Thought Leadership Pieces for Executives (Bylined and Ghostwritten)
I’ve been writing about enterprise and consumer technology for 25 years -- both as an award-winning reporter and editor, and as a content marketer. My areas of expertise include cybersecurity, DevOps, artificial intelligence, cloud computing, mobile apps, IT operations, e-commerce, and collaboration software.
For corporate clients, I provide content strategy services to support marketing projects and campaigns, including planning, writing and editing blog posts, case studies, white papers, ghostwritten articles, product briefs, website copy, e-books, social media posts and more.
As a content marketer, I support multiple teams, including product management, demand generation, corporate communications, sales and events. I’ve played prominent roles producing content for high-stakes projects, including website redesigns, product launches, message repositioning, thought-leadership initiatives, and customer advocacy.
I've been a full-time content marketing manager for Tenable, Qualys, Moogsoft and JFrog, and I've done freelance content marketing work for companies including IBM, DXC Technology, HP, Aha and Oracle.
As a journalist, I excel at covering breaking news under extreme deadline pressure, getting scoops and crafting insightful news features. I also have 15 years of supervisory experience as a desk editor, assigning and editing stories, coaching reporters and helping plan coverage.
My journalistic work has appeared in dozens of publications in the U.S. and abroad, including Computerworld, PC World, CIO, The Parallax, CSO, eWeek, InfoWorld, The New Stack, ECommerceBytes, the Miami Herald, TechBeacon and FierceCIO.
I’m rigorously attentive to detail, highly organized, fanatical about quality, and easy to work with. I’m able to juggle multiple projects simultaneously and always remain graceful under pressure.
Fully bilingual in Spanish-English, I report, write and edit in both languages, and do bi-directional translations. I have experience working with Latin America and the U.S. Hispanic market.
As a manager, I have successfully drafted long-term strategies, recruited and managed employees, and allocated budgets.
Thought Leadership Pieces for Executives (Bylined and Ghostwritten)
The most popular and successful examples of the sharing economy-the likes of Uber, Airbnb, plus other "Now Economy"-fueled apps-can only exist thanks to a robust telecom infrastructure. Moreover, they're disrupting their respective industries-taxis and hotels-with a minimum of overhead and at breakneck speed.
Water, gas, and electric utilities today face a myriad of challenges, ranging from new breeds of competitors to the aging of their infrastructure-not to mention increasingly limited public financing. They will have to use innovative technology to navigate these market changes and thrive.
E-Book / Solution Brief Samples
Solution brief for a new product
eBook for SMBs interested in learning about SaaS
White Paper Samples
White paper about the way AIOps is helping IT operations teams work remotely from virtual NOCs
This white paper explains how the Qualys Cloud Platform suite of applications can help enterprises implement the Center for Internet Security's 20 Critical Security Controls.
White paper about how to prioritize vulnerability remediation
Infographics
Infographic about how AIOps is helping IT operations teams work remotely in virtual NOCs
Blog Series Sample -- 1
Jane and Emily are CISOs at two large companies which about five years ago almost simultaneously hired a well-known outsourcer that provides back office business services.
We continue our series on assessing third-party risk, where we're describing scenarios in which an automated, cloud-based system can help you identify security and compliance gaps among vendors, partners and employees. As discussed in this series' first installment, it's short-sighted to put great effort into protecting your IT environment while ignoring the security and compliance policies and procedures of your trusted third parties.
We continue our series on assessing third-party risk, where we're describing scenarios in which an automated, cloud-based system can help you identify security and compliance gaps among vendors, partners and employees. In addition to protecting their organization's IT environment, CISOs must also closely monitor the security and compliance policies and procedures of trusted third parties.
We conclude our series on assessing third-party risk, where we've described scenarios in which an automated, cloud-based system can help you identify security and compliance gaps among vendors, partners and employees. As we have outlined in this blog series, CISOs and their infosec teams need clarity and visibility not only into their IT environments, but also across their roster of trusted vendors.
Blog Series Sample -- 2
Overwhelmed by the mounds of vulnerabilities in their IT environments, many organizations struggle to prioritize remediation, but you can overcome this challenge with the right approach Steve, an information security manager, is again rattled awake at 3 a.m. by a recurring nightmare: He's at work and his desk suddenly gets transformed into a mile-long Whack-A-Mole cabinet with thousands of holes.
