PinnedPublished inDark Roast SecurityDiving into Cybersecurity Management — Part OneMy journey into management when I felt I might be at rock bottom in my career.Mar 36Mar 36
PinnedPublished inDark Roast SecurityGetting Started with Cyber Threat IntelligenceQuick & Easy Strategies to Maximize Your Cyber Defense Program with CTIApr 8, 2023Apr 8, 2023
PinnedPublished inDark Roast Security7 Security Frameworks Every InfoSec Professional Should KnowA look at the common frameworks and standards that shape Information Security programs.Feb 7, 20223Feb 7, 20223
PinnedPublished inDark Roast SecurityIs the CISSP Certification Worth It?Reflecting on the CISSP exam and the excitement two years later when I officially became certified.Sep 15, 20219Sep 15, 20219
PinnedPublished inCode Like A GirlWhy Is There a Lack of Women in Cyber?An analysis of the gender gap in cybersecurity and tech careers alike.May 17, 20216May 17, 20216
Published inDark Roast SecurityPreparing for Killnet’s DDoS Attacks: What Healthcare Organizations Need to KnowDark Roast Intelligence BriefingFeb 8, 2023Feb 8, 2023
Published inDark Roast SecurityAlbum Stealer Malware, RMM Software Attacks & Vulnerability Exploits Trending in the WildDark Roast Intelligence | February 1, 2023Feb 1, 2023Feb 1, 2023
Published inDark Roast SecurityLight Roast 118: Intro to Cloud Security Posture ManagementThe Importance of CSPM & How to Implement It Within Your Organization.Dec 22, 2022Dec 22, 2022
Published inDark Roast SecurityFormbook Malware, shaderz Python Package & Two Major Zero-DaysDark Roast Intelligence | December 18, 2022Dec 18, 2022Dec 18, 2022
Published inDark Roast SecurityCyberattack Against DraftKings, the Delivery of Qbot & a Google Chrome Zero-DayDark Roast Intelligence | November 28, 2022Nov 28, 2022Nov 28, 2022