nDash.co is a content creation platform that provides brands and agencies with access to the world's top freelance writers.

nDash Writer Profile for Kristen Ramos

Kristen Ramos

Headline

Technology and Business Writer

About Me

I’m a business and technology writer specializing in white papers, blogs, and articles for clients in the tech space. I focus on current trends and solutions in cybersecurity compliance, disaster planning, HIPAA regulatory issues, and enterprise digital transformation in the cloud. I take great pride in turning out authoritative, marketing-friendly content that my clients leverage on their websites to position themselves as thought leaders in their respective industries.

My recent projects have covered everything from recent DDoS attacks and cloud-based IoT risks in healthcare to unified incident response and cloud stack security issues in SaaS, PaaS, and IaaS. When I have a rare break from writing about cyber crimes, I take on low-carb pizza crusts and offshore sailing to Cuba.  

-9 NYDFS Cybersecurity Requirements That You Can Tackle with Rapid7

-There (Should Be) an App For That: Optimizing the Digital Mortgage Experience

-Cybersecurity Incident Response and the New GDPR Laws Take Aim at Global Cybercrime

-Overcoming the IT Skills Gap and Workforce Shortages using IR Automation

-Location, Location…Latency: Is Your Remote Infrastructure Ready?

-5 Ways Cloud Computing Frees Your Budget and Your Time

-Optimize SaaS and Cloud Security With Application Performance Monitoring  

I craft elegant, persuasive copy around difficult and often awkward long-tail keywords for optimum SEO competitive advantage. I tailor my writing to improve my client’s SEO and website performance within the ever-evolving Google algorithm landscape.

My extensive research and writing experience along with a passion for cybersecurity, digital marketing, and SEO strategy means my clients get the best of both worlds when it comes to content: thoroughly researched, 100% unique content that is compelling, on point, and skillfully crafted for my client's business content strategy needs.

I look forward to helping my clients reach their content-driven goals!

Industries I Write About

Computer & Network Security

Find writers and ideas in this industry

Information Technology & Services

Find writers and ideas in this industry

Computer Networking

Find writers and ideas in this industry

Marketing & Advertising

Find writers and ideas in this industry

Legal Services

Find writers and ideas in this industry

Computer Software

Find writers and ideas in this industry

Telecommunications

Find writers and ideas in this industry

Human Resources

Find writers and ideas in this industry

Online Publishing

Find writers and ideas in this industry

Management Consulting

Find writers and ideas in this industry

My Writing Samples

Website Link to Portfolio

Multiple samples and links to published work on file.

http://www.deepwebcontentwriting.com

Location, Location…Latency: Is Your Remote Infrastructure Ready?

Application and performance monitoring issues and solutions in the remote workplace.

https://www.appneta.com/blog/location-latency-is-your-remote-infrastructure-ready/

There (Should Be) an App For That: Optimizing the Digital Mortgage Experience

Whitepaper discussing the digital mortgage revolution and how local banks can improve their processes to compete with online lenders.

https://kristenramos.files.wordpress.com/2017/05/there-should-be-an-app-for-that-optimizing-the-digi

Cybersecurity Incident Response and the New GDPR Laws Take Aim at Global Cybercrime

Whitepaper focused on the new GDPR law and how it will affect global business.

https://kristenramos.files.wordpress.com/2017/06/the-eus-gdpr-law-an-introduction-for-the-us.pdf

5 Ways Cloud Computing Frees Your Budget and Your Time

Blog post outlining ways to save money and streamline processes with cloud computing.

https://www.appneta.com/blog/5-cloud-computing-tips-time-money/

Optimize SaaS and Cloud Security With Application Performance Monitoring

Blog post detailing how application performance monitoring can help optimize SaaS and cloud security.

https://www.appneta.com/blog/add-application-security-testing-automation/

Overcoming the IT Skills Gap and Workforce Shortages using IR Automation

Whitepaper discussing the IT skill shortage and how automation of processes can help alleviate the strain on overworked SOC teams.

https://kristenramos.files.wordpress.com/2017/06/d3-published-overcoming-the-it-skills-gap.pdf

Experience

Business and Technology Writer

Business and technology writer ​focused on trends and developments in cybersecurity and FinTech compliance, HIPAA regulatory requirements, enterprise digital transformation, and application performance and security in the cloud and the IoT. Create copy to drive conversions through organic content and SEO. Content includes white papers, blog posts, and web pages designed to improve company visibility and position clients as thought leaders and authorities in their fields.

