An Intro to Bug Bounty Programs

Bug bounty programs allow independent security researchers to report bugs to an organization and receive rewards or compensation. These bugs are usually security exploits and vulnerabilities, though they can also include process issues, hardware flaws, and so on. The reports are typically made through a program run by an independent…

Why Soft Skills Are Key to Success in Tech

Often in technology, we assume that everyone else is as excited about our product as we are. This tends to be a problem across the board in the tech sector (and even amongst teams, like security and developers, or operations and developers). There's a reason that DevOps and DevSecOps were…

10 Ways to Improve Your Cover Letter

Cover letters, like résumés, are hard. And most people are bad at them. This makes sense – you probably only write a cover letter or résumé every few years. It involves selling yourself and your skills, which is something most people struggle with. On top of this, it's difficult to sort…

How to Write a Résumé Hiring Managers Will Actually Read

Résumés are hard. And most people are bad at them — which makes sense, because you probably only write or update your résumé every few years. It involves selling yourself and your skills — something most people struggle with. On top of this, it’s difficult to figure out how to sort…

How Does Email Work?

First, you use a mail user agent, or MUA to read and send email from your device (such as gmail, or the mail app on Apple devices). These programs are only active when you're using them. Generally, they communicate with a mail transfer agent, or MTA (also known as a…

Encryption Algorithms

Cryptography, at its most basic, is the science of using codes and ciphers to protect messages. Encryption is encoding messages with the intent of only allowing the intended recipient to understand the meaning of the message. It is a two way function (you need to be able to undo whatever…