microsoft Entra ID
 
Other select work
- 
      
      
      
        
  
      

Sysadmins vs. AI: 5 ways humans beat the bots
 - 
      
      
      
        
  
      

Reference computer options for Windows imaging
 - 
      
      
      
        
  
      

How to build an IT resume
 - 
      
      
      
        
  
      

What is the 3-2-1 backup rule?
 - 
      
      
      
        
  
      

Guide to the different types of Microsoft and Office 365 licenses
 - 
      
      
      
        
  
      

What is Microsoft Volume Licensing?
 - 
      
      
      
        
  
      

The State of Sysadmin: Women in IT