Company: DeepWeb Content Writing

I worked there from 6/2005 until now

Lead Cybersecurity Writer

Responsible for creating copy for IT servicers, MSPs, MSSPs, and incident/disaster response cybersecurity firms to drive conversions through content with a focus on SEO optimization. Content includes white papers, web pages, articles, blog posts, and email campaigns designed to improve search engine rank and visibility, with a focus on HIPAA compliance in the cloud, unified incident response, threat intelligence, and cybersecurity in the IoT.

Company: Digital Coast Content

I worked there from 1/2014 until now

Technical Writer

• Traveled to locations throughout the southern U.S. to examine commercial asset compliance with HIPAA and ADA regulations. Created technical reports to translate compliance status and corrective measures necessary for over 100 locations in less than 2.5 months.

Company: JLL

I worked there from 5/2015 until 12/2016

Content I Write

Ideas and Pitches I Wrote

Is Your Hacker Your Facebook Friend? FB Messenger Spreads Locky Ransomware

There's a new method of ransomware attack on the cybersecurity landscape--and it disguises itself as your Facebook friend to hack into your system. Over the last few days, businesses and individuals alike have been barraged with Facebook messages attached to an .SVG image file. Even if this file was sent by a legitimate Facebook friend, clicking the link could unleash a ransomware Trojan into your system.

Content type: Blog Post

Keywords: ransomware cybersecurity

Links:

Undersea Cable Networks Keep Global Businesses Connected

Undersea networks might be out of sight, but if you're in business, they shouldn't be out of mind. Most organizations don't realize just how dependent they are on underwater fiber optics to stay connected and productive.

Content type: Blog Post

Keywords: NETWORK PLANNING

Links:

How to Buy a Content Delivery Network

Demand for fast, secure content delivery is on the rise with the growing demand for online data and the value this information brings to busy organizations. How your IT department executes your corporate network strategy could have a huge impact on the success of your business. ​

Content type: Whitepaper

Keywords: NETWORK PLANNING, TELECOMMUNICATIONS

Links:

Is Your Hacker Your Facebook Friend? FB Messenger Spreads Locky Ransomware

There's a new method of ransomware attack on the cybersecurity landscape--and it disguises itself as your Facebook friend to hack into your system. Over the last few days, businesses and individuals alike have been barraged with Facebook messages attached to an .SVG image file. Even if this file was sent by a legitimate Facebook friend, clicking the link could unleash a ransomware Trojan into your system.

Content type: Blog Post

Keywords: cybersecurity, ransomware

Links:

Big Data Gets Bigger in 2017: 10 Ways to Use Legal Analytics to Improve Your Practice

Digital transformation in the legal world and the general marketplace means a greater reliance on analytics in legal technology and an increasingly pressing need for better cybersecurity across the industry.

Content type: Blog Post

Keywords: Big Data, legal, law firms, eDiscovery, legal analytics

Links:

Big Data Gets Bigger in 2017: 10 Ways to Use Legal Analytics to Improve Your Practice

Digital transformation in the legal world and the general marketplace means a greater reliance on analytics in legal technology and an increasingly pressing need for better cybersecurity across the industry.

Content type: Whitepaper

Keywords: Big Data , legal , law firms , eDiscovery , legal analytics

Links:

Big Data Gets Bigger in 2017: 10 Ways to Use Legal Analytics to Improve Your Practice

Digital transformation in the legal world and the general marketplace means a greater reliance on analytics in legal technology and an increasingly pressing need for better cybersecurity across the industry.

