GeekWire – Contributing Writer
- “Securing the brand: Microsoft surges up annual reputation poll as top-ranked tech company”, May 22, 2025
- “Analysis: Seattle crosswalk hack more mischievous than malicious — but not entirely harmless”, April 17, 2025
- “Analysis: Google-Wiz deal sparks questions about cloud security strategy at AWS and Microsoft”, March 31. 2025
- “Microsoft and Amazon quantum advancements spark questions about the future of encryption”, March 9, 2025
- “Analysis: Washington state’s response to data breach affecting 1.4M people is stunningly callous”, February 10, 2021
- “Analysis: The potentially serious cybersecurity ramifications from the US Capitol riots”, January 11, 2021
- “2020: The year the internet didn’t crash”, January 4, 2021
- “How hacked is hacked? Here’s a ‘hack scale’ to better understand the SolarWinds cyberattacks”, December 28, 2020
- “How the SolarWinds hackers are targeting cloud services in unprecedented cyberattack”, December 23, 2020
- “Microsoft unleashes ‘Death Star’ on SolarWinds hackers in extraordinary response to breach”, December 16, 2020
- “Amazon Sidewalk rollout shows the future of ‘forced opt-in,’ taking lessons from Xfinity Wifi”, December 12, 2020
- “With ‘Pluton’ chip, Microsoft shows strength, and proves Trustworthy Computing still matters, November 21, 2020
- “How an unpatched Microsoft vulnerability leaked inadvertently, and what it means for Windows Server security” – March 13, 2020
- “Security experts raise alarm over mobile app planned for Oregon and Washington elections” – February 13, 2020
- “Decoding the Jeff Bezos phone hack: What the rest of us can learn from the forensic report” – January 23, 2020
- “NSA opts to ‘Turn a New Leaf,’ disclosing Windows vulnerability rather than using it as a weapon” – January 14, 2020
- “Analysis: Why unionization in tech could actually gain traction in 2020” – January 4, 2020
- “The decade when tech turned dark: Learning from the mistakes of the past 10 years” – January 1, 2020
- “Wyze data leak: Key takeaways from server mistake that exposed information from 2.4M customers”, December 29, 2019
- “Regulation is coming: How startups should be thinking about data, security and privacy”, December 14, 2019
- “Tech industry’s password problems come home to roost with Ring security camera hacks”, December 12, 2019
- “A new Windows 10 ransomware threat? Examining claims of a ‘potentially unstoppable’ vulnerability”, December 9, 2019
- A guide for startups to prepare for the California Consumer Privacy Act (CCPA), December 17, 2019
- “A former Microsoft security expert reviews Brad Smith’s ‘Tools and Weapons’ book”, October 6, 2019
- “Why the Clinton email server story matters — and why it may be worse than you think”, March 2015
- “What should the U.S. do in response to North Korea? Nothing more”, December 18, 2014
- “Microsoft’s Trustworthy Computing reorg: Back to the future, which could be good”, September 2012
- “How Apple may have ended the retail point-of-sale data breach crisis”, September 10, 2014
- “House of Cars: Lessons in politics from Seattle’s ridesharing saga”, March 5, 2014
- “The Target Tipping Point: How e-commerce trumped traditional retail in transaction security”, February 23, 2014
- “Farewell, stack rank: Why this change is so big for Microsoft”, November 13, 2013
- “Ten Years of Patch Tuesdays: Why It’s Time to Move On”, October 31, 2013
- “Truth in absurdity: A former Microsoftie’s take on ‘Where’d You Go Bernadette’”, June 23, 2013
- “Why I won’t buy another subsidized Android phone (and why you shouldn’t, either)”, April 23, 2013
- “Be Very Afraid: Notes from a ‘Data Privacy Day’ Town Hall”, January 31, 2013
- “Why the Windows 8 launch isn’t as big as you’ve been told”, October 26, 2013
- “Big shift for Microsoft’s Forefront security products: RIP ISA Server”, September 12, 2012
- “Plot thickens in mysterious leak of Apple user data”, September 10, 2012
- “Seattle security startup seeks to eliminate vulnerable code from the public domain”, July 27, 2012
