Lysis Available!


Licenses Sold


Licenses Sold


Full Rights
Licenses Sold


Total Articles


Writer Biography

Lysis is the pen name for a technology web content writer. I provide high quality content for the technology industry including white papers, technical documentation, SEO articles, blog posts and tutorials. I've written for IBM, Verizon and Rackspace on a variety of technologies for end-users and management.

I'm a software engineer who has written several web and mobile applications, so I can provide technology articles at a more detailed level than most writers.

My expertise includes:

* Server technology (IIS, web management, configurations)
* Programming (MVC C#, PHP, VB.NET, Android, Java, and HTML)
* Web design and development (UX, UI, CSS, and dynamic content)
* Hacking and security (web security, analysis and defense)
* General Internet culture and information
* Computer hardware and disaster recovery
* Cloud computing

To read some of my musings, I blog on my dev site at

Contact me for web content in any of these areas for a quick turnaround and extensively researched articles.

To See Detailed Writer Profiles

Sign Up or Login

Applying the Kipling Method to Cybersecurity and Firewall Segmentation

Using the Kipling Method, system administrators have a defined set of rules to help with logging and forensics after a cybersecurity incident. Together with network segmentation firewalls, an organization can build a zero-trust network. These networks have better cybersecurity defenses and limit the amount of data an attacker can steal after a data breach. | Read More →

Words: 1089   Downloads: 0   Category: IT   By: Lysis

What is Zero-Trust Authentication and How Does It Improve Cybersecurity?

A zero-trust authentication model limits access to network resources and assumes that every user could be an attacker. By assuming every user and application could be an attacker, an organization's IT department can better protect itself from critical data breaches. Together with the least privilege authorization model, zero-trust environments better defend against attackers and exploits such as ransomware, phishing, credential theft, social engineering, and command and control (C2) malware, and improve cybersecurity posture. | Read More →

Words: 1135   Downloads: 0   Category: IT   By: Lysis

How to Protect Your Home Network from Wardriving

Attackers who take advantage of poor network security aren't always thousands of miles away. Some attackers are right next door and use wardriving as a way to obtain sensitive data. Wardrivers use specially crafted applications that detect open, insecure Wi-Fi access points. When insecure wireless networks are found, the attacker can then connect and exfiltrate data directly from your home network devices. Home network users that have Wi-Fi hotspots set up should implement security procedures that protect from wardialing. | Read More →

Words: 1124   Downloads: 0   Category: IT   By: Lysis

A New Trend in Malware: LOLBins and Fileless Attacks

As anti-malware systems continue to evolve, attackers also innovate and create ways to avoid detection. The latest trend is fileless attacks, where users download a "harmless" file, and the attack uses native tools to download additional payloads. LOLBins such as Nodersok use Node.exe (part of the Node.js framework) and PowerShell to turn local machines into proxies to perform click fraud. It starts with phishing and ends with user machines that contribute to fraud rings. | Read More →

Words: 1023   Downloads: 0   Category: IT   By: Lysis

Why a Disaster Recovery Plan Can Reduce Critical Damage from Ransomware

Disaster recovery plans are critical to successful mitigation, containment and recovery of data after a successful ransomware attack. Cybersecurity defenses are never 100 percent impenetrable, so it's important that organizations have backups and the right plan in place after an incident. These plans, along with proper backups, reduce the cost of data recovery and loss, productivity downtime and mitigation. | Read More →

Words: 1019   Downloads: 0   Category: IT   By: Lysis

6 Tips to Ensure Your Company Doesn’t Fall Victim to Ransomware

Some of the most critical cybersecurity incidents have stemmed from successful ransomware attacks. Ransomware encrypts critical files and holds them hostage for a fee. In recent years, several public and private organizations have been unable to service customers and retrieve data after ransomware encrypted files. In some cases, companies were forced to go back to pen-and-paper documentation. Using the right configurations and user training, corporations can greatly reduce risks of falling victim to ransomware attacks. | Read More →

Words: 1100   Downloads: 0   Category: IT   By: Lysis

New to Constant Content? Please signup to continue:

Already registered? click here to login.

Please Verify The Following Data

Please Enter a Name
Please Enter an Email
Please Enter an Phone Number
Please Select a Country
Passwords must be minimum of 6 characters
Please Enter a Valid Password
Please Enter a Valid Confirmation Password
Passwords Do Not Match

  Fields with * are required
Name  *
Email  *
Password  *
Confirm Password  *
Phone Number  *
Country:  *

By creating an account I confirm that:
I understand the licensing rights and accept the full terms and conditions.

* is the sole owner of the information collected on this site.
We will not sell, share, or rent your email address or any other personal information.


Not registered? Click here to register.

Please Verify The Following Data

Enter an Email
Enter a Password

Get Started in 30 Seconds

Create an account to find and buy existing articles, order new custom content, manage your projects and connect to over 100,000 professional content writers.

Sign Up Today

Get Started in 30 Seconds

Create an account to find and buy existing articles, order new custom content, manage your projects and connect to over 100,000 professional content writers.

Sign Up Today

Want to
Write for Us?

If you’re passionate about the written word and have a proven track record in creating exceptional content, then we should talk. We’re always looking to find great content and copywriters to join our site.

Writer Registration