Content type: Blog Post

Keywords: Big Data , legal , law firms , eDiscovery , legal analytics, cybersecurity, digital transformation

Links:

2017 Commercial Construction Outlook: Are We Entering a Phase of Boom, Bust, or Mature Expansion?

"The annual Outlook report from Dodge is seen as a reliable bellwether of future activity in the residential, commercial, institutional, manufacturing, public works and electric utilities/gas plants construction sectors. Overall, Dodge expects the majority of the segments to perform well in 2017 and offers a positive forecast for construction performance next year."

Content type: Blog Post

Keywords: sell-side advisory services, recapitalizations, buyouts

Links:

White paper on Mortgage Processing

Please see prior thread for abstract details. This pitch has been created at the request of nDash admin to facilitate payment and any necessary revisions.

Content type: Whitepaper

Links:

Did Your Rental Car Drive Away With Your Data?

​The FTC recently released an alert warning car rental customers to take extra precautions regarding their personal data while renting vehicles that include network connectivity. Your personal data becomes vulnerable the minute you connect to a rental car's infotainment systems: think navigation, music preferences, contacts, and private texts--all potentially exposed even after you turn those keys in.

Content type: Blog Post

Links:

A SaaS Developer’s Guide to Application Security Best Practices

In order to be relevant in today’s dynamic cybersecurity climate, software-as-a-service (SaaS) technology solutions must be hyper-focused on security—and the burden of ensuring a secure SaaS platform based on current industry best practices rests solely with developers.

Content type: Blog Post

Keywords: SaaS Application,Cloud Integration,Enterprise Security,Cloud Security

Links:

A SaaS Developer’s Guide to Application Security Best Practices

In order to be relevant in today’s dynamic cybersecurity climate, software-as-a-service (SaaS) technology solutions must be hyper-focused on security—and the burden of ensuring a secure SaaS platform based on current industry best practices rests solely with developers.

Content type: Blog Post

Keywords: SaaS Application,Cloud Integration,Enterprise Security,Cloud Security

Links:

A SaaS Developer’s Guide to Application Security Best Practices

In order to be relevant in today’s dynamic cybersecurity climate, software-as-a-service (SaaS) technology solutions must be hyper-focused on security—and the burden of ensuring a secure SaaS platform based on current industry best practices rests solely with developers.

Content type: Blog Post

Links:

A SaaS Developer’s Guide to Application Security Best Practices

In order to be relevant in today’s dynamic cybersecurity climate, software-as-a-service (SaaS) technology solutions must be hyper-focused on security—and the burden of ensuring a secure SaaS platform based on current industry best practices rests solely with developers.

Content type: Blog Post

Links:

10 Things You Need to Know About WikiLeaks CIA Leak

According to WikiLeaks, the CIA held on to security bugs in various software and devices, including Apple and Samsung smartphones as well as major brands of smart TVs and smart cars.

Content type: Blog Post

Links:

10 Things You Need to Know About WikiLeaks CIA Leak

According to WikiLeaks, the CIA held on to security bugs in various software and devices, including Apple and Samsung smartphones as well as major brands of smart TVs and smart cars.

Content type: Blog Post

Links:

Ransomware Attack on Apple: Hackers Threaten to Wipe 300 Million iPhones Unless Apple Pays Up

Your iPhone and iCloud account could put you at risk of being hacked by the group known as the "Turkish Crime Family."

Content type: Blog Post

Links:

Ransomware Attack on Apple: Hackers Threaten to Wipe 300 Million iPhones Unless Apple Pays Up

Your iPhone and iCloud account could put you at risk of being hacked by the group known as the "Turkish Crime Family."

