Portfolio
Highlights:
- Contributing Writer, Geekwire, May 2012 – Present
- “Security and Privacy for the Internet of Things: Getting Ready for The Internet’s Third Wave”, European Financial Review, February 2016
- 10 years after Bill Gates’ Trustworthy Computing memo: What it meant for Microsoft and why every tech company needs one”, Betanews January 2012
- Regularly Monthly Guest, SIRIUS Radio Canada, “The Arlene Bynon Show”, July 2015 – September 2016
- Regular Weekly Guest, KIRO 97.3, “Seattle’s Morning News with Dave Ross”, July 2015 – January 2016
- Regular Contributing Expert, Seattle KING5 news “Get Jesse” 2012 – 2014
- Presenter, Microsoft Monthly Security Bulletin Live Webcasts, January 2004 – November 2007, June 2008 – August 2010
Major Opinion and Analysis Pieces:
- “How hacked is hacked? Here’s a ‘hack scale’ to better understand the SolarWinds cyberattacks” – December 28, 2020
- “How the SolarWinds hackers are targeting cloud services in unprecedented cyberattack” – December 23, 2020
- “Microsoft unleashes ‘Death Star’ on SolarWinds hackers in extraordinary response to breach” – December 16, 2020″
- “Analysis: Why unionization in tech could actually gain traction in 2020” – January 4, 2020
- “The decade when tech turned dark: Learning from the mistakes of the past 10 years” – January 1, 2020
- “Security and Privacy for the Internet of Things: Getting Ready for The Internet’s Third Wave”, European Financial Review, February 2016
- “Why the Clinton email server story matters — and why it may be worse than you think”, Geekwire, March 2015
- “Ten Years of Patch Tuesdays: Why It’s Time to Move On“, Geekwire, October 2013
- “Microsoft’s Trustworthy Computing reorg: Back to the future, which could be good”, Geekwire, September 2012
- “10 years after Bill Gates’ Trustworthy Computing memo: What it meant for Microsoft and why every tech company needs one”, Betanews January 2012
GeekWire Contributing Writer (Most recent articles, more on site)
- “How hacked is hacked? Here’s a ‘hack scale’ to better understand the SolarWinds cyberattacks” – December 28, 2020
- “How the SolarWinds hackers are targeting cloud services in unprecedented cyberattack” – December 23, 2020
- “Microsoft unleashes ‘Death Star’ on SolarWinds hackers in extraordinary response to breach” – December 16, 2020″
- Amazon Sidewalk rollout shows the future of ‘forced opt-in,’ taking lessons from Xfinity Wifi” – December 12, 2020
- “With ‘Pluton’ chip, Microsoft shows strength, and proves Trustworthy Computing still matters – GeekWire” – November 22, 2020
- “How an unpatched Microsoft vulnerability leaked inadvertently, and what it means for Windows Server security” – March 13, 2020
- “Security experts raise alarm over mobile app planned for Oregon and Washington elections” – February 13, 2020
- “Decoding the Jeff Bezos phone hack: What the rest of us can learn from the forensic report” – January 23, 2020
- “NSA opts to ‘Turn a New Leaf,’ disclosing Windows vulnerability rather than using it as a weapon” – January 14, 2020
- “Analysis: Why unionization in tech could actually gain traction in 2020” – January 4, 2020
- “The decade when tech turned dark: Learning from the mistakes of the past 10 years” – January 1, 2020
Blogs
Broadcast:
Regular Appearances:
- Monthly Guest, SIRIUS Radio Canada, “The Arlene Bynon Show”, July 2015 – September 2016
- Weekly Guest, KIRO 97.3, “Seattle’s Morning News with Dave Ross”, July 2015 – January 2016
- KING5 News 2012 – 2014
- Microsoft Monthly Security Bulletin Webcasts, January 2004 – November 2007, June 2008 – August 2010
- TechNet Radio Monthly Security Bulletin Overview, April 2006 – November 2007
Other Appearances:
- Guest, Proofpoint Podcast, “How to Be a Cyber Criminal: Ransomware Scams“, October 26, 2020.
- Guest, Proofpoint Podcast, “How to Be a Cyber Criminal: Malware Scams“, October 19, 2020.
