Jennifer Marsh

Software engineer, cybersecurity enthusiast, and technical writer

United States

With a background in cybersecurity and engineering, I provide content that positively impacts client search visibility and sales. My content increases organic traffic, user engagement and revenue for enterprise businesses including Microsoft, Adobe, Rackspace, CloudLinux, SolarWinds and IBM. I "speak" to CIOs, CTOs, CISOs, software engineers, and other technical people using my experience in the field, and I have the ability to engage executives with the buying power to purchase your products.

I've helped numerous cybersecurity companies, software engineers, B2B businesses, SaaS developers, API developers, and other technical organizations improve their search engine rank and generate revenue. Client analytics show that my content drives traffic and customers to client products, and they see an increase in revenue directly from my content.

I can work with your SEO research or work with my own. I have a SEMRush account to perform keyword research and generate ideas for your site. I keep my workflow flexible for my customers so that they can focus on marketing their products and let me handle the content.

A few target industries where I've helped clients the most:

- Cybersecurity. I explain to developers how to write code that isn't vulnerable to common exploits or generate search engine traffic by reporting on the latest zero-day.
- API providers. I write code and content to explain to developers how your API can help increase revenue.
- SaaS. My content explains to buyers how your SaaS application improves productivity, saves them money, and helps your customers build better products.
- B2B. I explain how your products help businesses in technical documentation or blog content.

I write content for:

- Industry blog posts
- Whitepapers
- Technical documentation, mainly for API endpoints and SaaS
- Copywriting and website content

Topics I cover:

- SaaS
- Cybersecurity
- Network engineering, network security
- Information security, infrastructure security
- Email security
- Software engineering, software development, programming
- NIST framework
- Compliance including HIPAA and PCI

Languages I work with:

- .NET (C# and VB.NET)
- Python
- JavaScript
- PowerShell



How to Prevent Advertising Fraud

Any botnet or automated activity using fraudulent clicks, referrals, malicious redirects, or malware installations is considered advertising fraud. Learn how you can prevent advertising fraud and boost your return on ad spend (ROAS).

Access Point Technology
Complete Guide to Ransomware Protection - Access Point Technology

With a countless number of reported ransomware attacks every month, it seems like the cybersecurity industry is losing its battle with cyber-criminals. Verizon reported that ransomware attacks increased 13% in 2022, a larger increase than the prior five years combined.¹ Human error is the primary re

A Guide to Memory Vulnerabilities in the Linux Kernel - TuxCare

Most cyber-attacks are financially motivated, so attackers constantly come up with new ways to breach data. While the amount and sophistication of such attacks are constantly increasing, most of them are based on memory-corruption vulnerabilities-a problem that has been persisting over the last four decades.

Password Management Whitepaper

Passwords are the cornerstone of your IT security, and RPass ensures that your data is secured by our enterprise-grade cryptography and technology standards.

Protecting Servers from HeartBleed. Yes, HeartBleed. - TuxCare

HeartBleed... kind of sounds like a love song from the 1970s. It's not. HeartBleed is a serious vulnerability ( CVE-2014-0160 ) affecting the OpenSSL shared library. It's been around since 2014, but unlike the oldies you hear once in a while on the radio, this cyber weakness is very much with us today.

Access Point Technology
HIPAA Compliance Checklist - Access Point Technology

Whether you're a healthcare provider or a third-party contractor storing protected health information (PHI), you likely wrestle with HIPAA compliance. HIPAA is one of the more strict compliance regulations, and it's difficult to navigate with all of its exceptions and added obligations that depend o

5 Ways to Reduce Server Downtime (And 1 Way To Eliminate It) - TuxCare

Rebooting servers hurts you and your customers. It's often done during off-peak hours (usually at night) when servers process fewer transactions, but even rebooting at this time costs thousands in downtime. One server reboot can take from several minutes to over an hour depending on the configuration, and it can take additional time for services to synchronize.

Password Management Whitepaper

Passwords are the cornerstone of your IT security, and RPass ensures that your data is secured by our enterprise-grade cryptography and technology standards.

Application Logging and Data Ingestion

Log Analysis | Log Monitoring by Loggly
Benchmarking 5 Popular .NET Logging Libraries

Several logging frameworks promise .NET coders a "five-minute setup and start logging" solution for their projects. We decided to test these frameworks to identify speed and convenience between them. We added convenience into the equation because most .NET coders know that they can write events to the Windows Event Viewer without implementing any extra libraries.

Software Development and API Content
Developing with Performance in Mind - DZone

When developers are faced with building a solution, they focus on "making it work." What they sometimes forget is the importance of application performance. Whether it's web, desktop or mobile device-based programming, your users want an application that responds quickly. They don't want a desktop application that hangs or a web application that takes too long to load.

Web Scraping with C#

C# is rather popular as backend programming language and you might find yourself in need of it for scraping a web page (or multiple pages). In this article, we will cover how to scrape a website using C#.

Errors on the world's top 100 websites and how to avoid them

When you think of the top 100 sites in the world, you think of high-traffic domains and pages coded to perfection. In fact, even the most popular sites in the world have errors hidden behind the scenes that are still visible in your browser's developer tools.