Thought Leadership Pieces for Executives (Bylined and Ghostwritten)
I'm currently a digital marketing manager, focusing primarily on content strategy and creation. I plan, write and edit a wide variety of content and product marketing assets, including blog post series, white papers, solution briefs, data sheets, case studies, thought leadership columns, corporate brochures, and website copy.
Prior to that, I was a journalist for 22 years, most of them covering the technology industry as a writer and editor. An award-winning technology reporter, I excelled at covering breaking news under extreme deadline pressure, getting scoops and crafting insightful news features. I also have more than 15 years of experience as desk editor, assigning and editing stories, coaching reporters and helping plan coverage.
Fully bilingual in Spanish-English, I report, write and edit in both languages, and do bi-directional translations. I have experience working with Latin America and the U.S. Hispanic market.
As a manager, I have successfully led high-stakes projects that require drafting long-term strategies, hiring/managing employees, allocating budgets, meeting goals and exceeding expectations.
Thought Leadership Pieces for Executives (Bylined and Ghostwritten)
The most popular and successful examples of the sharing economy-the likes of Uber, Airbnb, plus other "Now Economy"-fueled apps-can only exist thanks to a robust telecom infrastructure. Moreover, they're disrupting their respective industries-taxis and hotels-with a minimum of overhead and at breakneck speed.
Water, gas, and electric utilities today face a myriad of challenges, ranging from new breeds of competitors to the aging of their infrastructure-not to mention increasingly limited public financing. They will have to use innovative technology to navigate these market changes and thrive.
E-Book / Solution Brief Samples
eBook for SMBs interested in learning about SaaS
White Paper Samples
White paper about how to prioritize vulnerability remediation
Blog Series Sample -- 1
Jane and Emily are CISOs at two large companies which about five years ago almost simultaneously hired a well-known outsourcer that provides back office business services.
We continue our series on assessing third-party risk, where we're describing scenarios in which an automated, cloud-based system can help you identify security and compliance gaps among vendors, partners and employees. As discussed in this series' first installment, it's short-sighted to put great effort into protecting your IT environment while ignoring the security and compliance policies and procedures of your trusted third parties.
We continue our series on assessing third-party risk, where we're describing scenarios in which an automated, cloud-based system can help you identify security and compliance gaps among vendors, partners and employees. In addition to protecting their organization's IT environment, CISOs must also closely monitor the security and compliance policies and procedures of trusted third parties.
We conclude our series on assessing third-party risk, where we've described scenarios in which an automated, cloud-based system can help you identify security and compliance gaps among vendors, partners and employees. As we have outlined in this blog series, CISOs and their infosec teams need clarity and visibility not only into their IT environments, but also across their roster of trusted vendors.
Blog Series Sample -- 2
Overwhelmed by the mounds of vulnerabilities in their IT environments, many organizations struggle to prioritize remediation, but you can overcome this challenge with the right approach Steve, an information security manager, is again rattled awake at 3 a.m. by a recurring nightmare: He's at work and his desk suddenly gets transformed into a mile-long Whack-A-Mole cabinet with thousands of holes.
This is part two in a three-part series on prioritizing vulnerability remediation, where we're explaining five basic requirements for identifying on an ongoing basis which IT assets you must patch right away. In our first post last week we met Steve, a nightmare-stricken infosec manager who loses sleep over his organization's inability to manage its IT environment's vulnerabilities.
This is the last part in our series on prioritizing vulnerability remediation, where we've been outlining basic requirements so you can always identify the IT assets you must patch right away. In our first two posts, we met Steve, an infosec manager whose organization's inability to manage its IT environment's vulnerabilities had turned him into an insomniac.
Individual Blog Post Samples
End users and their devices are right smack in the center of the battle between enterprise InfoSec teams and malicious hackers, and it's not hard to see why. When compromised, connected endpoints - desktops, laptops, smartphones, tablets - offer intruders major entry points into corporate networks.
Destruction of service. Get acquainted with this newly-minted term, and with its acronym - DeOS. It's a particularly disturbing type of cyber attack InfoSec teams may face regularly in the not too distant future. That's one of the main findings featured in the Cisco 2017 Midyear Cybersecurity Report , a comprehensive cyber security study the networking giant has been publishing for almost a decade.
For many years, Jason Kent used a good old-fashioned remote control clicker to open and close his garage door, but the mechanism recently got "appified" so he became curious about its security. His interest isn't surprising.
As cloud computing adoption accelerates among businesses, InfoSec teams are struggling to fully protect cloud workloads due to a lack of visibility into these environments, and to hackers' increasingly effective attacks. That's the main finding from SANS Institute's "Cloud Security: Defense in Detail if Not in Depth" report , which surveyed IT and security pros from organizations of all sizes representing many industries.
Big data simulation and analytics has become an invaluable business tool for media and entertainment (M&E) companies as they seek to maximize the life cycles of movies and TV shows. The business model for TV shows and movies has changed dramatically in the age of digital entertainment and social media.
Case Study Samples
At Western National Insurance, the importance of billing its customers extends beyond processing and managing insurance premium payments. As the primary reason customers contact the company, billing isn't just a peripheral administrative function: it sits at the core of Western National's interactions with its customers across all of the Midwestern, Northwestern and Southwestern United States.
Cabrini Health's Brighton Hospital, an acute care facility that specializes in cancer services, women's health and surgery, recently boosted the speed, precision and quality of its clinical services by improving access to clinical and administrative patient information and introducing electronic medication management.
That phrase was uttered by Confucius 2,500 years ago, but reflects the spirit behind a recent revamp of a Cisco web app development process that made it more effective and secure.
