Katlyn Gallo
Cybersecurity Engineer at Healthcare Industry
Expertise: Cybersecurity
Education: Quinnipiac University; Southern Connecticut State University

Katlyn Gallo is a cybersecurity engineer in the healthcare industry who has worked in engineering, IT and security since 2017. Gallo is a board member for Women of Security and previously worked with Cotiviti and C&S Wholesale Grocers. Gallo holds a Master’s degree in cybersecurity from Quinnipiac University and is a CISSP.

Sort By
Most Recent
Most Recent
Oldest
20 Articles
A user types an authentication code into a tabled from a phone
MFA fatigue, also known as MFA abuse attacks, are a type of cyber threat that is on the rise. Familiarize yourself with the risks so you don’t fall victim.
A laptop shows a warning against a background of code that says "Log4j"
The Log4j vulnerability arose in December of 2021, exposing hundreds of thousands of systems to attack. Now, nearly a year later, here’s where we are.
A woman works on multiple computers filled with code and graphics
SAST and DAST are two methods for testing the security of a web application. Here are the key differences between them.,
A cast-iron skillet with corned beef hash topped with a fried egg and a wooden spoon next to it.
Hashing is an important concept in cybersecurity as it allows for the safe encryption of data. This guide explains its principles and applications.
A woman takes her glasses off in frustration in front of a laptop
Alerts are an important part of an effective cybersecurity program, but too many of them lead to a “boy who cried wolf” mindset. Use these strategies to prioritize the most important ones and avoid alert fatigue.
A spark as a hand blocks a punch
Threat-informed defense is a proven method for maximizing your organization’s efficacy in preventing cyberattacks. This guide will introduce you to its basic principles.
A woman works at a laptop with floating locks around her
Because of the increasing number of threats, every business needs a comprehensive cybersecurity program. Here are the most important components you need to include.
A woman looks at a laptop and adjusts her glasses
Cybersecurity is a vital and rapidly growing field, but getting a foot in the door can be hard for beginners. Follow these tips to make landing your first role easier.