Jennifer Marsh

Ghostwriter, blog writer, cybersecurity enthusiast, and technical writer

United States

An Expert Vetted writer with 10 years of experience helping brands grow their visibility online, I provide content with proven success for many small businesses and large enterprises. I've helped numerous companies improve traffic to their sites including Microsoft, Pure Storage, Adobe, Rackspace, CloudLinux, SolarWinds, IBM and several more. I've had content featured in TechCrunch and FastCompany. I've also ghostwritten technical books for O'Reilly.

Here is a list of what I can do for you:

* Technical blog posts from a subject matter expert
* Press releases
* Whitepapers
* Technical ebook ghostwriting
* Ghostwriting for traditional publishers

All writing is my own. I do not outsource, and I do not use AI to write content. My goal is to bring your content to standards for GEO (Generative Engine Optimization) and have your brand mentioned as a reference for Google Gemini, Copilot, or ChatGPT generative output. I do this by leveraging my own hands-on knowledge and incorporating it into your content. My knowledge brings subject matter expertise to your brand, making your content authoritative.

We can discuss budgets and goals together after you contact me.

Portfolio

Cybersecurity

Fingerprint
03/16/2023
How to Prevent Advertising Fraud

Any botnet or automated activity using fraudulent clicks, referrals, malicious redirects, or malware installations is considered advertising fraud. Learn how you can prevent advertising fraud and boost your return on ad spend (ROAS).

Access Point Technology
04/11/2023
Complete Guide to Ransomware Protection - Access Point Technology

With a countless number of reported ransomware attacks every month, it seems like the cybersecurity industry is losing its battle with cyber-criminals. Verizon reported that ransomware attacks increased 13% in 2022, a larger increase than the prior five years combined.¹ Human error is the primary re

TuxCare
10/20/2020
A Guide to Memory Vulnerabilities in the Linux Kernel - TuxCare

Most cyber-attacks are financially motivated, so attackers constantly come up with new ways to breach data. While the amount and sophistication of such attacks are constantly increasing, most of them are based on memory-corruption vulnerabilities-a problem that has been persisting over the last four decades.

Rippling
04/01/2023
Password Management Whitepaper

Passwords are the cornerstone of your IT security, and RPass ensures that your data is secured by our enterprise-grade cryptography and technology standards.

TuxCare
11/03/2020
Protecting Servers from HeartBleed. Yes, HeartBleed. - TuxCare

HeartBleed... kind of sounds like a love song from the 1970s. It's not. HeartBleed is a serious vulnerability ( CVE-2014-0160 ) affecting the OpenSSL shared library. It's been around since 2014, but unlike the oldies you hear once in a while on the radio, this cyber weakness is very much with us today.

TuxCare
09/07/2020
5 Ways to Reduce Server Downtime (And 1 Way To Eliminate It) - TuxCare

Rebooting servers hurts you and your customers. It's often done during off-peak hours (usually at night) when servers process fewer transactions, but even rebooting at this time costs thousands in downtime. One server reboot can take from several minutes to over an hour depending on the configuration, and it can take additional time for services to synchronize.

Rippling
1/1/2018
Password Management Whitepaper

Passwords are the cornerstone of your IT security, and RPass ensures that your data is secured by our enterprise-grade cryptography and technology standards.

Compliance

TitanHQ
Email Compliance

To ensure email compliance, organizations need email archiving solutions to control content within emails, to ensure data is protected.

Application Logging and Data Ingestion

Log Analysis | Log Monitoring by Loggly
01/12/2016
Benchmarking 5 Popular .NET Logging Libraries

Several logging frameworks promise .NET coders a "five-minute setup and start logging" solution for their projects. We decided to test these frameworks to identify speed and convenience between them. We added convenience into the equation because most .NET coders know that they can write events to the Windows Event Viewer without implementing any extra libraries.

Software Development and API Content

dzone.com
Developing with Performance in Mind - DZone

When developers are faced with building a solution, they focus on "making it work." What they sometimes forget is the importance of application performance. Whether it's web, desktop or mobile device-based programming, your users want an application that responds quickly. They don't want a desktop application that hangs or a web application that takes too long to load.

Scrapingbee
Web Scraping with C#

C# is rather popular as backend programming language and you might find yourself in need of it for scraping a web page (or multiple pages). In this article, we will cover how to scrape a website using C#.

Rollbar
06/13/2018
Errors on the world's top 100 websites and how to avoid them

When you think of the top 100 sites in the world, you think of high-traffic domains and pages coded to perfection. In fact, even the most popular sites in the world have errors hidden behind the scenes that are still visible in your browser's developer tools.

Cloud Infrastructure