Content type: Blog Post

Links:

Three Critical Steps to Consider Before Migrating to the Cloud

It’s essential to thoroughly review a cloud provider’s security measures to ensure good governance and the highest level of data security. First review security policies and procedures to make sure that they adhere to best practices such as ISO 27001. This standard strictly defines the policies and procedures covering all legal physical and technical security controls involved in an organization’s information risk management procedures. The second step is to get granular.

Content type: Blog Post

Keywords: cloud migration,data security,compliance,governance,digital transformation,networking

Links:

Three Critical Elements to Consider Before Migrating Data to the Cloud

These days, organizations of all sizes are choosing to conduct at least part of their business in the cloud. Deciding which provider to go with is an important part of that process. It can mean the difference between a migration that goes off without a hitch, and one that causes delays, additional expense, and ongoing headaches down the road. Consider these tips to ensure your data migration is a seamless experience:

Content type: Whitepaper

Keywords: cloud migration,data migration,governance,data security,network security,infrastructure,information technology

Links:

Three Critical Elements to Consider Before Migrating Data to the Cloud

These days, organizations of all sizes are choosing to conduct at least part of their business in the cloud. Deciding which provider to go with is an important part of that process. It can mean the difference between a migration that goes off without a hitch, and one that causes delays, additional expense, and ongoing headaches down the road. Consider these tips to ensure your data migration is a seamless experience:

Content type: Blog Post

Keywords: data migration,cloud migration,cloud storage,data governance,network security,information technology,cloud architecture

Links:

How Hyperconvergence Can Take Your Technology to the Next Level

Hyperconverged infrastructure can drive significant operational and financial benefits for your business. With hyperconvergence, you can achieve reduced expenses, improved operational efficiency, a scalable solution to over-provisioning, and a streamlined approach to new business initiatives.

Content type: Blog Post

Keywords: Hyperconverged infrastructure,hyperconvergence,operational efficiency,over-provisioning,information technology

Links:

To Be Determined

Hello, thanks for contacting me. Just to clarify--are you looking for a pitch with specific details on the topics you've provided me? As of today, I am available to take on a new client in the legal tech space, and white papers on the subjects you've requested are squarely in my wheelhouse. Depending on length and complexity, my white papers start at $500. Blog posts/articles run $150-$250. Please let me know if you'd like to move forward, and I can put together a solid quote and outline for you.

Content type: Whitepaper

Links:

Corporate Compliance Outsourcing: Key Considerations Under the New DoJ Guidance

The Department of Justice recently released its most universally applicable guidance for corporate compliance programs. Corporations may want to consider outsourcing certain compliance tasks in order to keep up with a rapidly evolving compliance landscape.

Content type: Whitepaper

Keywords: Corporate governance,legal outsourcing,corporate compliance

Links:

Corporate Compliance Outsourcing: Key Considerations Under the New DoJ Guidance

The Department of Justice recently released its most universally applicable guidance for corporate compliance programs. Corporations may want to consider outsourcing certain compliance tasks in order to keep up with a rapidly evolving compliance landscape.

Content type: Blog Post

Keywords: Corporate governance,legal outsourcing,corporate compliance,cybersecurity

Links:

Corporate Compliance Outsourcing: Key Considerations Under the New DoJ Guidance

The Department of Justice recently released its most universally applicable guidance for corporate compliance programs. Corporations may want to consider outsourcing certain compliance tasks in order to keep up with a rapidly evolving compliance landscape.

Content type: Blog Post

Keywords: Corporate governance,legal outsourcing,corporate compliance,cybersecurity

Links:

Corporate Compliance Outsourcing: Key Considerations Under the New DoJ Guidance

The Department of Justice recently released its most universally applicable guidance for corporate compliance programs. Corporations may want to consider outsourcing certain compliance tasks in order to keep up with a rapidly evolving compliance landscape.

Content type: Blog Post

Keywords: Corporate governance,business process outsourcing,corporate compliance,cybersecurity

Links:

The New DoJ Corporate Compliance Guidance: What Does it Mean for Your Business?

