A Mason Who Uses Vowels & Consonates To Build

Hi and welcome! I’m Mason Stevenson, a highly motivated, emotionally intelligent, skilled word wizard, marketer, web content creator, podcaster and relationship builder. If that's not enough, I'm also a husband, dad, and nerd.

Featured Work At-a-Glance

Professional, Personal & Volunteer

How to save time, money, and sanity on your next OT audit

LinkedIn and 3rd parties use essential and non-essential cookies to provide, secure, analyze and improve our Services, and to show you relevant ads (including professional and job ads) on and off LinkedIn. Learn more in our Cookie Policy.Select Accept to consent or Reject to decline non-essential cookies for this use. You can update your choices at any time in your settings.

LinkedIn and 3rd parties use essential and non-essential cookies to provide, secure, analyze and improve our Services, an...

IT/OT Convergence – the foundation of digital transition

In 2025, IT and OT teams in many organizations continue to work independently of one another. But there is a paradigm shift happening. The two, as they have been for years, continue to overlap. This convergence has become, as the title of this blog suggests, the foundation of the digital transition of OT. And that’s a positive thing. Why? It yields valuable organizational gains especially around efficiency and OT security.

Using Automated Audits for Continuous Improvement in OT Security

Chances are, you have a real problem on your hands. More than likely, at least one Windows machine in your installed base is running Windows XP. You don’t have to do an online search to know it has thousands of vulnerabilities associated with it. While one machine is bad enough, another thought has probably crossed your mind: how many other machines in your installed base are running the same or older OS?
Photo by Sora Shimazaki on Pexels

The Legal Impact of AI on HR

Should the use of artificial intelligence be legislated? It’s a fair question considering its growing use in everyday life. It’s also a question that can and should be debated, especially when looking at it through the lens of human resources. Privacy issues. Data issues. Issues of bias. And those are just a few of the big ones. That said, the purpose of this article isn’t to argue for or against the use of AI as an HR tool, but to look at the current state of the legal situation around the technology.

Top five signs that you're outgrowing your OT threat detection solution

You’ve had your OT threat detection product for a while, but somehow it doesn’t feel like it’s enough anymore. Not necessarily because the product isn’t quality, but because you or other stakeholders in the company might have expected something different.

If that describes your situation, download the Top five signs that you’re outgrowing your OT threat detection solution. You'll learn about the reasons why and in which functional areas asset owners outgrow their OT threat detection solutions as they mature in their journey towards secure and resilient OT networks.

The OT Asset Inventory Handbook

The OT Asset Inventory Handbook
If you have downloaded this handbook, it’s safe to assume you know about the importance of an OT asset inventory, tried to build one with Microsoft Excel, and failed. You probably even tried an ICS Detection product, only to realize that such products don’t quite get the job done regarding an asset inventory. That’s just logical. Building a useful OT asset inventory requires a dedicated tool. It cannot be accomplished using a simple spreadsheet application or residual data from network anomaly detection.

Something much more robust is needed.

The OTbase OT asset management software is such a tool. But this handbook is not another fluffy sales brochure. In it, we explain what is required to build an enterprise-wide OT asset inventory, what it can be used for, and what you can expect to gain from it. As it turns out, a contextualized OT asset inventory is the foundation for multiple use cases in cyber security, engineering, and maintenance. This handbook is written for stakeholders in all three domains, as well as for top management.

The OT Vulnerability Management Handbook

Every organization feels the pressure towards better cyber security. Management demands vulnerability management efforts but often doesn’t have good ideas how to turn aspirations into measurable results. This handbook acts as a how-to guide for implementing an effective OT vulnerability
management process that is repeatable and delivers measurable and meaningful reductions of the attack surface. Written by the team that cracked the infamous Stuxnet malware, it focuses on three major aspects: proper tooling, a remediation strategy that is easy to implement, and superb reporting. It addresses both OT security practitioners and top management.

Testimonials

“As an innate problem-solver, Mason always seeks to understand buyer needs, so his writing converts the right people and provides them with solutions to their specific challenges.“

- Ava Champion

“Looking for professionalism? Dedication? Smarts? A team player? A decent human being? Mason checks all the boxes.”

- Omar Sofradzija

“Beyond his ability to grasp complex concepts and translate them into engaging, insightful content, one of Mason’s most remarkable strengths is his capacity to build strong, meaningful relationships.”

- Sarah Cielinski

“Mason is a consummate professional. Being a talented and motivated writer is one thing, but to back up that work with an earnest interest in delighting clients and supporting coworkers- In my opinion, that’s the most prominent mark of a great teammate.”

- Ian McDonough

Contact Me

My inbox is always open. For questions or to request a copy of my CV, please use the contact form below.

Message successfully sent!

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.