Portfolio

Portfolio

These examples are only a small representation of my previous work. Additional samples are available; just reach out to me if you’re interested in a specific technology, content type or other parameter.

Blogs, infographics, listicles image | Millwrites LLC

Blogs, Infographics, Listicles

The Key Benefits of URL Filtering (blog, ghostwritten)

Consolidating Security with the Power of Virtualization (blog, ghostwritten)

Settle for More, Not Less (blog, ghostwritten)

The Dystopian New Normal of Ransomware (blog)

How Safe is OpenSSL? Part I (blog/infographic, ghostwritten)

How Safe is OpenSSL? Part II (blog, ghostwritten)

How Safe is OpenSSL? Part III (blog, ghostwritten)

10 Steps to a Smoother ADC Deployment (Plus a Bonus) (listicle, ghostwritten/co-written)

RDP Under Attack: How to Protect against Trojan.sysscan (blog)

Contributed Articles image | Miillwrites LLC

Contributed Articles

(All ghostwritten)
Navigating The Fast-Changing Cybersecurity Landscape, Forbes.com

4 Things to Consider When Virtualizing Networking and SecuritySDX Central

How NFV Can Revitalize the VAR Business ModelChannel Futures

2018: The Year of Enterprise NFVVM Blog

Virtual Versus Reality: The Challenges of Enterprise NFV AdoptionSDX Central

Reader Forum: Recent attacks on RDP – what you should know.RCR Wireless

Making Virtual Network Functions a Practical RealityVM Blog

How To Get The Balance Of Performance & Flexibility In A Virtual EnvironmentVAR Insights

WAN Optimization for Performance and ThroughputData Center Post

Breathing new life into SSL VPNs: Making the most of the security benefitsHelpNet Security

Capitalizing on Cloud ServicesChannelPro Network

A vision for secure mobility management in the enterpriseNetwork World

Managing your own network security servicesZDNet

The Hosted Telephony Alternative: Is It Right for Your Business?Internet Telephony