This is part two in a three-part series on prioritizing vulnerability remediation, where we're explaining five basic requirements for identifying on an ongoing basis which IT assets you must patch right away. In our first post last week we met Steve, a nightmare-stricken infosec manager who loses sleep over his organization's inability to manage its IT environment's vulnerabilities.
This is the last part in our series on prioritizing vulnerability remediation, where we've been outlining basic requirements so you can always identify the IT assets you must patch right away. In our first two posts, we met Steve, an infosec manager whose organization's inability to manage its IT environment's vulnerabilities had turned him into an insomniac.
Individual Blog Post Samples
End users and their devices are right smack in the center of the battle between enterprise InfoSec teams and malicious hackers, and it's not hard to see why. When compromised, connected endpoints - desktops, laptops, smartphones, tablets - offer intruders major entry points into corporate networks.
Destruction of service. Get acquainted with this newly-minted term, and with its acronym - DeOS. It's a particularly disturbing type of cyber attack InfoSec teams may face regularly in the not too distant future. That's one of the main findings featured in the Cisco 2017 Midyear Cybersecurity Report , a comprehensive cyber security study the networking giant has been publishing for almost a decade.
For many years, Jason Kent used a good old-fashioned remote control clicker to open and close his garage door, but the mechanism recently got "appified" so he became curious about its security. His interest isn't surprising.
As cloud computing adoption accelerates among businesses, InfoSec teams are struggling to fully protect cloud workloads due to a lack of visibility into these environments, and to hackers' increasingly effective attacks. That's the main finding from SANS Institute's "Cloud Security: Defense in Detail if Not in Depth" report , which surveyed IT and security pros from organizations of all sizes representing many industries.
Big data simulation and analytics has become an invaluable business tool for media and entertainment (M&E) companies as they seek to maximize the life cycles of movies and TV shows. The business model for TV shows and movies has changed dramatically in the age of digital entertainment and social media.
Case Study Samples
At Western National Insurance, the importance of billing its customers extends beyond processing and managing insurance premium payments. As the primary reason customers contact the company, billing isn't just a peripheral administrative function: it sits at the core of Western National's interactions with its customers across all of the Midwestern, Northwestern and Southwestern United States.
Cabrini Health's Brighton Hospital, an acute care facility that specializes in cancer services, women's health and surgery, recently boosted the speed, precision and quality of its clinical services by improving access to clinical and administrative patient information and introducing electronic medication management.
That phrase was uttered by Confucius 2,500 years ago, but reflects the spirit behind a recent revamp of a Cisco web app development process that made it more effective and secure.
Corporate Brochures / Guides
The best Agile, App Dev, DevOps, Security, Mobile, Cloud and Testing/QA conferences in 2016
Technology Journalism Samples
Here's a DevOps nightmare: It's been a few months since the DevOps adoption project was declared completed. The necessary automation tools are in place. Developers and IT operations staffers now belong to one team. They've been instructed to collaborate and communicate at every step of every applications' life cycle.
In 2011, John H. Gass received a disconcerting message from the Massachusetts Registry of Motor Vehicles: His license had been revoked, and he had to refrain from driving immediately. Gass hadn't received a traffic ticket in years, The Boston Globe reported at the time .
As information security stakes reach stratospheric levels due to massive, frequent and brazen attacks, many IT security managers are weighing whether DevOps can improve applications' protection against data thieves. Given this confluence, it's no surprise the topic has gained prominence in conferences like RSA, which last year added "DevOps" to the title of its long-standing Application Security track.
The VP of IT and the CIO had been having a fine morning. In fact,...
Microsoft is pledging dramatic improvements to its notoriously complex enterprise licensing, but experts are skeptical about the potential impact of the plan. Microsoft's licensing policies and procedures are devilishly convoluted, a situation that has worsened in recent years with the popularity of virtualization, cloud computing, mobile devices and the consumerization of IT.
Every time Mark Zuckerberg has tried to tackle search, he's landed on his back like Charlie Brown after Lucy pulls away the football. Facebook's co-founder and CEO has overseen successful work in areas such as user experience, mobile, display ads, high-performance computing, and multimedia management. But a smart-and conflict-free-search engine has eluded him.
