Designed a complete Ethernet network for a four-floor school with 148 Cat6 drops, a fiber backbone, VLAN segmentation, Wi-Fi 6 access points, PoE switches, and pfSense security.
Category: Infrastructure
Building Amazon’s Next-Generation Fulfillment Network
How did Amazon cut shipping costs & boost delivery speed? I break down the Project FC Network Initiative—the massive regionalization effort powered by network optimization, Edge Computing, and AWS cloud. See the business case for next-gen fulfillment. Read the full paper!
The Role and Necessity of the NIST Cybersecurity Framework
The NIST CSF is the gold standard for risk management. My paper breaks down the core Identify, Protect, Detect, Respond, Recover functions and explains how to integrate this framework into any organizational culture. Download the full ODU guide!
Artificial Intelligence in Digital Forensics: Opportunities, Risks, and Future Directions
Analysis of how artificial intelligence enhances digital forensics, including automation, threat detection, associated risks, and future trends in AI-driven investigations.
The Role of Baselines in Network Monitoring
Explains how baselines support effective network monitoring by establishing normal performance patterns, improving anomaly detection, security, and operational visibility
Managing Cybersecurity Change: Using Tactical Empathy to Overcome Resistance
Examines how tactical empathy improves cybersecurity change management by reducing resistance, strengthening communication, and supporting successful adoption of new security practices.
Security Polices from a CISO’s Perspective
Explores security policies from a CISO’s perspective, highlighting their role in governance, risk management, strategic decision-making, and building organizational security.
Access Controls: Single Sign-On (SSO)
Explains how access controls and Single Sign-On (SSO) improve security and usability by centralizing authentication, reducing login friction, and strengthening identity management.
Network & Cyber Security: Tools, Costs, and Efficiency
Overview of network cybersecurity tools, comparing costs, efficiency, and how organizations evaluate firewalls, SIEMs, IDS/IPS, and other defensive technologies.
Phishing Campaigns: Protection Against Credential Theft
Explores how phishing campaigns target users for credential theft and outlines key protections including MFA, awareness training, email filtering, and zero-trust security.
IPv6 Cybersecurity Enhancements
Explores IPv6 cybersecurity enhancements, including improved routing security, built-in protections, simplified architectures, and reduced vulnerabilities compared to IPv4.
IT Infrastructure: Internet of Things (IoT)
Examines how the Internet of Things (IoT) impacts IT infrastructure, including connectivity, automation, security risks, management challenges, and modern network requirements.