Sign in

Katlyn Gallo

What do security teams do when they’re not dealing with security incidents?

GettyImages.com

Today, I had the opportunity to talk to undergraduate Computer Science students about a Master’s degree in Cybersecurity. After talking a bit about how I got where I am today, someone asked me, “can you talk a bit about what you do from day to day in your role?”


Discovering myself one day at a time.

When I think back on my childhood, one of the things I always recall is never knowing what I wanted to be when I grew up. You all remember that question, right? You might’ve been in first grade, or maybe you were in fifth grade, but at some point, you were asked that question.


A publication home to stories from security professionals, thought-provoking articles, and informational content about the wide range of security topics and threats.

The Mission

The goal of this publication is to inspire, educate, and share ideas about InfoSec. Dark Roast Security is a platform designed to bring people together that are passionate about sharing their knowledge or want to learn something new about Cybersecurity.

Photo by Nathan Dumlao on Unsplash

What is Cybersecurity?

Cybersecurity has become so important in today’s modern world. For any non-IT reader, think about all of the technology you use today. Your smartphone, maybe a tablet, Amazon Alexa, Google Home, and all your other smart devices…


A Journal Entry

Photo by Joshua Hoehne on Unsplash

I pull into the parking lot of the health center. I’m 10 minutes early. Do I go in now? My appointment isn’t until eight, maybe I should wait a little bit. No, let’s just get this over with. I don my mask, grab my purse and open the door to get out of my car.


Three Stars — Good storyline, but left much to be desired.

image by author

The Guest List by Lucy Foley has been on my list for a while and it’s one I constantly see being recommended on various platforms. It’s a New York Times bestseller and many readers have compared it to the famous Agatha Christie novels.


Protecting against malicious user-defined input.

image by author

Welcome to the seventh article in the OWASP Collection! Today we’re going to be discussing cross-site scripting: what it is, how to perform an attack, and most important of all, how to protect against it.


A place to find your next read.

Photo by freestocks on Unsplash

Welcome to Reader’s Nook!


A Journal Entry

Photo by Anastasia Taioglou on Unsplash

Does anyone else ever get overwhelmed with the desire to do so much? Or is that just me?


A Journal Entry

Photo by Miguel Andrade on Unsplash

I’ve cracked the secret code to Medium earnings, and hint: it’s not all about going viral.

I’ve been writing on Medium since October 2020, so just over six months now, and over the last two months, I think I finally cracked the code. I am definitely not earning hundreds of dollars a month, so if that’s why you opened this article, sorry to disappoint. You’ll have to find that magic potion elsewhere.


What is the MITRE ATT&CK Framework and why should I learn about it?

If you’ve recently started out in the security industry you have probably heard of the MITRE ATT&CK framework before. Maybe you even have a basic understanding of what it is, but odds are you probably don’t have a full understanding of how it works and how it can be applied in a security operations program.

Katlyn Gallo

Coffee lover, bookworm, and InfoSec enthusiast | https://www.buymeacoffee.com/katlyngallo

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store