
Java Application Security Examples
Introduction In this post, we are going to go over some of the classic vulnerabilities that can emerge in Java code and what we might do to help mitigate them. Through this survey, you should be a...
Introduction In this post, we are going to go over some of the classic vulnerabilities that can emerge in Java code and what we might do to help mitigate them. Through this survey, you should be a...
I’m finally graduating from Georgia Tech’s Online Master of Science Computer Science (OMSCS). For those of you interested, I’ve summarized my venture below (including pre-application preparatory ac...
Hi all! For those who periodically have visited this site, you may notice I’ve adopted a new look for the blog. The old site had a number of issues (both in performance and aesthetic) I wanted to ...
Introduction Cybersecurity certifications are a prominent way to develop your both your aptitude and employability. They serve as attestations by third-parties of your knowledge and competency, wh...
Introduction If you’re reading this, then first I should say: welcome to the community! Trying to figure out where to get started when considering a career in cybersecurity can be hard, but it do...
About one year ago HackTheBox (HTB) announced its second certification available to the public: the Certified Penetration Testing Specialist (CPTS). This certification follows their earlier Certif...
In this post, we’re going to discuss some of the nuances that go into performing the actual job hunt for your next (or perhaps, first) cybersecurity job. When looking to launch a career in cybersec...
This post is going to be a deviation from my usual topics; I’m in the midst of stepping through the Practical Malware Analysis book cover-to-cover and found one of the earliest steps – setting up y...
Each year, the National Security Agency (NSA) hosts an open invitation capture-the-flag (CTF) event for high school and university students and staff. The event, typically denoted by a series of 10...
When I got interested in a career in offensive cybersecurity, I looked around for some resources that would help train and develop my technical competencies. Besides some of the obvious big-ticket ...