Kateryna Liu
-
Posted by
on
Software Supply Chain Vulnerabilities and How to Address Them
Author: Sean Whitmore, GWEB, CSSLP — Application Security Engineer. 11 years of experience in secure software development lifecycle implementation, code review, and vulnerability management for web and mobile applications. Works with development…
-
Posted by
on
Penetration Testing and Vulnerability Scanning
Author: Marcus Hale, OSCP, CEH — Offensive Security Specialist. Penetration tester with 11 years of hands-on experience across network, web application, and social engineering assessments. Consultant: Marcus Dreiling, OSCP, CEH — certified penetration tester…
-
Posted by
on
What Is Vulnerability Prioritization
Author: Sean Whitmore, GWEB, CSSLP — Application Security Engineer. 11 years of experience in secure software development lifecycle implementation, code review, and vulnerability management for web and mobile applications. Works with development…
-
Posted by
on
What is the Exploit Prediction Scoring System
Author: Nora Belfield, GCTI — Senior Threat Intelligence Analyst, 9 years of experience tracking advanced persistent threat groups and translating raw intelligence into actionable risk context for security operations teams. Consultant: Sandra Okafor, CISSP…
-
Posted by
on
What Is Unified Threat Management
Author: Dana Marlowe — technology writer and editor with over ten years of experience covering cybersecurity, privacy, and enterprise IT. Has contributed to security-focused publications and worked directly with IT and compliance…
-
Posted by
on
Securing Operational Technology, ICS, and SCADA Systems
Author: Victor Strang, GICSP — Industrial Cybersecurity Engineer. 15 years of experience in operational technology security across energy, utilities, and manufacturing. Specializes in ICS/SCADA risk assessments, network segmentation for industrial environments, and…
-
Posted by
on
What Is a Vulnerability Assessment
Author: James Calloway, CISSP, CISM — Senior Cybersecurity Risk Advisor. More than 14 years of experience helping organizations translate cyber threats into financial decision frameworks. Specializes in risk quantification, cyber insurance modeling, and…
-
Posted by
on
What Is Cyber Risk Quantification
Author: James Calloway, CISSP, CISM — Senior Cybersecurity Risk Advisor with over 14 years of experience helping organizations translate technical threats into financial decision frameworks. Organizations that invest in cybersecurity without measuring…
-
Posted by
on
Attack Vectors and Attack Surfaces in Cybersecurity
Author: Alex Mercer – Principal Security Architect specializing in cloud infrastructure defense and enterprise cyber risk mitigation. TL;DR: Business and security teams often confuse attack vectors (the how) with attack surfaces (the where). Knowing the difference…
-
Posted by
on
Zero Day Exploits In Operations
A zero-day exploit can turn routine vulnerability management into immediate containment. This article explains what the term means operationally, how zero-days unfold, and what disciplined defensive work looks like before and after…









