top of page
Workspace

My Work

Check out some of my most recent tech articles, ghostwriting pieces, guest posts, product reviews, and more. Come back often! The page is constantly updated.

Tech Article

7 Software Security Lessons to Avoid Repeating in 2025

2024 was another rough ride for organizations of all sizes. Ransomware hit unprecedented new highs, with nearly three-quarters of the businesses polled by OpenText reporting experiencing at least one attack that year...

Read more

Tech Article

Active Directory Certificate Services 101: An Overview

Imagine a world where securing your SMB’s communications isn’t too expensive or overly complicated. This would be a place where even the +80% of SMB victims of at least one cyber attack in the 12 months before June 2024...

Read more

Guest Post - HackerNoon

I Tested the AirDroid Business Mobile Device Management Solution — Here’s What I Think

54% of organizations interviewed by Ponemon in 2024 were victims of a data breach as attackers managed to access one or more of their employees' mobile devices. A robust mobile device management (MDM) solution can help businesses minimize this risk. I’ve tested one for you. Here’s my personal view...

Read more

Tech Article

How to Sign Packages with an Azure Key Vault Signing Certificate

Microsoft Azure was the second most used platform by developers participating in the 2023 Stack Overflow Developers Survey. Azure Key Vault cloud service is part of that platform. It provides a single interface to securely store, manage, and access secrets, certificates, and cryptographic keys....

Read more

Tech Article

8 Steps for Securing Your CI/CD Pipeline

Data from the 2024 State of Continuous Integration/Continuous Delivery (CI/CD) report shows that developers who use self-hosted and managed CI/CD platforms are 23% more likely to restore service after an incident faster than those not using CI/CD...

Read more

Tech Article

7 Cyber Security Basics Every SMB Should Know

78% of SMBs are concerned that a cyber attack could put them out of business. Do you feel the same but have no idea where to start to protect your data, customers, and often cloud-based systems from the bad guys?...

Read more

Guest Post - HackerNoon

3 Real-World Examples of Why Companies Need Better Email Authentication

62% of phishing emails bypassed DMARC email authentication checks in the first half of 2024. Explore why and how your email authentication strategy game needs to move beyond these basic checks and face these new challenges head-on...

Read more

Tech Article

Email Security Best Practices & Tips From 10 Industry Experts

How secure is your email? Hint: It’s not as safe as you think. Between October 2013 and December 2023, small and large organizations worldwide reported to the FBI’s Internet Crime Complaint Center (IC3) a total of $55.5 billion worth of losses. The root cause?...

Read more

Tech  Article

How to Implement Continuous Threat Exposure Management (CTEM) Within Your Small Business

The world’s economy has slowed down in 2024, leaving businesses and individuals with less money in their pockets. But business is booming for bad guys...

Read more

Tech  Article

6 Real-World SMB Cyber Security Threats That Will Keep You Up at Night

JumpCloud reports that 84% of the IT professionals at small and medium enterprises (SMEs) polled in Q3 2024 say they’re worried about the security of applications and resources managed outside of IT (i.e., shadow IT)...

Read more

Tech Article

The Ultimate Code Signing in Visual Studio Tutorial

Signing your code is more important than ever. CrowdStrike reports that in 2023, application security professional survey respondents indicated that 70% of critical security incidents took organizations more than 12 hours to resolve...

Read more

Tech  Article

How to Set Up SSH Without a Password in Linux

In 2022, Linux malware hit record numbers with Atlas VPN researchers reporting a 50% year-over-year increase and a whopping 117% increase in Q4 alone. This shows that while Linux remains one of the “safer” options compared to other operating systems, it isn’t immune to security threats...

Read more

Get a Quote

©2035 by Nadia Bonini. Powered and secured by Wix

Questions?
Contact Me Any Time

Nadia Bonini

SEO/Tech Content Writer & Copywriter

  • White LinkedIn Icon
  • X
bottom of page