nDash.com is a content creation platform that provides brands and agencies with access to the world's top freelance writers.
A technology journalist focused on helping B2B tech companies tell their unique stories. Not just selling their products, but engaging audiences by delivering content that really solves problems.
Senior IT/Technology Writer and Content Marketing Strategist (B2B)
I’m a technology journalist with seven years' experience creating content for SaaS, cybersecurity, FinTech, IoT, cloud computing, and AI verticals. As a content marketing strategist (obsessed with innovating new ways of creating amazing and crazily effective content), I help enterprises address the challenges of marketing to the new generation of tech-savvy consumers.
With experience writing and editing in the technology space, I’m comfortable creating both consumer-focused tech write-ups and content geared toward a discerning B2B audience. I’m excited about the way software, automation, artificial intelligence, and all-around interconnectedness holds the promise to transform the way the entire world works and live, and I’m thrilled to channel that excitement into developing engaging branded content.
When I'm not working, you’ll find me reading on the beach, going on hikes, and working up the courage to backpack across the world.
As organizations grow in size and complexity, so do their security and compliance needs. While Vanta's library of controls and supported frameworks are extensive, eventually, you may wish to use your internal expertise to build a framework Vanta doesn't support or create custom controls. Today we are excited to introduce custom frameworks and enhancements to custom controls to help you improve your workflows, organize your security commitments, and manage your work at scale.
The rapid pace of data growth means more storage mechanisms – and invariably, more headaches. From the management of storage sprawl to finding scalable storage solutions, data center administrators have their work cut out for them.
For organizations already running SharePoint On-Premises, migrating to its cloud version may be somewhat easier, but for first-timers, it could entail a ton of pitfalls, headaches and things to consider that will keep you up at night staring at the ceiling. Before making the move to SharePoint Online, let’s take a break to understand what the cloud version of SharePoint is all about, its pros, cons and most importantly, whether it’s the right choice for you.
Cybersecurity is not just about protecting your cyber assets, it’s way beyond that. To achieve the highest level of cyber security, organizations must understand it in the context of cyber assets as well as attack surface management. Nowadays, organizations get hacked because of insecure entry points such as software, code repositories, applications, cloud assets, ephemeral devices, etc. The rapid adoption of cloud platforms, APIs, and digital transformation have indeed accelerated new produc
With the full possibilities of the IoT yet to be explored, even professionals are divided on the issue of whether progress in the IoT industry will result in salvation or disaster for our environment.
In recent times, technological innovations have made a tremendous impact on all industries and revolutionized the way business processes have been carried out…and the trucking industry is no exception. Electronics, digital devices, and global positioning systems have improved communications and changed the way trucking companies operate while computers have taken over the organization and supervision of loading and routing activities to minimize the rate of empty movement.
Inspired by the rousing keynote speech delivered by Didac Lee at the 2017 Cranfield University Venture Day, this article offers practical concepts to brands and retailers on how to use the “Fail often and fast” methodology to grow and stay ahead of the competition.
With the advent of the Fourth Industrial Revolution and the pervasive digitization of virtually all industries, information systems have become indispensable. Savvy organizations leverage them to improve efficiency in production and delivery of products/services to clients. With their widespread adoption and integration into nearly all areas of business activities, information systems now rule today’s business landscape.
All it takes for cybercriminals to breach your mission-critical networks, database, and IT systems is a single unpatched vulnerability. To prevent this and maintain good cyber hygiene, you need to obtain real-time vulnerability data. Vulnerability scans generate a lot of data that when analyzed reveal several security flaws. Given the time and resources required to fully scan modern IT infrastructures, many organizations (especially those with a large number of digital assets and complex net
As organizations increasingly move towards digital transformation, their attack surfaces have grown larger and more complex every passing day. This, in turn, is creating new opportunities for cybercriminals to exploit vulnerabilities and gain access to sensitive data. To stay ahead of these threats, organizations must take a proactive approach to their security posture and improve their attack surface visibility for attack surface reduction. That’s where cyber asset management (CAM) comes in.
Part of the challenge of creating a robust security posture is collecting the right toolbox full of tools and services. There’s a wide world out there full of tools that can enhance your security, but one of the most productive types of tools every organization needs is a vulnerability scanning tool. To help you navigate these types of tools and recognize how they fit into your information security system, we’re taking a closer look at these tools and how they work.
In recent years, Natural Language Processing (NLP) has become an essential technology in the field of AI and machine learning. This has been attributed to a growing need to understand human language and text, its intent, sentiments, implied meanings, and
For the UK retail industry, 2018 will find retailers coming up with various strategies to transform and improve their in-store relationship with customers. Retail has gone past the point of simply providing products and services to customers. To succeed in the over-crowded retail market (with shops, malls, and grocery store on virtually every street corner), retailers must fight to become the top destination for customers.
Helped clients engage their audience by providing interesting and well-converting web content. Services include writing web content, landing pages, SEO articles, press releases, how-to articles, and whitepapers on verticals ranging from AI, machine learning, and deep neural networks to SaaS, cybersecurity, cloud services and the latest trends in the tech industry.
Company: Silver Creations
I worked there from 9/2018 until now
Increased brand awareness for B2C and B2B companies and other businesses through developing content for company websites, blogs, white papers, business collateral, case studies, and advertising copy. Handled the creation of content and brand support materials for client companies, embarking on inbound marketing campaigns. Created rich, compelling content for marketing, e-commerce, public relations, and social media campaigns for a number of clients including Cargo42, DisplayMode, and Epsilon,
Company: SkyWord, Pepper Content, Shopify/6River, ClearVoice
I worked there from 2/2017 until 3/2023
Developed and maintained incident response strategy critical to supporting Cybersecurity Incident Response (CSIR) activities Drove re-alignment of CSIR activities, priorities, strategy, governance, risk and compliance, disaster recovery and business operations Responsible for executing processes within the security Incident response lifecycle. These activities include: detection, triage, analysis, containment, recovery and reporting Coordinated response, triage and recovery activities for securi
Company: Epsilon Communications
I worked there from 6/2014 until 8/2017