- “Diablo III accounts hacked, players’ inventories plundered”, May 22, 2012
The European Financial Review – Columnist “Trust in the Future”
- “Security and Privacy for the Internet of Things: Getting Ready for The Internet’s Third Wave”, February 2016
Govinfosecurity “Industry Insights” – Contributor
- How Ransomware Groups Weaponize Stolen Data, September 2024
- Lowest-Rung Attackers Challenging Ransomware-as-a-Service, April 2024
Betanews – Contributing Writer
- “Apple’s ‘good enough’ security response: why it’s not going to change, isn’t fair, but doesn’t matter anyway”, 2014
- “Microsoft’s experience shows us what to expect from Oracle’s Java ‘security push”, 2013
- “10 years after Bill Gates’ Trustworthy Computing memo: What it meant for Microsoft and why every tech company needs one”, January 2012
- “Do I really need anti-malware?”, January 2012
Windmill Networking Social Media Marketing Blog – Columnist “Social Media and Online Security”
- “The Social Media Manager’s Guide to Summer Safety: 10 Ways to be Safer”, July 2013
- “Protecting Your Good Name”, April 2013
- “Whose pictures are they anyway?”, February 2013
- “What you need to know about Facebook Graph Search”, January 2013
- “2012: The Year in Review”, December 2012
- “Mobile Device Security”, November 2012
- “Halloween Issue: What you should be most afraid of”, October 2012
- “Understanding Security and Privacy in Google+”, September 2012
- “To Host or Not to Host: That Is the Question”, August 2012
- “What to Do about Passwords: 5 Tips for Password Management in a Social Media World”, July 2012
- “Recovering from the worst: What to do when your social media channel is hijacked”, June 2012
- “Are you the weakest link? Two things to do today to keep control of your Facebook page”, May 2012
- “To Pin Or Not To Pin: 5 Security Risks Businesses Should Understand Around Pinterest and What They Can Do About Them”, April 2012
- “Social Media meet Security. Security meet Social Media”, March 2012
SearchSecurity – Columnist “Inside MSRC”
- “Inside MSRC: Microsoft tells details about latest security advisories”, SearchSecurity, November 2007
- “Inside MSRC: Microsoft SharePoint flaw explained“, SearchSecurity, October 2007
- “Inside MSRC: Visual Studio update affects multiple systems” SearchSecurity, September 2007
- “Inside MSRC: Microsoft releases searchable update database”, SearchSecurity, August 2007
- “Inside MSRC: Microsoft Server flaw should be given high priority”, SearchSecurity, July 2007
- “Inside MSRC: Microsoft offers details on MOICE advisory, Outlook flaws”, SearchSecurity, June 2007
- “Inside MSRC: Microsoft issues further guidance on Exchange update”, SearchSecurity, May 2007
- “Inside MSRC: Windows Vista security update explained”, SearchSecurity, April 2007
- “Inside MSRC: Microsoft explains security bulletins”, SearchSecurity, February 2007
- “Inside MSRC: Microsoft updates WSUSSCAN issue”, January 2007
- “Inside MSRC: Visual Studio flaw, tool extensions explained”, December 2006
- “Inside MSRC: Microsoft details security tool update”, November 2006
- “Inside MSRC: Public vulnerability disclosures on the rise”, October 2006
- “Inside MSRC: A look at Microsoft’s September patches”, SearchSecurity, September 2006
- “Inside MSRC: Time to rethink security workarounds”, SearchSecurity, August 2006
- “Inside MSRC: Debunking Excel exploits”, SearchSecurity, July 2006
- “Inside MSRC: Inside MSRC: ActiveX control change goes permanent”, SearchSecurity, June 2006
- “Inside MSRC: Wisdom on Exchange security”, SearchSecurity, May 2006
- “Inside MSRC: Microsoft details IE ActiveX update”, SearchSecurity, April 2006
TechNet – Contributor
- “Why Create a Security Incident Response Process”, TechNet online, March 2007
- “I Just Got a Security Bulletin. Now What?”, TechNet Magazine, November 2006
- “Don’t Get Caught Between a Rock and a Hard Place: Regulatory Compliance and Security Updates”, TechNet online, June 2006
- “Ten Principles of Microsoft Patch Management”, TechNet online, May 2006
