Cybersecurity
With a background in cybersecurity and engineering, I provide content that positively impacts client search visibility and sales. My content increases organic traffic, user engagement and revenue for enterprise businesses including Microsoft, Adobe, Rackspace, CloudLinux, SolarWinds and IBM. I "speak" to CIOs, CTOs, CISOs, software engineers, and other technical people using my experience in the field, and I have the ability to engage executives with the buying power to purchase your products.
I've helped numerous cybersecurity companies, software engineers, B2B businesses, SaaS developers, API developers, and other technical organizations improve their search engine rank and generate revenue. Client analytics show that my content drives traffic and customers to client products, and they see an increase in revenue directly from my content.
I can work with your SEO research or work with my own. I have a SEMRush account to perform keyword research and generate ideas for your site. I keep my workflow flexible for my customers so that they can focus on marketing their products and let me handle the content.
A few target industries where I've helped clients the most:
- Cybersecurity. I explain to developers how to write code that isn't vulnerable to common exploits or generate search engine traffic by reporting on the latest zero-day.
- API providers. I write code and content to explain to developers how your API can help increase revenue.
- SaaS. My content explains to buyers how your SaaS application improves productivity, saves them money, and helps your customers build better products.
- B2B. I explain how your products help businesses in technical documentation or blog content.
I write content for:
- Industry blog posts
- Whitepapers
- Technical documentation, mainly for API endpoints and SaaS
- Copywriting and website content
Topics I cover:
- SaaS
- Cybersecurity
- Network engineering, network security
- Information security, infrastructure security
- Email security
- Software engineering, software development, programming
- NIST framework
- Compliance including HIPAA and PCI
Languages I work with:
- .NET (C# and VB.NET)
- Python
- SQL
- JavaScript
- PHP
- PowerShell
Cybersecurity
Any botnet or automated activity using fraudulent clicks, referrals, malicious redirects, or malware installations is considered advertising fraud. Learn how you can prevent advertising fraud and boost your return on ad spend (ROAS).
With a countless number of reported ransomware attacks every month, it seems like the cybersecurity industry is losing its battle with cyber-criminals. Verizon reported that ransomware attacks increased 13% in 2022, a larger increase than the prior five years combined.¹ Human error is the primary re
To help businesses better understand cybersecurity and the risks associated with vulnerabilities, the National Institute of Standards and Technology (NIST) created a framework for guidance with risk assessment, analysis, and deploying the right infrastructure. The NIST framework helps businesses of
Most cyber-attacks are financially motivated, so attackers constantly come up with new ways to breach data. While the amount and sophistication of such attacks are constantly increasing, most of them are based on memory-corruption vulnerabilities-a problem that has been persisting over the last four decades.
Passwords are the cornerstone of your IT security, and RPass ensures that your data is secured by our enterprise-grade cryptography and technology standards.
Learn how to use Python to scan for open and vulnerable Google Firebase database configurations.
HeartBleed... kind of sounds like a love song from the 1970s. It's not. HeartBleed is a serious vulnerability ( CVE-2014-0160 ) affecting the OpenSSL shared library. It's been around since 2014, but unlike the oldies you hear once in a while on the radio, this cyber weakness is very much with us today.
Learn how to secure your code and export functions from CSV injection or formula injection.
Whether you're a healthcare provider or a third-party contractor storing protected health information (PHI), you likely wrestle with HIPAA compliance. HIPAA is one of the more strict compliance regulations, and it's difficult to navigate with all of its exceptions and added obligations that depend o
Buffer overflows are security vulnerabilities that leave your software open to hackers, but we'll show you how to identify them and protect against attacks.
Rebooting servers hurts you and your customers. It's often done during off-peak hours (usually at night) when servers process fewer transactions, but even rebooting at this time costs thousands in downtime. One server reboot can take from several minutes to over an hour depending on the configuration, and it can take additional time for services to synchronize.
Your login page is a perfect target for hackers because it serves as the primary defense between the internet and sensitive data. Most web applications allow users to log into accounts and view sensitive information. If your login page isn't secure, you're likely making these five mistakes.
Passwords are the cornerstone of your IT security, and RPass ensures that your data is secured by our enterprise-grade cryptography and technology standards.
Application Logging and Data Ingestion
Several logging frameworks promise .NET coders a "five-minute setup and start logging" solution for their projects. We decided to test these frameworks to identify speed and convenience between them. We added convenience into the equation because most .NET coders know that they can write events to the Windows Event Viewer without implementing any extra libraries.
How to Use Loggly Live Tail to Review Server Status Codes Real Time in Excel
It's not enough to have logs; you also need a way to manage and analyze those logs to monitor application activity and performance.
Software Development and API Content
When developers are faced with building a solution, they focus on "making it work." What they sometimes forget is the importance of application performance. Whether it's web, desktop or mobile device-based programming, your users want an application that responds quickly. They don't want a desktop application that hangs or a web application that takes too long to load.
Power the smart home of the future (and present!) with maximum efficiency and sustainability using precise weather data.
C# is rather popular as backend programming language and you might find yourself in need of it for scraping a web page (or multiple pages). In this article, we will cover how to scrape a website using C#.
When you think of the top 100 sites in the world, you think of high-traffic domains and pages coded to perfection. In fact, even the most popular sites in the world have errors hidden behind the scenes that are still visible in your browser's developer tools.
Learn the step-by-step process of performing a TLS handshake and get TLS 1.3 handshake explained for better development.