Katlyn GalloDiving into Cybersecurity Management — Part OneMy journey into management when I felt I might be at rock bottom in my career.Mar 35Mar 35
Katlyn GalloCompiling Priority CVEs for Vulnerability Remediation PrioritizationCybersecurity Capstone — Part FiveApr 21, 2022Apr 21, 2022
Katlyn GalloAssessing & Mapping Security Tool Capabilities to the ATT&CK MatrixCybersecurity Capstone — Part ThreeMar 31, 2022Mar 31, 2022
Katlyn GalloA Conversation About My Journey in InfoSecAn Interview for ITSP Magazine’s Focal Point PodcastMar 3, 2022Mar 3, 2022
Katlyn GalloDark Side 124: Intro to LFI VulnerabilitiesWhat is Local File Inclusion (LFI) and how can it be exploited?Dec 7, 2021Dec 7, 2021
Katlyn GalloUnderstanding the Information Security IndustrySecOps, Incident Response, Vulnerability Management, Risk Analysis…where do I start?Nov 1, 2021Nov 1, 2021
Katlyn Gallo3 Ways to Keep Your Personal Information SecureHow to secure your personal information by being smarter online.Oct 25, 2021Oct 25, 2021
Katlyn GalloDark Side 122: Intro to Shells & NetcatAn intro to shells, their use cases, and Netcat, a networking tool every pentester should know.Oct 21, 2021Oct 21, 2021
Katlyn GalloHow To Improve Your Password Hygiene3 tips to help you improve your password hygiene and protect your accounts from being compromised.Oct 19, 20211Oct 19, 20211
Katlyn GalloDark Side 121: Exploiting File Upload Vulnerabilities — Part ThreeEnumerating and bypassing server-side filtering for file uploads.Oct 15, 2021Oct 15, 2021