The Department of Justice recently released its most universally applicable guidance for corporate compliance programs. Corporations may want to consider alternative methods for managing certain compliance tasks in order to keep up with a rapidly evolving compliance landscape.

Content type: Blog Post

Keywords: Corporate governance,business process outsourcing,corporate compliance,cybersecurity

Links:

Corporate Compliance Outsourcing: Key Considerations Under the New DoJ Guidance

The Department of Justice recently released its most universally applicable guidance for corporate compliance programs. Corporations may want to consider outsourcing certain compliance tasks in order to keep up with a rapidly evolving compliance landscape.

Content type: Blog Post

Keywords: Corporate governance,business process outsourcing,corporate compliance,cybersecurity

Links:

Proposed IoT Cybersecurity Regulations Could Lead to Safer Consumer Devices

In setting security standards for IoT devices sold to the federal government, the proposed bill would likely make it economically infeasible for IoT manufacturers to ignore cybersecurity best practices--even at the consumer level.

Content type: Blog Post

Keywords: IoT,cybersecurity,DDoS attack,internet of things

Links:

Got Big Data? Microsoft Azure Brings Data Discovery to the Cloud

Software giant Wipro has announced that its Big Data Analytics-as-a-Service solution on the Microsoft Azure Data Discovery Platform is now available for businesses of all sizes.The innovative cloud-based Data Discovery platform enables businesses, including retail, financial services, energy, manufacturing, and education to benefit from information previously unavailable to them, conveniently packaged in an outcome-based, pay-as-you-go delivery model.

Content type: Blog Post

Keywords: Cloud,azure,Microsoft azure,big data

Links:

The New GDPR Data Protection Law --Is Your Business Ready?

The Information Security Forum (ISF) considers the General Data Protection Regulation (GDPR) to be the most noteworthy shake-up of global privacy law in decades. Not only does it redefine the scope of EU data protection legislation, it forces organizations globally to comply with its requirements.

Content type: Blog Post

Keywords: compliance,IT security,data security,information security,GDPR law,cybersecurity

Links:

Empower Your Design with Data-Driven Research and Discovery

“Information and iteration are the keys to a successful design.” -Erika Hall The Discovery Phase is the time to research and gather information about the client, the project, and client’s user base. The information gleaned during this phase helps to determine a site strategy and goals.With that goal in mind, the discovery phase consists of six different sections: 1. Info Collection . 2. Client Research Interviews . 3. Brand Story Analysis 4. User Archetypes5. Defined Goals 6. Sitemap and Struct

Content type: Whitepaper

Links:

I provide my clients with multiple pitches before every project.

Hello, I’d like to submit my credentials for your Content Writer opportunity. I specialize in writing blogs, website copy, white papers, and social campaigns for technology and digital marketing firms on topics ranging from HIPAA compliance in the cloud to the value of developing a unique selling proposition. My blog posts are regularly curated and syndicated across the most widely-read tech publications in the industry.

Content type: Blog Post

Links:

Botnet Attacks and the IoT: Is Your Business Secure?

Botnet attacks are on the rise. As IoT moves beyond mobile consumer wearables and into massive company deployments, IT and SOC teams are paying more attention to IAM and the networks that connect big-ticket items like smart grid hardware, factory equipment, and healthcare devices. And for good reason. According to Vodafone’s annual IoT barometer, 84% of the 1,278 senior IT decision-makers who responded had increased their adoption and use of IoT solutions in the past year alone.

Content type: Blog Post

Keywords: IAM,Identity Access Management,IoT,botnet attacks,network security,consumer wearables,corporate IoT

Links:

Accomplished technology writer available for whitepapers and blogs in the high tech space.

Hello!I’d like to submit my credentials for writing content for Chaos Sumo. I specialize in writing blogs, website copy, white papers, and social campaigns for technology and digital marketing firms on topics ranging from HIPAA compliance in the cloud to the benefits of cloud networking over MPLS and SD-WAN. My blog posts are regularly curated and syndicated across the most widely-read tech publications in the industry. You can view my portfolio at www.deepwebcontentwriting.com. Thank you!

