Sign in

Katlyn Gallo
Photo by Steven Lasry on Unsplash

I took the CISSP exam back in November of 2019, so you can say it’s been quite a long journey. When I first passed the exam, I knew I was going to have to wait at least a year and a half before I could apply for endorsement and receive the certification.

Back then I dreaded the wait, but as people always said when I was growing up, the older you get, the faster time goes by. …

image from Security Magazine

The fact that there are so few women in the cybersecurity industry isn’t news to anyone. This has been an issue for years and years but has become more of a popular topic in parallel with the rise in popularity of the profession.

One would think that as cybersecurity becomes a more well-known profession, the gender gap that has existed would start to even itself out, but that hasn’t been the case at all.

According to a survey performed in August 2018 by ISC2, women made up 24 percent of the cybersecurity workforce. …

Photo by Carlos Muza on Unsplash

I recently had the privilege of participating in a fireside chat series for the University of Colorado, Colorado Springs Cybersecurity Apprenticeship program. Say that five times fast!

The series was broken down into three episodes:

  1. Beginning as an analyst
  2. Acing the analyst interview
  3. Career growth as an analyst

Through these episodes, the goal was to provide insight into what it’s like to be a cybersecurity analyst, tips for obtaining an analyst position, and finally, what career growth for an analyst looks like.

Because this series was developed by UCC-CS and won’t be widely distributed outside of the university, I thought…

Today, I had the opportunity to talk to undergraduate Computer Science students about a Master’s degree in Cybersecurity. After talking a bit about how I got where I am today, someone asked me, “can you talk a bit about what you do from day to day in your role?”

Boy was that a loaded question! A great one, but nonetheless loaded.

I could’ve talked for hours about what I do in my role as a Security Engineer, but I only had a few minutes so I tried to keep it short. …

When I think back on my childhood, one of the things I always recall is never knowing what I wanted to be when I grew up. You all remember that question, right? You might’ve been in first grade, or maybe you were in fifth grade, but at some point, you were asked that question.

What do you want to be when you grow up?

Whenever I was asked that I could never answer it, or at least not honestly. All the kids around me would answer with the typical responses: firefighter, vet, doctor, or teacher. There were some that got…

Photo by A n v e s h on Unsplash

I never understood all the hype around Cape Cod, Massachusetts, AKA “The Cape”. Growing up, I always heard kids at school talking about their summer vacation spent in The Cape, and I always remember thinking, it’s Massachusetts, how nice can it be?

While there are plenty of beautiful areas in New England, the northeastern part of the U.S. is better known for terrible roads, ugly, dirty cities, the horrible winter weather, and of course, the high cost of living. And yes, I’m allowed to say all of that because I’m a New Englander.

I guess I’m also a bit spoiled…

Photo by Axel Houmadi on Unsplash

When people talk about the attacks of September 11th, 2001, most of the time, the conversation starts with, “I remember exactly where I was that day and what I was doing when the first plane hit.”

For me, I was five years old, in my second or third week of Kindergarten and I don’t remember a thing about that day. From what I’ve been told, my parents got a call that they had to come pick me up from school which honestly surprises me.

Having gone through the Sandy Hook shooting in 2012 when I was in my Sophomore year…

Photo by Glenn Carstens-Peters on Unsplash

In my first article about file upload vulnerabilities, we covered some of the basic ways these upload fields could put a website at risk. During that article, I touched on ways to secure or mitigate these flaws, which included filtering, and that’s exactly what we’re going to cover in part two.

If you haven’t already read part one, you can check it out by following the link below, otherwise continue reading for a deeper dive into the various types of client and server-side filters.

Client-Side vs. Server-Side Filtering

When it comes to filtering file uploads, there are two categories: client-side and server-side. In general…

image from


One of Us is Lying follows four students as they deal with the aftermath of a student’s sudden death. Were they just in the wrong place at the wrong time or is there more to this mysterious death?

Bronwyn is the class nerd, Yale-bound in a few years.
Addy is the football superstar’s girlfriend.
Cooper is a “typical” jock, a baseball player that’s already being scouted by colleges and the major leagues.
And finally, Nate, the class bad boy who’s been to jail on drug charges and is currently on probation.

All each of them knows is they were framed…

Photo by Aron Visuals on Unsplash

I really should be using this time to finish up my OWASP series or Part Two of Exploiting Upload Vulnerabilities, but I’m just not feeling it right now. I think most of that lack of motivation is stemming from the funk I’m in this week.

Last night I was laying in bed thinking about all that’s going on in my life and how I have so many things in-flight, things I want to do and have started but haven’t finished.

I want to get MITRE ATT&CK certified, which is a cybersecurity framework. I paid the $300 annual subscription to get…

Katlyn Gallo

Coffee lover, bookworm, and InfoSec enthusiast | | Find me on Twitter & Instagram: @ktgblogs

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store