Six Red Flags of DIY IT (and What to Do if You See Them in Your Business)
The Business Leader’s AI Crash Course ( Jargon and Trends Explained)
The 6 Most Common Cybersecurity Vulnerabilities Found in SMBs (And How To Avoid Them)
What Happens After a Cyber Incident? (Managing the Impacts and Navigating Recovery)
3 Hotel Technology Trends To Watch in 2025 (and How To Respond)
4 Myths Small and Medium Size Businesses Believe About Ransomware (and Why They Aren’t True)
Penetration Testing: Why You Need It and What to Expect
IT Assessments 101: What To Expect and Where To Start
Vulnerability Assessment Services: Why You Need Them and What to Expect

Warren Averett is an accounting and advisory firm whose offerings include comprehensive managed IT services via Warren Averett Technology Group. I write monthly blog posts on cybersecurity, technology trends and more.

Granulate provides autonomous, continuous workload optimization to improve performance and reduce costs for the cloud, Kubernetes, containers, big data, Databricks and on-premise assets.
Modern Workspace Guide to Enabling Your Employee’s Best Work A Comprehensive Guide to Hybrid IT
6 Considerations for Creating a Modern Workspace that Improves Your Employee Experience
Bringing the Power of the Modern Workspace to Life Across Industries
Implementing Hybrid IT the Right Way4 Advantages of a Tailored Hybrid IT Infrastructure

Compugen is an IT solutions provider that services the K-12, higher education, healthcare and retail industries. The client wanted comprehensive guides discussing the modern workspace and hybrid IT.

OdysightAI’s (formerly ScoutCam) Camera-as-a-SensorTM is a visualization and artificial intelligence (AI) platform for enterprises in the Industry 4.0 markets to use for a range of condition-based monitoring and predictive maintenance cases. The technology provides acute visibility in areas that are typically inaccessible.
I was first tasked with editing and rewriting the copy for the Aviation, Energy and Transportation pages. I was then asked to complete a series of blog posts. At the same time, I also began writing and posting content for the company’s Linkedin and Twitter accounts.
Additional samples are available upon request.
The Future of Predictive Maintenance
The Future of Predictive Maintenance Analytics
The Benefits of Predictive Maintenance
What is the Difference Between Preventive and Predictive Maintenance?
What Is The Role Of IoT In Predictive Maintenance?
Reducing Wind Turbine Downtime with a Predictive Strategy
The Role of AI in Predictive Maintenance
5 Steps To Predictive Maintenance With Image-Based AI
Exploring Preventive Maintenance Systems in the Transportation Industry
Use Case: Machine Learning for Predictive Maintenance in Aviation
The Benefits of Using Machine Learning to Predict Maintenance
How Big Data and Analytics Are Transforming Predictive Maintenance
Are Cryptographically Relevant Quantum Computers Prepared to Disrupt Classical Encryption
Big Data Encryption
Data Encryption for the Edge
Deter Cyber Attacks by Thinking Like a Threat Actor
Data Encryption for the Edge
The Supply Chain Attack Problem
Trusting the Security of Modern Networks with Zero Trust
Protecting Against Encrypted Log4j Attacks
Zero-Day Attacks: A Proactive-Common Sense Approach
Battlefield Communication Security Enables the Mission
The Situational Awareness: Preventing Cyber IP Theft
Malware Hiding in Encrypted Traffic Becomes an Increasing Threat

XSOC Corp provides quantum-proof cryptography and encryption services.
My work for this enterprise included completing blog posts, Linkedin posts and responses to journalist requests. For the blog posts, I was also responsible for researching keywords and providing a monthly content calendar.
Additional samples are available upon request.

Capsule 8 provides security for Linux systems, including production servers and containers for onsite and cloud applications.
I was tasked with providing copy for technical overviews according to specific guidelines on the following cybersecurity topics: EDR, threat hunting, endpoint security and IPS.
Capsule 8 has since been acquired by Sophos.