- Guest, Hacker Valley Studio Podcast, “Communicating in a Crisis with Christopher Budd“, August 18, 2020
- Expert, KING5 news, “Can tokens beat identity thieves?”, July 1, 2014
- Guest, KIRO 97.3 Radio, “Computer users warned of 2-week window to protect against next attack”, June 5, 2014
- Expert, KING5 News, “Going mobile with home security is risky”, May 6, 2014
- Expert, KING5 News, “Does credit monitoring really help?”, March 19, 2014
- Guest, WTOP News Radio, “Beware: Flappy Bird copycat scam apps taking flight”, February 18, 2014
- Guest, KIRO 97.3 Radio, “Target email sparks new security concerns for shoppers”, January 23, 2014
- Expert, KING5 News, “Free video game console promotions could get you hacked”, January 23, 2014
- Expert, KING5 News, “Virus targeting on-line banking users could be costly”, October 24, 2013
- Guest, Geekwire Show KIRO 97.3 Radio, “GeekWire Radio: How these digital security pros view the NSA surveillance revelations”, October 5, 2013
- Expert, Fox Business News, “How to protect consumers from ObamaCare scam”, October 23, 2014
- Expert, Fox Business News, “How to avoid Obamacare Exchange Scams”, October 2, 2014
- Expert, KING5 News, “Get Jesse: Tips to protect yourself from viruses and scammers”, June 23, 2013
- Expert, KING5 News, “Courts ignored expert’s warning system was at risk”, June 7, 2013
- Guest, KIRO Radio “Luke Burbank Show: NSA surveillance pits security against privacy”, June 7, 2013
- Expert, KING5 News, “No evidence hackers broke into other state agencies”, May 10, 2013
- Expert, KING5 News, ”Get Jesse: Washington State Courts Breach: Hacking expert says protect your information now”, May 9, 2013
- Guest, Geekwire Show KIRO 97.3 Radio, “The latest in digital security, and protecting yourself online”, April 27, 2013
- Expert, KING5 News “Get Jesse: A spike in spam, phishing after Boston tragedy”, April 16, 2013
- Expert, KING5 News “Hackers post Microsoft founder’s credit report online”, March 15, 2013
- Expert, KING5 News “Get Jesse: How to protect your new electronic toys”, November 27, 2012
- Expert, KING5 News “Get Jesse: Scammers use attorney’s LinkedIn profile to steal thousands”, September 13, 2012
- Expert, KING5 Evening News “GoDaddy.com web outage takes out TVW, Tacoma schools sites”, September 10, 2012
- Expert, KING5 News “Get Jesse: Don’t be fooled: No special deals on Pinterest boards”, June 5, 2012
- Expert, KING5 News “Get Jesse: Tacoma woman’s picture pops up on ‘rude’ Internet dating site”, May 10, 2012
- Expert, KIRO 97.3 Radio story “Why did so many fall for the Internet Explorer IQ hoax”, August 4, 2011
- Guest, John Curley Show KIRO 97.3 FM Radio, “Rupert Murdoch Phone Hacking Scandal”, July 6, 201
- Guest, The Gathering Note, The Gathering Note talks with Christopher Budd about Twilight of the Gods, August 18, 2009
Print Interviews
Presentations:
- “Corporate Reputation Drivers of the Digital Age”, PRSA Puget Sound Panel, Seattle WA, January 22, 2013
- “How to avoid a social media disaster”, PRSA Luncheon, Washington Athletic Club, April 20, 2011
- Microsoft Executive Briefing Center, 2001 – 2003, 2006 – 2010
- “Managing People in Crisis”, Partners in Emergency Preparedness Conference, Tacoma WA, April 2009
- “Preparedness and Response: Integrating Your Emergency Response Process with the Microsoft Security Incident Response Process”, IIA Technical Conference, Phoenix AZ, April 2007
- “Preparedness and Response: Integrating Your Emergency Response Process with the Microsoft Security Incident Response Process”, TechEd, Boston MA, June 2006
- “Understanding the Microsoft Security Response Process”, Microsoft Canada Security Summit, Ottawa ON, June 2006
- “Patch Update Strategies” and “Incident Response”, Microsoft Security Summit, Chicago IL, May 2006
- “Large Scale Computer Attacks: Understanding the Threats and Planning for them”, Partners in Emergency Preparedness Conference, Bellevue WA, April 2005
Spokesperson:
- Palo Alto Networks 2016 – 2018
- Trend Micro, 2013 – 2016
- Christopher Budd Communications, 2010 – 2013
- Microsoft Security Response Center, 2001 – 2003, 2006 – 2010
Books:
- “Friedrich Nietzsche” in Great Thinkers A – Z; Continuum, 2004
- Exchange 2003 Message Security Guide; Microsoft Corporation, 2003.
