Blogs
Articles or blog posts where I’m the author or co-author. Reproduced here with source location.
2023
Title | Topic | Date | Role | Published Link |
---|---|---|---|---|
1. Digital Autopen Playbook pinpoints how agencies can leverage technology for digital signatures | Digital Signature | May 2023 | Co-Author | Digital.gov Blog |
2022
Title | Topic | Date | Role | Published Link |
---|---|---|---|---|
3. The Privileged Identity Playbook Guides Management of Privileged User Accounts | Privileged Identity | November 2022 | Author | Digital.gov Blog |
2. Modernize Your Identity Management Process Through ILM | Identity Lifecycle Management | August 2022 | Co-Author | GSA Blog |
1. Achieve Zero Trust Capabilities Using These Cloud Identity Adoption Best Practices | Cloud Single Sign-On | March 2022 | Author | GSA Blog |
2021
Title | Topic | Date | Role | Published Link |
---|---|---|---|---|
5. White House Releases Draft Federal Zero Trust Strategy | Zero Trust | September 2021 | Author | ISACA GWDC Blog |
4. How GSA worked with stakeholders to improve federal ID website usability | Federal ICAM | August 2021 | Author | GSA Blog |
3. Managing Digital Identity Risk | Digital Identity Risk Assessment | May 2021 | Co-Author | GSA Blog |
2. Are We Federated Yet? | Single Sign-On | February 2021 | Author | GSA Blog |
1. Are You Securing Your Digital Workforce? | Digital Worker Identity Management | January 2021 | Co-Author | GSA Blog |
2019
Title | Topic | Date | Role | Published Link |
---|---|---|---|---|
3. Federal Identities and Zero Trust) | Zero Trust | October 2019 | Author | ISACA GWDC Blog |
2. A Holistic Approach to Data Loss Prevention | Data Loss Prevention (DLP) | October 2019 | Co-Author | Protiviti Technology Blog |
1. Cloud Security in Financial Services – Are you Cloud First or Cloud Averse? | Cloud Access Security Broker (CASB) | June 2019 | Co-Author | Protiviti Technology Blog |
2018
Title | Topic | Date | Role | Published Link |
---|---|---|---|---|
1. Worried About Regulatory Compliance with Cloud Data? Use a CASB | Cloud Access Security Broker (CASB) | September 2018 | Author | Protiviti Technology Blog |
2017
Title | Topic | Date | Role | Published Link |
---|---|---|---|---|
2. Top Three Uses of Public Key Infrastructure (PKI) | Public Key Infrastructure (PKI) | December 2017 | Author | |
1. Help! I’m Sinking! Three Tips for an Empty Inbox | Email Management | May 2017 | Author |