Articles
So, you Think You’re Ready for a CMMC Level 2 Assessment? (guest blog for CuickTrac
Attacking The Low Hanging Fruit: Leveraging existing business processes to meet compliance requirements (guest blog for the CMMC Center of Awesomeness)
Local attacks highlight growing trend of cyber crimes published in Lagniappe July 31, 2019 (contributor)
Back to Basics: Information Security for SMBs published in Tripwire's "The State of Security" blog on 2019-07-16 (author)
Assessing Cyber Security Risk: You Can’t Secure It If ... a 6-part series
published in 2017, Business View magazine by the Mobile Area Chamber of Commerce
You Don't Know It's There (page 20)
You Don't Know How It's Configured (page 23)
You Don't Know Who Has Access (page 32)
You Don't Know What They're Doing With It (page 20)
You Don't Know How It Works (page 18)
You Don't See It (page 15)
Assessing Cyber Security Risk: You Can’t Secure It If…... (Part Two) published in Tripwire's "The State of Security" blog on 2017-01-19 (author)
Cyber Security Risk: You Can't Secure It If" (Part One) published in Tripwire's "The State of Security" blog on 2016-12-15 (author)
Defeating Cybercrime with Awareness & Good Habits published in Tripwire's "The State of Security" blog on 2016-10-12 (author)
Expert Advice on How to Create a Security Culture at the Workplace published in Tripwire's "The State of Security" blog on 2016-10-09 (contributor)