Cybersecurity writing that moves buyers

In a complex and noisy cybersecurity marketplace, communicating value can be a foundational challenge. I help startups and established companies find the words that drive strong connections with buyers.

A vintage photograph of a man at a desk working a computer next to a typewriter

ABOUT

Uncommon skills

Analytical meets creative

I have the rare ability to translate complex technology into something that non-technical audiences can understand. A visual artist with a business degree, I bridge the gap between technical details and the human-driven story.

Obsessive audience focus

Starting from a place of empathy with the targeted audience, I center their problems and clearly identify how your company can best solve them. I respect the audience’s limited time and attention through the art of brevity.

Breadth of experience

I have been helping cybersecurity companies communicate effectively since 2014. I understand not only the technical landscape but the motivations and fears underpinning the typical buyer mindset.

CAPABILITIES

Uncommon versatility

Brand messaging

A powerful positioning and messaging playbook that seeds your company’s differentiated communications, content, and even brand names

Content strategy

A content architecture that delivers the right information to your audience, when and where they need it

Marketing writing

Communication that engages and persuades, whether through a short social media post or an in-depth white paper

UX writing

Clear, concise language that makes app and web experiences as frictionless as possible

Technical writing

Precise and logical instruction that keeps end users, developers, and internal teams on task

PORTFOLIO

Uncommon results

Samsung logo

BLOG POST (GHOSTWRITTEN)

“How the Two-Man Rule Elevates Mobile Security”

I use a familiar metaphor to explain the two-system approach to mobile security championed by Samsung and Privoro.

Read the blog post 
Forbes Technology Council logo

ARTICLE (GHOSTWRITTEN)

“The Pernicious Invisibility of Zero-Click Mobile Attacks”

Writing in Forbes, I break down the challenges of protecting against mobile attacks not requiring user interaction.

Read the article 
ISMG logo

WHITE PAPER (UNCREDITED)

“The Hijacking of Smartphone Cameras and Microphones”

In this white paper distributed by ISMG, I give a complete, yet condensed, overview of why and how threat actors surveil phone users.

Read the white paper 

CONTACT

Interested in working with me?

Contact me here to get started.