Wednesday, May 15, 2024

How to write an SEO-optimized writer bio

To satisfy SEO and the Google Knowledge Graph, you should provide information that instills Google with confidence in your identity, authority, popularity, and relevance to a Google SERP audience.

I invite you to take my bio apart, examine it, and tag the portions that address these confidence areas. Then, you can compile your data and create an equally effective bio for Google. And don't forget to put it on your entity home page, preferably the About page on your website.

Why should you listen to me? I have a Google Knowledge Panel, which the Google Knowledge Graph makes possible. I also have results on the first page of Google search for several keywords.

About David D. Geer

David Geer is a writer who specializes in cybersecurity and technology content. He writes for companies and publications as a content writer and journalist.

David Geer is a U.S. writer working independently and through various agencies. David wrote for Chief Security Officer magazine (CSOonline.com) as an independent contributor. He works as a ghostwriter and under his byline.

History

David Geer began his career in 2000, forming an independent writing services company under the registered trade name Geer Communications, an Ohio company.

Also Known As

David D. Geer.

Education

Lake Erie College

David D. Geer Bio

I have 24 years of writing experience as an independent contractor, including 11 years writing for CSO magazine (Chief Security Officer/CSOonline). I was a Features / Insiders Writer when CSO received the B-to-B Website, Technology / Telecom Eddies Digital award.

I have enjoyed writing for clients, including:

o The Communications of the ACM | The AICPA | Architectural Lighting

o Athlon Communications | BizTech | Box

o Cable One | Centrify (Delinea) | Cisco

o ContainerJournal | Continuity | CyberCoders

o Cynet | DevOps.com | Docker

o Dynatrace | EdTech | Enzoic

o Evault | FASOO | FORTUNE Brand Studio

o GuidePoint Security | HORNE | HP

o HPE | IBM | iboss

o IDG (Foundry) | Industrial Defender | Iron Mountain

o ISC(2) | iStorage | ITPro

o MIT Technology Review | PathMaker Group | PerimeterX (HUMAN)

o ProcessUnity | QASymphony | Questex

o SAI Global | Securonix | Specops Software

o Symantec | TechTarget | ThreatX

o TierPoint | Vectra AI

o Veridify | WindRiver

I write adeptly about cybersecurity, infosec, and related topics with the understanding of an industry insider. Industry experts, c-levels, and practitioners share their insights and experiences with me. I relate to their terminology and translate what they tell me for your business and technical audiences. I can write in a unique signature style or the voice and tone you require.

Clients engage my creative skillset to sculpt authoritative writing in the cybersecurity niche. Reach me for rates, availability, and details, or schedule a quick chat.

My interests include spending time with friends, family, and my adorable cat, Kibbie. I enjoy reading and cooking.


Wednesday, October 23, 2019

Wednesday, October 9, 2019

7 Password Problems Solved by Enzoic Password Policy Enforcement - Enzoic



Organizations need password policy enforcement that screens for compromised passwords daily and follows NIST password guidelines. Here are some tips!

https://www.enzoic.com/password-policy-enforcement/

Wednesday, October 2, 2019

Industry Experts Provide Tips For Successful Cyber Diligence in M&A - Security Boulevard



Mergers and acquisitions can be successful growth strategies for many companies. They bring together customers, IP, and assets — but they also bring together liabilities and risk as well. Among these are cybersecurity risks. “Cyber diligence” — cybersecurity evaluations performed as part of the M&A decision-making processes — has grown in importance in recent years. … Continue reading \"Industry Experts Provide Tips For Successful Cyber Diligence in M&A\" The post Industry Experts Provide Tips For Successful Cyber Diligence in M&A appeared first on Threat Stack.

https://securityboulevard.com/2019/09/industry-experts-provide-tips-for-successful-cyber-diligence-in-ma/

Wednesday, September 25, 2019

My friends at Intel registered a patent that references one of my articles.



D . Geer , D . Geer , D . Geer and D . Geer , “ Reducing the Storage Burden via Data Deduplication , ” in Computer , vol . 41 , No . 12 , pp . 15 - 17 , Dec . 2008 . ( Year : 2008 ) . *

https://patentimages.storage.googleapis.com/62/80/38/ded31503125d61/US10372695.pdf

Sunday, August 4, 2019

The Letter-of-Introduction (LOI) As Thought-Leader & Subject-Matter Expert Content Writing Sample!