Corporate Brochures / Guides
The best Agile, App Dev, DevOps, Security, Mobile, Cloud and Testing/QA conferences in 2016
Technology Journalism Samples
Here's a DevOps nightmare: It's been a few months since the DevOps adoption project was declared completed. The necessary automation tools are in place. Developers and IT operations staffers now belong to one team. They've been instructed to collaborate and communicate at every step of every applications' life cycle.
In 2011, John H. Gass received a disconcerting message from the Massachusetts Registry of Motor Vehicles: His license had been revoked, and he had to refrain from driving immediately. Gass hadn't received a traffic ticket in years, The Boston Globe reported at the time .
As information security stakes reach stratospheric levels due to massive, frequent and brazen attacks, many IT security managers are weighing whether DevOps can improve applications' protection against data thieves. Given this confluence, it's no surprise the topic has gained prominence in conferences like RSA, which last year added "DevOps" to the title of its long-standing Application Security track.
The VP of IT and the CIO had been having a fine morning. In fact,...
Microsoft is pledging dramatic improvements to its notoriously complex enterprise licensing, but experts are skeptical about the potential impact of the plan. Microsoft's licensing policies and procedures are devilishly convoluted, a situation that has worsened in recent years with the popularity of virtualization, cloud computing, mobile devices and the consumerization of IT.
Every time Mark Zuckerberg has tried to tackle search, he's landed on his back like Charlie Brown after Lucy pulls away the football. Facebook's co-founder and CEO has overseen successful work in areas such as user experience, mobile, display ads, high-performance computing, and multimedia management. But a smart-and conflict-free-search engine has eluded him.
The rocky rollout of Windows 8.1 should serve as a reminder for consumers, software developers, hardware vendors, enterprise IT pros, and Microsoft itself that a period of careful testing and analysis must precede the release and installation of an operating system update. After it shipped on Oct.
When Microsoft ends support for Windows XP on Tuesday, a security sinkhole will likely open and gradually widen, threatening hundreds of millions of PCs worldwide in homes, companies, government agencies and schools. Along with the Y2K bug, Windows XP's support termination is one of the computer industry's most publicized-and most ignored -deadlines, toward which many business and IT managers have taken a curiously casual attitude.
In a great IT industry irony, enterprise social networking (ESN) software, designed to boost interaction and collaboration, is often ignored by users and ends up forgotten like the proverbial ghost town with rolling tumbleweeds.
Long considered old-school tools with no place in shiny corporate social collaboration suites, to-do software is making a comeback with a new air of cool about it and renewed appreciation from enterprise IT. The reason?
To beat external hackers and disgruntled insiders, security vendors, their customers, and law enforcement must boost innovation, partnerships, and awareness about evolving threats. Now. That was a key message at the RSA Conference, whose 25th edition last week drew almost 40,000 attendees hungry to learn how to best protect their organizations from cybercriminals.
When the Moscone Center doors open on February 29, RSA Conference 2016 will kick off its 25 th annual edition, welcoming 30,000-plus attendees hungry for information security knowledge, as massive hacks against corporations and governments continue to occur with an increasingly disturbing frequency.
Cisco will package and deliver enterprise collaboration capabilities via a mobile and Web app built to replicate the ease of use of consumer software but designed for ad hoc, workplace team interaction. The app, called Project Squared, joins a growing number of "consumerized" enterprise mobile and Web apps built by startups and designed to put a spin on collaboration, messaging, productivity, video conferencing and communications.
As the clock ticks down to the start of the DevOps Enterprise Summit 2015 (DOES15), burning questions, spirited debates, and intense market buzz swirl around this new approach to IT. Backers swear that DevOps can revolutionize a company's application development and delivery, but many potential adopters find DevOps confusing and hard to grasp.
After spending the past two years in damage control mode over Windows 8, Microsoft will officially begin a new era for its OS on Tuesday, when it's expected to unveil a preview of Windows' next major version during an event focused on enterprise customers.
Another startup wants to offer mobile messaging to enterprises, even though it's questionable whether such a narrow service can sustain a company and even though it's likely that larger enterprise collaboration vendors will jump into this market.
The release of Delve, the first application to use Microsoft's Office Graph machine learning engine, will be remembered years from now as either the genesis of a revolutionary technology or as a fireworks-style launch that dazzled everyone only for a brief moment.
Microsoft has been screaming "cloud" in many partners' deaf ears for several years, but the company found a more receptive audience at this week's Worldwide Partner Conference. From CEO Satya Nadella on down, all Microsoft officials at the event told attendees that they need to switch their businesses to the cloud urgently, or else risk obsolescence and market defeat.
They came, 1,200 of them, to the City by the Bay to bathe in the sea of DevOps, whose miracle waters are said to be able to transform into nimble software producers even the most rigid of IT departments.
Picture a systems administrator in a traditional IT organization, with clearly delineated boundaries between their IT ops peers and the app developers. They've always viewed the "devs" as undisciplined, creative hippies who know nothing-and care little-about what it takes to keep production systems up and running.
Explosive revelations in the past six months about the U.S. government's massive cyber-spying activities have spooked individuals, rankled politicians and enraged privacy watchdogs, but top IT executives aren't panicking -- yet. So far, they are monitoring the issue, getting informed and taking steps to mitigate their risk in various ways.
Say what you will about Satya Nadella's first six months as Microsoft CEO, but no one can deny the man jumped in with both feet from day one and has led the company with decisiveness. Some of his moves have been met with applause, and others with raspberries.