Content type: Whitepaper

Links:

When Five Nines Isn’t Enough: Separate Your Data From your Compute Resources With Object Storage

• Hadoop deployed with on-premises architecture means compute and storage resources are combined, must be scaled together, and persistently on—otherwise data is inaccessible.• In the cloud, storage and compute can be separated with S3 as the object store, giving data team flexibility to scale and fine-grained control over cost vs. speed.For Most Businesses, Big Data Means Spending on Underutilized Compute Resources•

Content type: Blog Post

Links:

When Five Nines Isn’t Enough: Separate Your Data From your Compute Resources With Object Storage

Please see the previous pitch thread at https://go.ndash.co/writer/assignments/5a130d4448f0ae00148fa6ab

Content type: Blog Post

Links:

How Virtualization Helps Healthcare Leverage Benefits from the Cloud

For healthcare organizations with IT infrastructure both on-premise and in the cloud, virtualization offers a stepping stone through a hybrid environment that brings many of the same benefits as the cloud.

Content type: Blog Post

Links:

MSP vs. MSSP: Why Your Business's Security Depends on Knowing the Difference

Dear Client,I am responding both to this white paper project and to your direct pitch request for a blog post.I am happy to provide my clients a complete abstract, outline, and Statement of Work for approval upon project commitment. White paper pricing depends on the length and project scope and typically ranges from $.50-$1.00 per word. I offer a 100% satisfaction guarantee for my clients, and each project includes up to two revisions and all necessary collaboration.

Content type: Whitepaper

Links:

White Paper Milestone #1: Support the need and rapid adoption of vendors providing Managed SIEM and MDR services

Client has commissioned a Content Package from Contractor to include a 1000-2000-word White Paper and a Five-Post Blog Series (500-600 words). All necessary planning, collaboration time (phone calls, emails, meetings, etc.), and content outline are included.

Content type: Whitepaper

Links:

Is Your Hacker Your Facebook Friend? FB Messenger Spreads Locky Ransomware

There's a new method of ransomware attack on the cybersecurity landscape--and it disguises itself as your Facebook friend to hack into your system. Over the last few days, businesses and individuals alike have been barraged with Facebook messages attached to an .SVG image file. Even if this file was sent by a legitimate Facebook friend, clicking the link could unleash a ransomware Trojan into your system.

Content type: Blog Post

Keywords: cybersecurity, ransomware

Links:

10 Cybersecurity Risks Travelers Face in 2017--And How to Avoid Them

To stay connected with work, family, and friends while on the road, many travelers opt to bring along their smartphones, tablets, and laptops. When taken abroad, these network-connected devices are particularly vulnerable to malware and other forms of cyberattack. Even the savviest, most well-seasoned travelers equipped with the latest security software and antivirus protection may not be able to thwart the persistent, sophisticated hackers awaiting them at their destination.

Content type: Blog Post

Links:

Accomplished B2B technology writer available to help with your content needs!

Hello! I specialize in writing blogs, website copy, white papers, and social campaigns for technology and digital marketing firms on topics ranging from HIPAA compliance in the cloud to the benefits of cloud networking over MPLS and SD-WAN. My blog posts are regularly curated and syndicated across the most widely-read tech publications in the industry.Most of my work is in the technology, FinTech, and cybersecurity space on both the B2B and B2C verticals.

Content type: Blog Post

Links:

Overcoming Data Isolationism: Cognitive IoT Solutions for Anomaly Detection with Machine Learning

"The massive volume of IoT data generated by millions of sensors is extremely dynamic, heterogeneous, imperfect and unprocessed." (Chen, 2012). It usually requires real-time analysis, with most implementations settling for rudimentary analysis and basic statistics--making countless assumptions on the collected data. One of the goals of machine learning is automatic monitoring and detection of abnormal events, changes or drifts in IoT data.

Content type: Whitepaper

Links: