Lysis is the pen name for a technology web content writer. I provide high quality content for the technology industry including white papers, technical documentation, SEO articles, blog posts and tutorials. I've written for IBM, Verizon and Rackspace on a variety of technologies for end-users and management.
I'm a software engineer who has written several web and mobile applications, so I can provide technology articles at a more detailed level than most writers.
My expertise includes:
* Server technology (IIS, web management, configurations)
* Programming (MVC C#, PHP, VB.NET, Android, Java, and HTML)
* Web design and development (UX, UI, CSS, and dynamic content)
* Hacking and security (web security, analysis and defense)
* General Internet culture and information
* Computer hardware and disaster recovery
* Cloud computing
To read some of my musings, I blog on my dev site at pinkhatcode.com.
Contact me for web content in any of these areas for a quick turnaround and extensively researched articles.
In 2021, the Biden administration signed an executive order requiring all developers for US government agencies to keep a software bill of materials. This document creates an audit trail for every installed third-party library used within application code. Even if you don’t code for US governments, you can still use a software bill of materials to better track potential vulnerabilities, ensure libraries have appropriate security patches installed, and improve your application cybersecurity.Words: 1034 Downloads: 0 Category: Web Development By: Lysis
Enterprise administrators and individuals must defend their computer resources from numerous attacks to avoid a data breach, but cryptojacking is another form of malware that aims to hijack resources instead. Cryptojacking is malware that mines cryptocurrency for an attacker, and sophisticated cryptojacking can make attackers millions. To avoid being the next victim, cybersecurity safeguards should include protections from crypto-mining malware.Words: 1050 Downloads: 0 Category: IT By: Lysis
Third-party software libraries and vendors are useful for reducing software development time. Embedding other developer code into your application should be done with care. A component in good application security and any cybersecurity policy is constant review of code and ensuring that these libraries are always patched.Words: 1025 Downloads: 0 Category: Web Development By: Lysis
Most organizations know the importance of data protection and safeguarding customer information, but they struggle to find the right cybersecurity strategy. A shift left cybersecurity strategy changes the way organizations handle monitoring and detection of software vulnerabilities. Instead of scanning software after it's deployed, a shift left strategy is proactive in detecting and remediating vulnerabilities.Words: 1029 Downloads: 0 Category: IT By: Lysis
Security misconfigurations are a common vulnerability across numerous networks. For example, it's not uncommon for administrators to provision cloud resources such as AWS S3 storage buckets with the wrong permissions, allowing anyone with an internet connection to read corporate files stored in the cloud. Misconfigured cybersecurity infrastructure and cloud resources let attackers steal your data, and it could go unnoticed until your private data is sold on darknet markets.Words: 1019 Downloads: 0 Category: IT By: Lysis
Intrusion detection and intrusion prevention are two cybersecurity strategies that alert administrators when an anomaly is detected and proactively stops threats from compromising your environment. Both have their own advantages and disadvantages, and they both play a unique role in cybersecurity defense. Before you choose a system, you should know how both of them work.Words: 1009 Downloads: 0 Category: IT By: Lysis
If you’re passionate about the written word and have a proven track record in creating exceptional content, then we should talk. We’re always looking to find great content and copywriters to join our site.Writer Registration