The Wargamer – Contributing Writer and Columnist “Politics by Other Means”
- “Strategy Guide: A Roman Civics Lesson” in “The Wargamer.com” August 2006
- “Strategy Guide: A Tour of the Great Roman Cities” in “The Wargamer.com” August 2006
- “Book Review: Envy of the Gods” in “The Wargamer.com” July 2005
- “Book Review: Warriors of the Steppes” in “The Wargamer.com” June 2005
- “A Brief History of Lebanon and Beirut: Setting of Close Combat First to Fight” in “The Wargamer.com” April 2005
- “Politics by Other Means #3 – Napoleon: Birth and Delay of a Unified Europe” in “The Wargamer.com” March 2005
- “Politics by Other Means #2 – Alexander the Failure” in “The Wargamer.com” January 2005
- “Politics by Other Means #1 – How Caesar’s Road to Rome Passed First through Gaul” in “The Wargamer.com” November 2004
- “Book Review: General John Buford: A Military Biography” in “The Wargamer.com” March 2004
- “Book Review: Napoleon’s Expedition to Russia” in “The Wargamer.com” March 2004
- “Book Review: Afghanistan” in “The Wargamer.com” November 2003
- “Book Review: Lost Over Laos” in “The Wargamer.com” October 2003
- “Game Review: Chariots of War” in “The Wargamer.com” September 2003
- “Book Review: The Savage Wars of Peace” in “The Wargamer.com” September 2003
- “Movie Review: Gods and Generals” in “The Wargamer.com” September 2003
The Philosophers Magazine – Contributor
- “Book Review: Religion and Psychology: Mapping the Terrain” in “The Philosopher’s Magazine” Autumn 2001 (London)
- “The Unintended Consequences of Philosophy” in “The Philosopher’s Magazine” Spring 2001 (London)
- “Book Review: Homo Sacer” in “The Philosopher’s Magazine” Winter 1999 (London)
- “Book Review: Liberalism and the Limits of Justice” in “The Philosopher’s Magazine” Fall 1999 (London)
- “Snapshot: Friedrich Nietzsche” in “The Philosopher’s Magazine” Spring 1998 (London)
Corporate Blogging:
- Sophos X-Ops Blog, Twitter, Mastodon Handles and YouTube (Managing Editor, Author) – January 2022 – February 2024
- Avast Blog (Author)– January 2021 – January 2022
- Proofpoint Threat Intelligence and Thought Leadership Blogs (Editor, Author) – October 2019 – December 2020
- Palo Alto Networks Unit 42 Research Blog, Unit 42 Twitter Handle and Corporate Blog (Editor, Author), October 2016 – June 2019
- Trend Micro Simply Security and Corporate Blog (Editor, Author), September 2011 – October 2016
- Microsoft Security Response Center (Managing Editor, Editor, Author), February 2006 – August 2010
Books:
- Contributor, Maximize Your Social: A One-Stop Guide to Building a Social Media Strategy for Marketing and Business Success, 2013
- Expert, How to Start a Home-based Public Relations Business (Home-Based Business Series), 2012
- Author, Exchange 2003 Message Security Guide; Microsoft Corporation, 2003
- Author, “Friedrich Nietzsche” in Great Thinkers A – Z; Continuum, 2004
- Contributing Author, Windows NT Server 4.0 in the Enterprise; Course Technology, 1998
- Co-author, Web Development with Microsoft Resources; Sams.net,1996
Technical Writing:
- Microsoft Internal Product Support Services Security Team Alerts; Microsoft Corporation, 2003 – 2005
- Microsoft Security Bulletins; Microsoft Corporation, 2001-2002
- “Deploying Windows 2000 in a UNIX Environment” Whitepaper; Microsoft Corporation, 2000
Technical Editing and Reviewing:
- Microsoft Security Bulletins and Advisories (200); Microsoft Corporation, 2001-2002
- Technical Reviewer, “Setting up an Empty Root Domain” Whitepaper; Microsoft Corporation, 2000
- Technical Reviewer, “How to Plan a Successful Migration from UNIX to Windows 2000 Professional: Whitepaper, Microsoft Corporation, 2000
- Technical Reviewer, “Smartcard Deployment Cookbook”; Whitepaper, Microsoft Corporation, 2000
- Technical Reviewer, “Security Strategies”; Whitepaper, Microsoft Corporation, 2000
- Technical Reviewer, “Security Threats”; Whitepaper, Microsoft Corporation, 2000
Music
- Andante Blog
- Seattle Ring 2009: A New Wotan for the Ages, Seattle Opera Blog, August 2009