InDark Roast SecuritybyKatlyn GalloDiving into Cybersecurity Management — Part OneMy journey into management when I felt I might be at rock bottom in my career.Mar 3, 20246Mar 3, 20246
InDark Roast SecuritybyKatlyn GalloLight Roast 118: Intro to Cloud Security Posture ManagementThe Importance of CSPM & How to Implement It Within Your Organization.Dec 22, 2022Dec 22, 2022
InDark Roast SecuritybyKatlyn GalloLight Roast 117: Intro to MFA FatigueWhat It Is and How to Avoid It.Nov 10, 20221Nov 10, 20221
InDark Roast SecuritybyKatlyn GalloLog4J Vulnerability ExplainedThe Log4j vulnerability exposed hundreds of thousands of systems to attack in December 2021. Now, nearly a year later, here’s where we are.Oct 4, 2022Oct 4, 2022
InDark Roast SecuritybyKatlyn GalloLight Roast 116: SAST vs. DASTIntro to Static and Dynamic Application Security TestingSep 15, 2022Sep 15, 2022
InDark Roast SecuritybyKatlyn GalloWhy You Need to Delete Your TikTok AccountEverything you need to know about the app that knows everything about you.Sep 12, 20224Sep 12, 20224
InDark Roast SecuritybyKatlyn Gallo4 Worthwhile Briefings I Attended at Black Hat 2022Black Hat USA 2022 was a two-day conference jam-packed with content. Here are 4 briefings I found most engaging and interesting.Aug 24, 20221Aug 24, 20221
InDark Roast SecuritybyKatlyn GalloLight Roast 115: What is Hashing?An introduction to hashing and some common use cases in technology.Aug 22, 2022Aug 22, 2022
InDark Roast SecuritybyKatlyn GalloFive Ways to Combat Alert Fatigue in Your Security ProgramStrategies to help you continuously reduce alerts, identify opportunities for improvement, and avoid alert fatigue.Aug 15, 2022Aug 15, 2022
InDark Roast SecuritybyKatlyn GalloKey Components of an Effective Security ProgramWhat makes a successful information security program?Jun 9, 2022Jun 9, 2022
InDark Roast SecuritybyKatlyn GalloLight Roast 114: Intro to Threat-Informed DefenseWhat is threat-informed defense and why is it important in today’s cyber threat landscape?Jun 1, 2022Jun 1, 2022
InDark Roast SecuritybyKatlyn Gallo2022 Mandiant M-Trends Report: WrappedA look into the trends that shaped the cyber threat landscape in 2021.May 23, 2022May 23, 2022
InDark Roast SecuritybyKatlyn GalloHow to Break Into Cybersecurity3 ways to get a foot in the door and land your first cybersecurity role.May 16, 20221May 16, 20221
InDark Roast SecuritybyKatlyn GalloLight Roast 113: Intro to the Cyber Kill ChainWhat is the Cyber Kill Chain & how can it help security teams?Mar 24, 2022Mar 24, 2022
InDark Roast SecuritybyKatlyn GalloA Conversation About My Journey in InfoSecAn Interview for ITSP Magazine’s Focal Point PodcastMar 3, 2022Mar 3, 2022
InDark Roast SecuritybyKatlyn GalloDark Side 126: Using Metasploit to Exploit SMBAn introduction to using Metasploit to exploit a Windows machine with an SMB vulnerability (MS17–010).Feb 24, 20222Feb 24, 20222
InDark Roast SecuritybyKatlyn Gallo7 Security Frameworks Every InfoSec Professional Should KnowA look at the common frameworks and standards that shape Information Security programs.Feb 7, 20223Feb 7, 20223
Katlyn GalloTech & InfoSec Acronym Cheat SheetAn acronym cheat sheet for beginners in tech and infosec.Jan 24, 2022Jan 24, 2022
InDark Roast SecuritybyKatlyn GalloLight Roast 110: Intro to DNS Attack TypesA closer look at DNS and how it’s used in cyberattacks.Jan 18, 2022Jan 18, 2022
InDark Roast SecuritybyKatlyn GalloDark Side 126: Intro to Log4jDiscovering & POC’ing the vulnerability that has taken the InfoSec world by storm.Dec 30, 2021Dec 30, 2021