PinnedKatlyn GalloinDark Roast SecurityDiving into Cybersecurity Management — Part OneMy journey into management when I felt I might be at rock bottom in my career.Mar 35Mar 35
PinnedKatlyn GalloinDark Roast SecurityGetting Started with Cyber Threat IntelligenceQuick & Easy Strategies to Maximize Your Cyber Defense Program with CTIApr 8, 2023Apr 8, 2023
PinnedKatlyn GalloinDark Roast Security7 Security Frameworks Every InfoSec Professional Should KnowA look at the common frameworks and standards that shape Information Security programs.Feb 7, 20223Feb 7, 20223
PinnedKatlyn GalloinDark Roast SecurityIs the CISSP Certification Worth It?Reflecting on the CISSP exam and the excitement two years later when I officially became certified.Sep 15, 20219Sep 15, 20219
PinnedKatlyn GalloinCode Like A GirlWhy Is There a Lack of Women in Cyber?An analysis of the gender gap in cybersecurity and tech careers alike.May 17, 20216May 17, 20216
Katlyn GalloinDark Roast SecurityPreparing for Killnet’s DDoS Attacks: What Healthcare Organizations Need to KnowDark Roast Intelligence BriefingFeb 8, 2023Feb 8, 2023
Katlyn GalloinDark Roast SecurityAlbum Stealer Malware, RMM Software Attacks & Vulnerability Exploits Trending in the WildDark Roast Intelligence | February 1, 2023Feb 1, 2023Feb 1, 2023
Katlyn GalloinDark Roast SecurityLight Roast 118: Intro to Cloud Security Posture ManagementThe Importance of CSPM & How to Implement It Within Your Organization.Dec 22, 2022Dec 22, 2022
Katlyn GalloinDark Roast SecurityFormbook Malware, shaderz Python Package & Two Major Zero-DaysDark Roast Intelligence | December 18, 2022Dec 18, 2022Dec 18, 2022
Katlyn GalloinDark Roast SecurityCyberattack Against DraftKings, the Delivery of Qbot & a Google Chrome Zero-DayDark Roast Intelligence | November 28, 2022Nov 28, 2022Nov 28, 2022