Writing Portfolio
Blogs
Understanding and preventing common security vulnerabilities
Buildkite
Types of social engineering attacks & how to protect against them
Electric
How to ensure your employees’ home wireless networks are secure
Electric
Are your SaaS applications secure?
Electric
NY SHIELD Act’s impact on your SMB
Electric
The true cost of SSO for SMBs
Electric
Insightful analysis begins with asking the right questions
Sigma
Evaluating machine learning models with a confusion matrix
Algorithmia
Best practices for home network security
Electric
Which software is recommended for network monitoring?
Electric
How secure is your network firewall?
Electric
IT: Invest now so you don’t have to pay later
Electric
Harnessing Machine Learning for Data Science Projects
Algorithmia
Building compound analytical interest with your company data
Sigma
Statistics and machine learning: what’s the difference?
Algorithmia
Open data access: Is it really the wild west?
Sigma
How Uber, Facebook, and Netflix do SSH
Teleport
What is SOC 2 compliance?
Electric
CCPA’s impact on your business
Electric
5 machine learning models you should know
Algorithmia
The state of machine learning in financial services
Algorithmia
Long form
HR & IT alignment
Electric
What is network management?
Electric