KatlynJul 23, 20227 minIntegrating Threat Intelligence & ATT&CK Into a Security ProgramHow can companies use threat intelligence and the ATT&CK framework to make their security programs more effective? I recently obtained my...
KatlynJul 23, 20229 minA Conversation About My Journey in InfoSecAn Interview for ITSP Magazine’s Focal Point Podcast This conversation was originally recorded with ITSP Magazine for their Focal Point...
KatlynJan 26, 20227 minIntro to DNS Attack TypesA closer look at DNS and how it’s used in cyberattacks. When you think of DNS attack types, the first thing that probably comes to mind...
KatlynJan 5, 20228 minWhat is BEC & How Can We Defend Against It?Introduction to Business Email Compromise and the best ways to defend against it. Business Email Compromise, or BEC, is a term that’s...
KatlynNov 9, 20217 minIntro to Cloud Security & the Shared Responsibility ModelWhat does cloud security really mean and who is responsible for it? For the past decade, the use of “the cloud” has become more and more...
KatlynNov 1, 20216 minUnderstanding the Information Security IndustrySecOps, Incident Response, Vulnerability Management, Risk Analysis…where do I start? The information security industry is very large and...
KatlynOct 25, 20216 min3 Ways to Keep Your Personal Information SecureHow to secure your personal information by being smarter online. With so many social platforms, it’s easy to share information without...
KatlynOct 19, 20216 minHow To Improve Your Password Hygiene3 tips to help you improve your password hygiene and protect your accounts from being compromised. Passwords: We all hate dealing with...
KatlynOct 12, 20216 min3 Tips to Help You Secure Your Devices & AccountsIf you haven't heard this from me already, October is Cybersecurity Awareness Month. This October, I'm publishing 12 tips throughout the...
KatlynOct 3, 20215 min3 Tips to Help You Avoid Phishing ScamsDid you know October is Cybersecurity Awareness Month? Read on to learn more about how you can stay secure online.