I work closely with PR agencies, subject matter experts, and senior leadership to create content that supports awareness of your organization. With deep expertise in cybersecurity, databases, Kubernetes, and other technical topics, I can help you create video scripts and write executive bylines and blog posts that focus on how your solution solves challenges. From SEO optimized content to intelligently crafted upgrade guides, let’s create compelling content together.
Case Study
Protect, Map, & Audit Increasing Volumes of Data
House Rx needed a data map of the entire environment to ensure employees were off-boarded appropriately and that personally identifiable information (PII) and protected health information (PHI) was accessible only to specific roles and locations.
Whitepaper
The Pros & Cons of AKS, EKS, & GKE
While all three providers offer compelling capabilities, these robust solutions are great at some things and not as great at others. It’s important to understand what those pros and cons for each of them are so you can choose the cloud provider that best meets the needs of your organization or your team.
Case Study
Breach Investigation, Remediation
A global company identified a breach in their environment through a third-party plugin. Attackers had considerable time to access the customer’s code, so it was essential to quickly evaluate the potential impact.
eBook
Are You Ready for a Breach in Your Organization’s Slack?
As Slack becomes a dominant part of the infrastructure in your organization, it will become a target for cyberattacks and it’s likely to be breached.
Infographic
Top 5 New Security Challenges in the Cloud
Innovation is both driving and fueling the shift to cloud, so be aware of these cloud security challenges and ready to respond when an incident occurs in your cloud environment.
Website
Dr. Sabrina Strickland
Dr. Strickland is an orthopedic surgeon specializing in sports medicine who returns her patients to their active lifestyle.
Video
Lemonade Testimonial
Customer testimonial for Mitiga Security, Inc. sharing why Lemonade chose them for incident readiness and response.
Video
Explainer Video
A short explainer video outlining what Mitiga does, how, and why, in a way that any viewer can understand.
Whitepaper
An Introduction to FinOps Governance
FinOps, a portmanteau of Finance and DevOps, is a strategic framework created to help companies understand and manage
their cloud costs, enabling greater efficiency in cloud service usage.
eBook
Why Passkeys
Improve User Security
Passwords pose significant problems in today’s digital landscape and passkeys keys are emerging to transform how we manage online authentication, enhancing security and
improving user experience in the digital space.
Infographic
The Right CRQ Solution for Security Leaders
Cyber risk quantification has emerged as a way to put a dollar figure on cyber risk. CRQ enables CISOs to discuss the organization’s current risk exposure with the leadership team and risk officers using business terms.
Bylines
Collaborating with PR firms and leadership to write bylines across multiple industries, published in Dark Reading, VentureBeat, Security Magazine, Information Week, Help Net Security, The New Stack, CPO Magazine, and many more.
- 7 access management challenges during M&A – Help Net Security
- 8 identity management best practices to have in place – Security Magazine
- 10 Key Controls to Show Your Organization Is Worthy of Cyber Insurance – Dark Reading
- A closer look at TSA’s new cybersecurity requirements for aviation – Help Net Security
- AI in OT: Opportunities and risks you need to know – VentureBeat
- Are You Talking to a Carbon, Silicon, or Artificial Identity? – Dark Reading
- Building a Better Perimeter Defense Strategy to Meet the Challenges of 2024 – Cyber Defense Magazine
- Buyers Beware: Cybercriminals Target Your Online Credentials – Security Boulevard
- Can You Provision Infra and Deploy Apps with the Synergy of Olympic Artistic Swimming? – DevOps Digest
- Cloud migration expands the CISO role yet again – Help Net Security
- Compliance and security are two sides of the same coin – Security Magazine
- Defend Your Industrial Assets: How to Safely Use Removable Media in ICS – IIoT World
- Diverse Cybersecurity Workforce Act Offers More Than Diversity Benefits – DarkReading
- FedRAMP Baseline Transition Points to OSCAL-Native Tools – MeriTalk
- Hiring and Job Hunting are Changing in an Artificial Identity World – Digital CxO
- How Can We Safely Use Artificial Intelligence to Simplify GRC Goals? – CPO Magazine
- How Demanding Conditions Impact Critical Infrastructure Security – Security Boulevard
- How Does Identity Transport Across Privacy Jurisdictions? – CPO Magazine
- How to mitigate security threats and supply chain attacks in 2023 and beyond – VentureBeat
- Improving Cybersecurity For Operational Technology In Energy Infrastructure – OILMAN Magazine
- Infrastructure as Code Is Dead: Long Live Infrastructure from Code – The New Stack
- It’s (Past) Time To Make Authentication Easy And Secure – Forbes Technology Council
- LockBit Lies Prove Another Reason to Never Pay the Ransom – Cybersecurity Insiders
- OPSWAT 2024 Predictions: Top 5 Email Security Challenges Requiring a Zero-Trust Approach in 2024 – VMblog
- RegScale 2024 Predictions: Lawmakers Will Impose Far Stricter Cybersecurity Regulations – VMblog
- SEC Ruling Is a Win for Citizens’ Digital Information – Information Week
- Securing the Airport Ecosystem: 3 Ways to Manage Cybersecurity Threats – Aviation Pros
- Segmentation, data diodes and NSA’s zero trust guidance – Security Magazine
- Study Shows 80% of Companies Admit to an Email Security Breach Last Year – IIoT World
- The Problems With Golden Templates That No One Wants to Talk About – DevOps.com
- Top Takeaways From Table Talks With Fortune 100 CISOs – Dark Reading
- What Would a Government Shutdown Mean for Cybersecurity? – Dark Reading
- When humans are the weak link in critical infrastructure cybersecurity – Security Magazine
- Why Meeting the SEC’s Board Diversity Rules Benefits Your Organization – Infosecurity Magazine