Online
Infosecurity
- Understand the Inherent Risk in Browser Extensions
- Failed Incident Responses from 2017 Provide Important Case Studies
- Understand the Inherent Risk in Browser Extensions
- Why is the Lucrative Cybersecurity Field still Struggling to Hook Prospective Practitioners?
- A Step in the Right Direction for Small Business Cybersecurity
- Time: An Attacker’s Best Friend
- The Battle for Cybersecurity Talent Must Include Retention Emphasis
- The Helpful Hack that Started it All
- Building Cyber-Maturity Through Understanding Supply Chain Risks
- Major Lessons to be Learned from 2020 Security Mishaps
CSO
DarkReading
ISACA Magazine
Infosecurity Magazine
Newspaper
Daily Herald
Interviews
Dark Reading
- 8 Security Spring Cleaning Tips for the Home Office
- Automation Exacerbates Cybersecurity Skills Gap
- It Takes an Average of 3 to 6 Months to Fill a Cybersecurity Job
HealthIT Security
CNBC
ABC
Tech Target
EdTech
White Papers
ISACA
Books
Cybersecurity Program Development for Business: The Essential Planning Guide (contributor)