Risk Management vs. Threat Intelligence-Driven Security Programs

Cybersecurity Capstone — Part Six

image by author

This article is part of my capstone blogging series, which will detail my project as I progress. For the full list of articles, visit my Cybersecurity Master’s Capstone list. Additionally, in this post and future ones, I’ll refer to the companies I’m analyzing as Company A, B, C, and so on for




Dark Roast Security’s mission is to inspire, educate, and share ideas about InfoSec. Follow to join our community!

Recommended from Medium

Crypto Key Generator Rsa Modulus 2048 Strategy

Staying Secure in the Cloud

{UPDATE} doodle mix Hack Free Resources Generator

Is WhatsApp really free?

Participate in Phala Network Telegram Reward and Win Over $500 by Following Easy Tasks!

Dark Side 105: Intro to Privilege Escalation

Hello Internet,

Validation of security apparatus in SoC

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Katlyn Gallo

Katlyn Gallo

Coffee lover, bookworm, and InfoSec enthusiast | https://ktgblogs.com | Find me on Twitter & Instagram: @ktgblogstech

More from Medium

Do you have a cybersecurity playground?

Do you invest in keeping your skills up to date?

Leveraging MITRE tools for effective Threat Informed Archite

The Missing Piece in Vulnerability Management

The Missing piece by Stiller Beobachter

Compiling Priority CVEs for Vulnerability Remediation Prioritization