- Contributing Author, Windows NT Server 4.0 in the Enterprise; Course Technology, 1998
- Co-author, Web Development with Microsoft Resources; Sams.net,1996
Older Articles:
- “Inside MSRC: Microsoft tells details about latest security advisories”, SearchSecurity, November 2007
- “Inside MSRC: Microsoft SharePoint flaw explained“, SearchSecurity, October 2007
- “Inside MSRC: Visual Studio update affects multiple systems” SearchSecurity, September 2007
- “Inside MSRC: Microsoft releases searchable update database”, SearchSecurity, August 2007
- “Inside MSRC: Microsoft Server flaw should be given high priority”, SearchSecurity, July 2007
- “Inside MSRC: Microsoft offers details on MOICE advisory, Outlook flaws”, SearchSecurity, June 2007
- “Inside MSRC: Microsoft issues further guidance on Exchange update”, SearchSecurity, May 2007
- “Inside MSRC: Windows Vista security update explained”, SearchSecurity, April 2007
- “Why Create a Security Incident Response Process”, TechNet online, March 2007
- “Inside MSRC: Microsoft explains security bulletins”, SearchSecurity, February 2007
- “Inside MSRC: Microsoft updates WSUSSCAN issue”, January 2007
- “Inside MSRC: Visual Studio flaw, tool extensions explained”, December 2006
- “Inside MSRC: Microsoft details security tool update”, November 2006
- “I Just Got a Security Bulletin. Now What?”, TechNet Magazine, November 2006
- “Inside MSRC: Public vulnerability disclosures on the rise”, October 2006
- “Inside MSRC: A look at Microsoft’s September patches”, SearchSecurity, September 2006
- “Inside MSRC: Time to rethink security workarounds”, SearchSecurity, August 2006
- “Inside MSRC: Debunking Excel exploits”, SearchSecurity, July 2006
- “Don’t Get Caught Between a Rock and a Hard Place: Regulatory Compliance and Security Updates”, TechNet online, June 2006
- “Inside MSRC: Inside MSRC: ActiveX control change goes permanent”, SearchSecurity, June 2006
- “Ten Principles of Microsoft Patch Management”, TechNet online, May 2006
- “Inside MSRC: Wisdom on Exchange security”, SearchSecurity, May 2006
- “Inside MSRC: Microsoft details IE ActiveX update”, SearchSecurity, April 2006
Technical Writing:
- Microsoft Internal Product Support Services Security Team Alerts; Microsoft Corporation, 2003 – 2005
- Microsoft Security Bulletins; Microsoft Corporation, 2001-2002
- “Deploying Windows 2000 in a UNIX Environment” Whitepaper; Microsoft Corporation, 2000
Technical Editing and Reviewing:
- Microsoft Security Bulletins; Microsoft Corporation, 2001-2002
- Technical Reviewer, “Setting up an Empty Root Domain” Whitepaper; Microsoft Corporation, 2000
- Technical Reviewer, “How to Plan a Successful Migration from UNIX to Windows 2000 Professional: Whitepaper, Microsoft Corporation, 2000
- Technical Reviewer, “Smartcard Deployment Cookbook”; Whitepaper, Microsoft Corporation, 2000
- Technical Reviewer, “Security Strategies”; Whitepaper, Microsoft Corporation, 2000
- Technical Reviewer, “Security Threats”; Whitepaper, Microsoft Corporation, 2000Personal Interest Books
Other Articles: