Corporate blogger

Over the years I have written many blog posts for various corporate clients. Here are links to these efforts. Note, blogs come and go, some links may no longer be active.


I began writing articles and working as the site evangelist in August 2015. Here is a link to my work.

Avast blog

In March 2020 I began writing a series of posts of tips and commentary about various infosec topics.

Network Solutions blog

In April 2020 I began writing both blog posts and ebooks for them, mostly on security topics.

Various RSA blogs

I was the blogger-in-residence for the annual RSA Archer conference in 2018. I also contributed these blog entries:

HPE’s Enterprise.Nxt blog

I began writing for them in 2017.

Red Hat Developer Blog

I began writing for them in October 2019 on various issues.

Kaspersky blog

In September 2019, I began writing for them on infosec topics.

iBoss blog

I began writing security-related articles for them in 2016. They have removed most of these articles, contact me if you want any copies of them.

  • We still have plenty of network printer attacks (3/18)
  • A tour of current blockchain exploits (2/18)
  • Ten ways to harden WordPress (2/18)
  • The year of vulnerabilities in review (12/17)
  • What is HTTP Strict Transport Security? (12/17)
  • How to cope with malicious PowerShell exploits (10/17)
  • How to secure containers (10/17)
  • Implementing better email authentication systems (10/17)
  • What is WAP billing and how is it being exploited? (9/17)
  • The difference between anonymity and privacy (9/17)
  • What is OAuth and why should I care?  (8/17)
  • The dark side of SSL certificates (8/17)
  • What is the CVE and why is it important (8/17)
  • Why you need to deploy IPv6 (7/17)
  • Three-part series on the new rules of MFA (7/17)
  • What is fileless malware? (6/17)
  • How ransomware is changing the nature of customer service (6/17)
  • WannaCry: Where do we go from here? (5/17)
  • What is a booter and a stressor? (12/16)
  • The challenges and opportunities for managing IoT (12/16)
  • Who are the bug bounty hunters (11/16)
  • How to heighten HIPAA security (10/16)
  • Why grammar counts in decoding phished emails (10/16)
  • How to communicate to your employees after a breach (9/16)
  • 6 Lessons Learned from the US Secret Service on How to Protect Your Enterprise (9/16)
  • Economist paints a dark future for banking industry (8/16)
  • Wireless keyboards vulnerable to hacking (8/16)
  • Hacking Your Network Through Smart Light Bulbs (8/16)
  • Windows 10 Anniversary security features: worth the upgrade (8/16)
  • How to implement the right BYOD program (8/16)
  • The benefits and risks of moving to BYOD (8/16)
  • There is no single magic bullet for IoT protection (7/16)
  • Beware of wearables (7/16)
  • Understanding the keys to writing successful ransomware ((7/16)
  • It’s Time to Improve Your Password Collection (6/16)
  • Euro banking cloud misperceptions abound (6/16)
  • Beware of ransomware as a service (6/16)
  • When geolocation goes south (5/16)
  • Turning the tide on polymorphic malware (5/16)
  • How stronger authentication can better secure your cloud (4/16)
  • The Internet-connected printer can be another insider threat (4/16)
  • Beware of malware stealing credentials (4/16)

Citrix Synergy show blog

During May 2017, I wrote a series of blog posts from the annual show.

Quickbase Blog 

I write occasional pieces on collaboration and spreadsheet-related topics.

Veracode Blog

EventTracker Blog

GoDaddy Garage

I wrote a series how-to articles for this site in the summer of 2015. A complete collection of my articles can be found here. They cover how to set up various VPNs and other products.

VMware Erdos/ IT outcomes blogs

I began writing several items for them in 2015:

Masergy blog

Bright Computing Blog

Solution Providers for Retail blog

(This blog has been taken down, sorry.) Between 2013-15, I contributed a series of articles on how VARs can better support their retail customers, including information gleaned from an extensive report on the restaurant industry.

IT Central Station

I have been contributing content to this community-driven site for several years, mostly reprints of my video screencast product reviews. Here is an article on application performance monitoring that I did for them in March 2015.

New Relic Blog

In 2014 I began writing some pieces for them about programming-specific topics.

Ricoh-sponsored blog called

I have written a series of general interest stories for this blog from 2013-5, including security, personal productivity, and IT management topics. The blog has been taken down.

Smartbear blog

Software development tools vendor Smartbear has a rich blog full of interesting articles on this topic, and I have written a couple of pieces during 2013 here.

Mozy blog

I have written another series of technically-minded articles for their blog that began in 2012, including security, IT management, and Internet-related topics. Sadly, these were taken down.

AT&T Networking Exchange Blog

I wrote a couple of posts on network security for them several years ago, and the blog is no longer operating.

The Freelancer blog

This blog, which was begun in 2012, covers generally freelancing work issues and I have written several stories about my own freelancing business and strategies learned over the years from the school of hard knocks. Here is a collection of my stories.

Internet Protocol Journal

This semi-scholarly periodical covers advanced Internet topics. I have written for them several times:

CA Blogs

Beginning in 2013, I wrote these security and cloud-related stories for several CA-sponsored blogs. Most of this content has been removed. Here is one sample:

HP-sponsored website called Input/Output

This is a custom published site with independent editorial content with HP as its sole sponsor. I have been writing for them for several years, here are some samples of the pieces that I have done for them. Sadly, HP took down the blog.

This is a Dell-sponsored IT information site that was begun in 2009 and now discontinued. I have written product reviews, case studies, how-to articles, and screencast review videos. Many of these articles concern how to migrate from XP to Windows 7.

White papers

I write occasional white papers for clients on technical topics, including security, network applications, and Internet services.

0 thoughts on “Corporate blogger

  1. I notice an error in the article you have published about hard drives….
    You refer to the IBM 305RAMDAC as holding 5MB. It didn’t. It held 5 million _6bit_ words. Just 3.75MB. 🙂

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.