Robert LackeyPreparing for Cybersecurity Interviews at Top Tech CompaniesOver the past few years, I’ve been very fortunate to receive employment offers from several of the top tech companies for cybersecurity…Jun 20, 2023Jun 20, 2023
Robert LackeyLessons Learned From Being Laid-OffNear the end of February, I was laid-off when the company I was working for suspended operations. It was a little scary at first, but I…Jun 15, 2023Jun 15, 2023
Robert LackeyInterviewing at Tech CompaniesI’ve been very fortunate to have the opportunity to interview at many of the top tech companies, and I learned a lot from the experience…Jun 14, 2023Jun 14, 2023
Robert LackeyChecking for Overlap In CWE Numbers on the OWASP Top 10I’ve been reviewing the OWASP Top 10 recently to keep my skills fresh, and during my review, I got curious if there was any overlap in the…Mar 17, 2023Mar 17, 2023
Robert LackeyYou can get experience in cybersecurity without getting hired.If you’re trying to get into cybersecurity, gaining experience is important, but you don’t need to get hired by someone to get that…Dec 3, 2022Dec 3, 2022
Robert LackeyCybersecurity Mind MapCybersecurity is a difficult career because it’s requires an understanding of many things. The mind map below shows what it takes to have…Jun 27, 2020Jun 27, 2020
Robert LackeyHow To Get Hacker Super Powers“There are no secrets to success. It is the result of preparation, hard work, and learning from failure.” ~ Colin PowellDec 15, 2019Dec 15, 2019
Robert LackeyBug Bounty Diaries — Week VIII — SQL Injection With PythonIn this post, I create a python script to automate SQL injection attempts to the OWASP Juice Shop web app.Mar 24, 2019Mar 24, 2019
Robert LackeyBug Bounty Diaries — Week III — CSRF“A little learning is a dangerous thing.” ~ Alexander PopeFeb 10, 2019Feb 10, 2019
Robert LackeyBug Bounty Diaries — Week II — XSS“Satisfaction lies in the effort, not the attainment, full effort is full victory” ~ Mahatma GandiFeb 3, 2019Feb 3, 2019