About Me

Hey there — I'm Josh! I'm a seasoned writer, editor, and digital strategist with over 10 years of experience developing content for some of the most innovative technology brands.

My corporate background is in business operations, where I spent more than a decade in senior management and executive roles in the manufacturing and retail sectors. 

Having this hands-on experience means I don't just write about business challenges or solutions — I’ve actually experienced and worked through them myself. This unique perspective has helped me create highly authoritative content for a wide range of industry-leading clients. 

Whether I'm developing in-depth technical guides for cloud-based SaaS providers, building B2B landing pages, or helping cybersecurity startups execute their SEO/GEO strategies, my objective is always the same — deliver results that inspire reader action.

Quishing: A growing threat hiding in plain sight

Our mobile devices go everywhere we go, and we can use them for almost anything. For businesses, the accessibility of mobile devices has also made it easier to create more interactive ways to introduce new products and services while improving user experiences across different industries.

Quick-response (QR) codes are a good example of this in action and help mobile devices quickly navigate to web pages or install new software by simply scanning an image.

CISA warns about directory traversal vulnerabilities

On May 02, 2024, CISA and the FBI released a Security by Design alert to all software manufacturers and customers regarding an ongoing security vulnerability associated with “directory traversal” (also known as path traversal) in the software design process.

The software industry has already documented directory traversal vulnerabilities in the past, as well as identified practical approaches to eliminate these vulnerabilities entirely over the next two decades.

39% of MSPs report major setbacks when adapting to advanced security technologies

SOPHOS, a leading global provider of managed security solutions, has recently released its annual MSP Perspectives report for 2024.

This most recent report provides insights from 350 different managed service providers (MSPs) across the United States, United Kingdom, Germany and Australia on modern cybersecurity tools solutions. It also documents newly discovered risks and challenges in the industry.

New CISA guidance for organizations adopting Single Sign-On | IBM

The Cybersecurity and Infrastructure Security Agency (CISA) recently conducted a comprehensive study of various small and medium-sized businesses to help identify common challenges and opportunities associated with Single Sign-On (SSO) adoption.

SSO has garnered considerable chatter across several industries, especially regarding its ability to improve security while extending a certain level of convenience to employees using this protocol.

ICS CERT predictions for 2024: What you need to know

As we work through the first quarter of 2024, various sectors are continuously adapting to increasingly complex cybersecurity threats. Sectors like healthcare, finance, energy and transportation are all regularly widening their digital infrastructure, resulting in larger attack surfaces and greater risk exposure.

Kaspersky just released their ICS CERT Predictions for this year, outlining the key cybersecurity challenges industrial enterprises will face in the year ahead.

How to craft a comprehensive data cleanliness policy

Practicing good data hygiene is critical for today’s businesses. With everything from operational efficiency to cybersecurity readiness relying on the integrity of stored data, having confidence in your organization’s data cleanliness policy is essential.

But what does this involve, and how can you ensure your data cleanliness policy checks the right boxes? Luckily, there are practical steps you can follow to ensure data accuracy while mitigating the security and compliance risks that come with IT.

New cybersecurity sheets from CISA and NSA: An overview

The Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA) have recently released new CSI (Cybersecurity Information) sheets aimed at providing information and guidelines to organizations on how to effectively secure their cloud environments.

This new release includes a total of five CSI sheets, covering various aspects of cloud security such as threat mitigation, identity and access management, network security and more.

Cloud threat report: Possible trend in cloud credential "oversaturation"

For years now, the dark web has built and maintained its own evolving economy, supported by the acquisition and sales of stolen data, user login credentials and business IP.

But much like any market today, the dark web economy is subject to supply and demand.

A recent X-Force Cloud Threat Landscape Report has shed light on this fact, revealing a new trend in the average prices for stolen cloud access credentials.

The Intersection of Data Loss Prevention and Scam Detection: A Comprehensive Guide

Today's businesses frequently face a barrage of security risks, ranging from harmful malware to unauthorized access attempts and social engineering schemes. While many companies might overlook the frequency of these threats to their business, a single successful intrusion can bring a business to its knees.

Considering this, companies must strike the right balance when safeguarding their data and digital assets. While data loss prevention is essential, setting up the proper mechanisms to identify and address scams and fraud in real time is vital.

Secure Internet Gateway: Do you have your DNS server controlled and covered?

Modern-day working environments have changed significantly over the years, and the IT landscape has evolved along with them. Digital transformations have now necessitated the need for cloud technology adoption and the creation of mobile workforces, adding new layers of complexity when it comes to building, supporting, and securing critical business infrastructure.

Adding to this complexity is the global concern behind the frequency and severity of modern-day cyber attacks, impacting 1 in 5 comp...

What is Auto-Containment?

We’ve all been there: You’re doing research online and download a new program onto your computer. Suddenly a pop-up on the bottom of your desktop informs you something may be wrong. The antivirus program you’re running has flagged the newly-downloaded file as something suspicious, and you’re left deciding whether to trust the source of the file or not.

At this point, most people are left with one of two options: delete the file and move on, or roll the dice, run the program, and hope for the be...

Do Cyber Thieves Ever Get Caught? What's the Punishment?

We now live in a world where digital communication and technology has become a large and complex part of society. Almost everything we touch is now interconnected, and leaving some form of digital footprint behind is a virtual dead-certainty.

An unfortunate side-effect of this digital dependency is that cyber-crime has become a huge problem, resulting in an estimated $600 billion in losses every year. A new business was hit with a ransomware attack every 14 seconds in 2019 . The number of ranso...
Load More