Lysis is the pen name for a technology web content writer. I provide high quality content for the technology industry including white papers, technical documentation, SEO articles, blog posts and tutorials. I've written for IBM, Verizon and Rackspace on a variety of technologies for end-users and management.
I'm a software engineer who has written several web and mobile applications, so I can provide technology articles at a more detailed level than most writers.
My expertise includes:
* Server technology (IIS, web management, configurations)
* Programming (MVC C#, PHP, VB.NET, Android, Java, and HTML)
* Web design and development (UX, UI, CSS, and dynamic content)
* Hacking and security (web security, analysis and defense)
* General Internet culture and information
* Computer hardware and disaster recovery
* Cloud computing
To read some of my musings, I blog on my dev site at pinkhatcode.com.
Contact me for web content in any of these areas for a quick turnaround and extensively researched articles.
Using the Kipling Method, system administrators have a defined set of rules to help with logging and forensics after a cybersecurity incident. Together with network segmentation firewalls, an organization can build a zero-trust network. These networks have better cybersecurity defenses and limit the amount of data an attacker can steal after a data breach. | Read More →Words: 1089 Downloads: 0 Category: IT By: Lysis
A zero-trust authentication model limits access to network resources and assumes that every user could be an attacker. By assuming every user and application could be an attacker, an organization's IT department can better protect itself from critical data breaches. Together with the least privilege authorization model, zero-trust environments better defend against attackers and exploits such as ransomware, phishing, credential theft, social engineering, and command and control (C2) malware, and improve cybersecurity posture. | Read More →Words: 1135 Downloads: 0 Category: IT By: Lysis
Attackers who take advantage of poor network security aren't always thousands of miles away. Some attackers are right next door and use wardriving as a way to obtain sensitive data. Wardrivers use specially crafted applications that detect open, insecure Wi-Fi access points. When insecure wireless networks are found, the attacker can then connect and exfiltrate data directly from your home network devices. Home network users that have Wi-Fi hotspots set up should implement security procedures that protect from wardialing. | Read More →Words: 1124 Downloads: 0 Category: IT By: Lysis
As anti-malware systems continue to evolve, attackers also innovate and create ways to avoid detection. The latest trend is fileless attacks, where users download a "harmless" file, and the attack uses native tools to download additional payloads. LOLBins such as Nodersok use Node.exe (part of the Node.js framework) and PowerShell to turn local machines into proxies to perform click fraud. It starts with phishing and ends with user machines that contribute to fraud rings. | Read More →Words: 1023 Downloads: 0 Category: IT By: Lysis
Disaster recovery plans are critical to successful mitigation, containment and recovery of data after a successful ransomware attack. Cybersecurity defenses are never 100 percent impenetrable, so it's important that organizations have backups and the right plan in place after an incident. These plans, along with proper backups, reduce the cost of data recovery and loss, productivity downtime and mitigation. | Read More →Words: 1019 Downloads: 0 Category: IT By: Lysis
Some of the most critical cybersecurity incidents have stemmed from successful ransomware attacks. Ransomware encrypts critical files and holds them hostage for a fee. In recent years, several public and private organizations have been unable to service customers and retrieve data after ransomware encrypted files. In some cases, companies were forced to go back to pen-and-paper documentation. Using the right configurations and user training, corporations can greatly reduce risks of falling victim to ransomware attacks. | Read More →Words: 1100 Downloads: 0 Category: IT By: Lysis
If you’re passionate about the written word and have a proven track record in creating exceptional content, then we should talk. We’re always looking to find great content and copywriters to join our site.Writer Registration