Today, I had the opportunity to talk to undergraduate Computer Science students about a Master’s degree in Cybersecurity. After talking a bit about how I got where I am today, someone asked me, “can you talk a bit about what you do from day to day in your role?”
Boy was that a loaded question! A great one, but nonetheless loaded.
I could’ve talked for hours about what I do in my role as a Security Engineer, but I only had a few minutes so I tried to keep it short. …
When I think back on my childhood, one of the things I always recall is never knowing what I wanted to be when I grew up. You all remember that question, right? You might’ve been in first grade, or maybe you were in fifth grade, but at some point, you were asked that question.
What do you want to be when you grow up?
Whenever I was asked that I could never answer it, or at least not honestly. All the kids around me would answer with the typical responses: firefighter, vet, doctor, or teacher. There were some that got…
The goal of this publication is to inspire, educate, and share ideas about InfoSec. Dark Roast Security is a platform designed to bring people together that are passionate about sharing their knowledge or want to learn something new about Cybersecurity.
Through this publication, I hope to share experiences of Cybersecurity professionals across the industry, spread knowledge, and publish thought-provoking content for our readers.
Cybersecurity has become so important in today’s modern world. For any non-IT reader, think about all of the technology you use today. Your smartphone, maybe a tablet, Amazon Alexa, Google Home, and all your other smart devices…
I pull into the parking lot of the health center. I’m 10 minutes early. Do I go in now? My appointment isn’t until eight, maybe I should wait a little bit. No, let’s just get this over with. I don my mask, grab my purse and open the door to get out of my car.
Why am I so nervous? I get the flu shot every year, this is no different, I tell myself.
But it is different somehow. I trust science, so it’s not that. If I believed this vaccine was part of some larger agenda to kill off…
The Guest List by Lucy Foley has been on my list for a while and it’s one I constantly see being recommended on various platforms. It’s a New York Times bestseller and many readers have compared it to the famous Agatha Christie novels.
Given this, I had high hopes for this book and was excited to start it. I don't want to say I was disappointed because the storyline did deliver in terms of a few crazy plot twists, but for most of the book, I was underwhelmed.
The Guest List tells a story of a wedding that takes place…
Welcome to the seventh article in the OWASP Collection! Today we’re going to be discussing cross-site scripting: what it is, how to perform an attack, and most important of all, how to protect against it.
For the first five articles, check out the Intro to the OWASP Collection.
Cross-site scripting is a vulnerability that exists in web applications that don’t properly validate user-supplied data. When successfully exploited, the vulnerability can result in malicious code being injected into a given webpage that then executes when visitors open the compromised page.
What exactly does it mean to validate user-supplied data?
Welcome to Reader’s Nook!
Recently, I’ve been having quite the itch to start writing book reviews and because I couldn’t find a publication that felt like it could be home to my reviews, I decided to create one. This is my third publication and I’m hoping it turns out to be just as successful as my other two!
To kick things off, I wanted to give a little background to me, the editor, and why I created Reader’s Nook.
Growing up, I secretly loved reading the books in English class that everyone thought were boring, like The Grapes of Wrath…
Does anyone else ever get overwhelmed with the desire to do so much? Or is that just me?
Lately, I’m constantly finding that I have so many things I want to do or try. Maybe that’s just a sign I’m bored and want to do more. As if I’m not doing enough already with a full-time job, a master’s degree program, mentoring and blogging.
I know, I’m crazy.
It’s funny because on my busiest days I curse myself for taking on so much.
Then there are days like today, where I sit on the couch on a Saturday morning, a…
I’ve cracked the secret code to Medium earnings, and hint: it’s not all about going viral.
I’ve been writing on Medium since October 2020, so just over six months now, and over the last two months, I think I finally cracked the code. I am definitely not earning hundreds of dollars a month, so if that’s why you opened this article, sorry to disappoint. You’ll have to find that magic potion elsewhere.
The secret is not in writing one or two viral articles, it’s not about writing every day, and it’s not about being published in the big-wig publications.
If you’ve recently started out in the security industry you have probably heard of the MITRE ATT&CK framework before. Maybe you even have a basic understanding of what it is, but odds are you probably don’t have a full understanding of how it works and how it can be applied in a security operations program.
When I started my first cybersecurity role a little over two years ago, I had no idea what the MITRE ATT&CK Framework was and then one day, my manager mentioned he wanted to start leveraging the ATT&CK framework in our security operations program.