The Letter-of-Introduction (LOI) As Thought-Leader & Subject-Matter Expert Content Writing Sample! #content #contentwriter #contentmarketingwriter #contentmarketing #writers #cybersecurity #contentstrategy #geercom

https://www.linkedin.com/pulse/letter-of-introduction-loi-thought-leader-expert-content-david-geer/

Tuesday, July 2, 2019

Private, Public, or Hybrid: Where should the workload go? - Be Ready Content Hub



Members of IDG’s Influencer Network weigh in with key considerations Cloud technologies have improved time to market, lowered operational and capital expenditures, and provided organizations with the ability to dynamically adjust provisioning to meet changing needs. But it can still be difficult at times to discern how to optimize a cloud solution to meet your […]

https://bereadycontenthub.com/beready/ffit/art/private-public-or-hybrid-where-should-the-workload-go/

Sunday, June 30, 2019

“Lost City of the Monkey God” reveals treasure trove of rare, new and rediscovered species



An expedition to the “Lost City of the Monkey God” in Honduras has revealed a trove of natural treasures. The pristine forests house an incredibly rich ecosystem, including species new to science, some unknown in the area, some that haven’t been seen in decades and others that were believed extinct.

https://newatlas.com/honduras-lost-city-wildlife-expedition/60350/

Friday, June 28, 2019

Key Skills for Records Managers: How RIM Professionals Can Best Work With CPOs



Key skills for records managers include the ability to foster good relations with CPOs in support of the company\'s privacy program.

https://www.infogoto.com/key-skills-for-records-managers-how-rim-professionals-can-best-work-with-cpos/

Cryptojacking: Hackers Mining Bitcoin on Your Dime!



When cryptojacking, criminal hackers use enterprise computers to mine cryptocurrencies like bitcoin without the organization\'s knowledge or consent.

https://www.infogoto.com/cryptojacking-hackers-mining-bitcoin-on-your-dime/

Digital Security: Preventing Unauthorized Access to Company Data



Modern threats to digital security cost companies in many ways. Major data breaches have killed some companies and led others to fire chief executives.

https://www.infogoto.com/digital-security-preventing-unauthorized-access-to-company-data/

WORM Compliance at Work



Vendors create storage technologies that satisfy WORM compliance (Write-Once, Read-Many) so that organizations can write data to the media indefinitely.

https://www.infogoto.com/worm-compliance-at-work/

WORM Storage, the Immutable Solution

Various information security requirements and regulations dictate or suggest that organizations use WORM storage for data they cannot afford to lose.

https://www.ironmountain.com/resources/general-articles/w/worm-storage-the-immutable-solution

7 Hard Truths About Blockchain Security



These seven hard truths about blockchain security could affect your decision to invest in blockchain. Learn about them to make an informed choice.

https://www.infogoto.com/7-hard-truths-about-blockchain-security/

Fileless Malware: Computer Infections Undress for Success



Fileless malware strips away the files that clothe malicious software and injects code, commands and instructions into the RAM for native Windows tools.

https://www.infogoto.com/fileless-malware-computer-infections-undress-for-success/

Hackers are Hurting the Internet of Things in More Ways Than you Think



The Internet of Things (IoT) brings security issues to every organization, making it easy for hackers to exploit your most sensitive information. But how?

https://www.infogoto.com/hackers-are-hurting-the-internet-of-things-in-more-ways-than-you-think/

Tuesday, June 25, 2019

Why CLOUD-READY is the right PAM choice for you right now!



By David Geer If your organization is like most, you are at some point on your journey to the cloud. You probably have partners, customers, and third-party vendors whose cloud investments give you some relationship with the cloud based on your commitments to them, or vice versa.

https://www.linkedin.com/pulse/why-cloud-ready-right-pam-choice-you-now-david-geer/

How to write an SEO-optimized writer bio

To satisfy SEO and the Google Knowledge Graph, you should provide information that instills Google with confidence in your identity, authori...