Photo by Glenn Carstens-Peters on Unsplash

Résumés are hard. And most people are bad at them — which makes sense, because you probably only write or update your résumé every few years. It involves selling yourself and your skills — something most people struggle with.

On top of this, it’s difficult to figure out how to sort through all the advice on the internet in order to figure out which is the good advice.

Plus people rarely think that their résumé is the problem, even if they’ve been struggling to get interviews. …


Photo by Jefferson Santos on Unsplash

Breaches happen every day. Nearly everyone’s data has been involved in a breach at this point (in fact, you can check if yours has been here). Security isn’t easy, and it often isn’t convenient.

So, how do you protect yourself online without having to remember a million impossible passwords? This is an (actually) easy to implement guide, which is the digital equivalent of locking your house when you leave. Implementing these steps won’t make you hack-proof (just as locking your house won’t make your house burglar-proof) but it will make you much safer online, and it won’t make your…


Photo by Markus Spiske on Unsplash

Cryptography is the science of using codes and ciphers to protect messages, at its most basic. Encryption is encoding messages with the intent of only allowing the intended recipient to understand the meaning of the message. It is a two way function (you need to be able to undo whatever scrambling you’ve done to the message). This is designed to protect data in transit. One of the earliest ciphers involved a simple shift. For example, if you just shift all the letters in the alphabet by a few, the alphabet might look like the following:

ABCDEFGHIJKLMNOPQRSTUVWXYZ

NOPQRSTUVWXYZABCDEFGHIJKLM

Then, each letter…


Security has a lot of acronyms. What do they mean? Let’s break them down into manageable bits.

First, HTTPS is actually HTTP running with TLS or SSL over it. First, we’ll cover HTTP, then TLS and SSL.

What is HTTP?

HTTP is what web browsers use to connect to web pages, images, etc. It is a connectionless text-based protocol. The connectionless part means that every time the web browser needs to load a new element, a new connection needs to be made (instead of keeping the connection open all the time — as most protocols do.) …


Photo by Alexandra Gorn on Unsplash

Great! You got a conference proposal accepted. Now you need to survive the talk. We’ll assume you’re already developed an idea, submitted a proposal, and written a description.

The outline

First, draft an outline. Don’t skip this step. It’s really tempting, but it will help you organize your thoughts and ensure you have a clear beginning, middle, and end to your talk.

If you can, try telling a story. Personally, I like to use this outline, fill it with bullet points, and use it as the basis of my talk. I dislike using scripts because I find that no matter how well…


Photo by Glenn Carstens-Peters on Unsplash

Growing up, I loved cheesy hacker movies like Hackers and War Games. I thought all hackers were crazy smart, crazy technical people working on super secret projects. I didn’t realize ‘hacker’ was a job title, and definitely never realized that cybersecurity was a career option. In fact, I studied Economics and Political Science in college, and it took me several years after that to figure out that I was (somewhat) qualified to work in security (mostly based on spending all my free time trying to figure out how things worked). When I started working in cybersecurity full-time, I assumed that…

Megan Kaczanowski

Threat Intel Analyst | Twitter: @megansdoingfine

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store