Katlyn GalloDiving into Cybersecurity Management — Part OneMy journey into management when I felt I might be at rock bottom in my career.Mar 35Mar 35
Katlyn GalloGetting Started with Cyber Threat IntelligenceQuick & Easy Strategies to Maximize Your Cyber Defense Program with CTIApr 8, 2023Apr 8, 2023
Katlyn GalloPreparing for Killnet’s DDoS Attacks: What Healthcare Organizations Need to KnowDark Roast Intelligence BriefingFeb 8, 2023Feb 8, 2023
Katlyn GalloAlbum Stealer Malware, RMM Software Attacks & Vulnerability Exploits Trending in the WildDark Roast Intelligence | February 1, 2023Feb 1, 2023Feb 1, 2023
Katlyn GalloLight Roast 118: Intro to Cloud Security Posture ManagementThe Importance of CSPM & How to Implement It Within Your Organization.Dec 22, 2022Dec 22, 2022
Katlyn GalloFormbook Malware, shaderz Python Package & Two Major Zero-DaysDark Roast Intelligence | December 18, 2022Dec 18, 2022Dec 18, 2022
Katlyn GalloCyberattack Against DraftKings, the Delivery of Qbot & a Google Chrome Zero-DayDark Roast Intelligence | November 28, 2022Nov 28, 2022Nov 28, 2022
Katlyn GalloAmazon RDS Data Exposure, Breach of a Federal Network & the Rise of DTrack MalwareDark Roast Intelligence | November 21, 2022Nov 21, 2022Nov 21, 2022
Katlyn GalloIntroducing Dark Roast IntelligenceThe newest section of Dark Roast Security.Nov 15, 2022Nov 15, 2022