Lysis Available!


Full Rights Licenses Sold


Total Articles


Writer Biography

Lysis is the pen name for a technology web content writer. I provide high quality content for the technology industry including white papers, technical documentation, SEO articles, blog posts and tutorials. I've written for IBM, Verizon and Rackspace on a variety of technologies for end-users and management.

I'm a software engineer who has written several web and mobile applications, so I can provide technology articles at a more detailed level than most writers.

My expertise includes:

* Server technology (IIS, web management, configurations)
* Programming (MVC C#, PHP, VB.NET, Android, Java, and HTML)
* Web design and development (UX, UI, CSS, and dynamic content)
* Hacking and security (web security, analysis and defense)
* General Internet culture and information
* Computer hardware and disaster recovery
* Cloud computing

To read some of my musings, I blog on my dev site at

Contact me for web content in any of these areas for a quick turnaround and extensively researched articles.

To See Detailed Writer Profiles

How a Software Bill of Materials Helps with Cybersecurity of Your Corporate Applications

In 2021, the Biden administration signed an executive order requiring all developers for US government agencies to keep a software bill of materials. This document creates an audit trail for every installed third-party library used within application code. Even if you don’t code for US governments, you can still use a software bill of materials to better track potential vulnerabilities, ensure libraries have appropriate security patches installed, and improve your application cybersecurity.

Words: 1034   Downloads: 0   Category: Web Development   By: Lysis

What is Cryptojacking?

Enterprise administrators and individuals must defend their computer resources from numerous attacks to avoid a data breach, but cryptojacking is another form of malware that aims to hijack resources instead. Cryptojacking is malware that mines cryptocurrency for an attacker, and sophisticated cryptojacking can make attackers millions. To avoid being the next victim, cybersecurity safeguards should include protections from crypto-mining malware.

Words: 1050   Downloads: 0   Category: IT   By: Lysis

Cybersecurity and Data Protection in the Software Development Supply Chain

Third-party software libraries and vendors are useful for reducing software development time. Embedding other developer code into your application should be done with care. A component in good application security and any cybersecurity policy is constant review of code and ensuring that these libraries are always patched.

Words: 1025   Downloads: 0   Category: Web Development   By: Lysis

Why is Shift Left Cybersecurity in the Development Lifecycle Important?

Most organizations know the importance of data protection and safeguarding customer information, but they struggle to find the right cybersecurity strategy. A shift left cybersecurity strategy changes the way organizations handle monitoring and detection of software vulnerabilities. Instead of scanning software after it's deployed, a shift left strategy is proactive in detecting and remediating vulnerabilities.

Words: 1029   Downloads: 0   Category: IT   By: Lysis

5 Common Security Misconfigurations That Lead to a Data Breach

Security misconfigurations are a common vulnerability across numerous networks. For example, it's not uncommon for administrators to provision cloud resources such as AWS S3 storage buckets with the wrong permissions, allowing anyone with an internet connection to read corporate files stored in the cloud. Misconfigured cybersecurity infrastructure and cloud resources let attackers steal your data, and it could go unnoticed until your private data is sold on darknet markets.

Words: 1019   Downloads: 0   Category: IT   By: Lysis

What is the Difference between Intrusion Detection and Intrusion Prevention?

Intrusion detection and intrusion prevention are two cybersecurity strategies that alert administrators when an anomaly is detected and proactively stops threats from compromising your environment. Both have their own advantages and disadvantages, and they both play a unique role in cybersecurity defense. Before you choose a system, you should know how both of them work.

Words: 1009   Downloads: 0   Category: IT   By: Lysis

Want to write for us?

If you’re passionate about the written word and have a proven track record in creating exceptional content, then we should talk. We’re always looking to find great content and copywriters to join our site.

Writer Registration