The rocky rollout of Windows 8.1 should serve as a reminder for consumers, software developers, hardware vendors, enterprise IT pros, and Microsoft itself that a period of careful testing and analysis must precede the release and installation of an operating system update. After it shipped on Oct.
When Microsoft ends support for Windows XP on Tuesday, a security sinkhole will likely open and gradually widen, threatening hundreds of millions of PCs worldwide in homes, companies, government agencies and schools. Along with the Y2K bug, Windows XP's support termination is one of the computer industry's most publicized-and most ignored -deadlines, toward which many business and IT managers have taken a curiously casual attitude.
In a great IT industry irony, enterprise social networking (ESN) software, designed to boost interaction and collaboration, is often ignored by users and ends up forgotten like the proverbial ghost town with rolling tumbleweeds.
Long considered old-school tools with no place in shiny corporate social collaboration suites, to-do software is making a comeback with a new air of cool about it and renewed appreciation from enterprise IT. The reason?
To beat external hackers and disgruntled insiders, security vendors, their customers, and law enforcement must boost innovation, partnerships, and awareness about evolving threats. Now. That was a key message at the RSA Conference, whose 25th edition last week drew almost 40,000 attendees hungry to learn how to best protect their organizations from cybercriminals.
When the Moscone Center doors open on February 29, RSA Conference 2016 will kick off its 25 th annual edition, welcoming 30,000-plus attendees hungry for information security knowledge, as massive hacks against corporations and governments continue to occur with an increasingly disturbing frequency.
Are artisans right to be concerned about terms of use they agree to when selling on marketplaces such as Amazon Handmade and Etsy? We dig into the issue and see what the legal experts say about the matter, and what they recommend online sellers do to protect themselves from overreaching agreements.
Cisco will package and deliver enterprise collaboration capabilities via a mobile and Web app built to replicate the ease of use of consumer software but designed for ad hoc, workplace team interaction. The app, called Project Squared, joins a growing number of "consumerized" enterprise mobile and Web apps built by startups and designed to put a spin on collaboration, messaging, productivity, video conferencing and communications.
As the clock ticks down to the start of the DevOps Enterprise Summit 2015 (DOES15), burning questions, spirited debates, and intense market buzz swirl around this new approach to IT. Backers swear that DevOps can revolutionize a company's application development and delivery, but many potential adopters find DevOps confusing and hard to grasp.
After spending the past two years in damage control mode over Windows 8, Microsoft will officially begin a new era for its OS on Tuesday, when it's expected to unveil a preview of Windows' next major version during an event focused on enterprise customers.
Another startup wants to offer mobile messaging to enterprises, even though it's questionable whether such a narrow service can sustain a company and even though it's likely that larger enterprise collaboration vendors will jump into this market.
The release of Delve, the first application to use Microsoft's Office Graph machine learning engine, will be remembered years from now as either the genesis of a revolutionary technology or as a fireworks-style launch that dazzled everyone only for a brief moment.
Microsoft has been screaming "cloud" in many partners' deaf ears for several years, but the company found a more receptive audience at this week's Worldwide Partner Conference. From CEO Satya Nadella on down, all Microsoft officials at the event told attendees that they need to switch their businesses to the cloud urgently, or else risk obsolescence and market defeat.
They came, 1,200 of them, to the City by the Bay to bathe in the sea of DevOps, whose miracle waters are said to be able to transform into nimble software producers even the most rigid of IT departments.
Picture a systems administrator in a traditional IT organization, with clearly delineated boundaries between their IT ops peers and the app developers. They've always viewed the "devs" as undisciplined, creative hippies who know nothing-and care little-about what it takes to keep production systems up and running.
Explosive revelations in the past six months about the U.S. government's massive cyber-spying activities have spooked individuals, rankled politicians and enraged privacy watchdogs, but top IT executives aren't panicking -- yet. So far, they are monitoring the issue, getting informed and taking steps to mitigate their risk in various ways.
Say what you will about Satya Nadella's first six months as Microsoft CEO, but no one can deny the man jumped in with both feet from day one and has led the company with decisiveness. Some of his moves have been met with applause, and others with raspberries.