Carissa

Qualys Automation Pipeline

Menu Home About Blog Hobbies Portfolio Labs Contact Privacy Policy Qualys Vulnerability Pipeline — Carissa Durko Vulnerability Management Qualys VM PrioritizationPipeline A Python pipeline that parses Qualys VM CSV exports, deduplicates findings across CVE-level rows, applies risk-based priority scoring using CVSSv3 and Qualys RTI signals, and outputs a ranked remediation queue mapped to SLA targets. […]

Qualys Automation Pipeline Read More »

Tenable Automation Pipeline

Menu Home About Blog Hobbies Portfolio Labs Contact Privacy Policy Nessus Vulnerability Pipeline – Carissa Durko Vulnerability Management Nessus VulnerabilityPrioritization Pipeline A Python pipeline that ingests Nessus HTML scan reports, deduplicates findings across credentialed and uncredentialed scans, applies risk-based priority scoring, and outputs a ranked remediation queue mapped to SLA targets. Built against real scan

Tenable Automation Pipeline Read More »

Cyberpsychology

Menu Home About Blog Hobbies Portfolio Contact Privacy Policy Cybersecurity is often framed as a purely technical challenge. One where stronger encryption, better tools, or smarter code will keep us safe. But in reality, technology is only part of the story. The human element plays a critical role in both risk and defense, and that’s

Cyberpsychology Read More »

What I’m Doing to Study for CISSP & Why I’m Getting It

Menu Home About Blog Hobbies Portfolio Contact Privacy Policy The decision to pursue the CISSP (Certified Information Systems Security Professional) wasn’t something I made lightly. For me, the CISSP represents more than just a certification. It is a way to deepen my knowledge, validate my experience, and open doors to future leadership roles in cybersecurity.

What I’m Doing to Study for CISSP & Why I’m Getting It Read More »

Todyl VPN Solution

Menu Home About Blog Hobbies Portfolio Contact Privacy Policy Todyl VPN Solution Todyl deployments were my very first projects when I first entered the security industry. This solution was good for what it did, which was protect traffic and allow for tunneling in. Since the deployment would take a long time to roll out manually,

Todyl VPN Solution Read More »

Microsoft Access Packages

Menu Home About Blog Hobbies Portfolio Contact Privacy Policy Microsoft Access Packages: Microsoft Access Packages, also known as Access Control Packages (ACP), can be a powerful tool to enhance conditional access policies within an organization’s Microsoft 365 environment. Some companies block out of country access. However, sometimes exceptions are made but they may be a

Microsoft Access Packages Read More »

Keeper Security

Menu Home About Blog Hobbies Portfolio Contact Privacy Policy Keeper Security  This project was my first big one and dealt with heavy security engineering! Before this deployment, I had only worked on smaller projects that would extend to a select few versus a large scale rollout.  Project Overview: The project aimed to enhance the organization’s

Keeper Security Read More »

Cybersecurity Awareness Month: Protecting Yourself in the Digital Age

Menu Home About Blog Hobbies Portfolio Contact Privacy Policy 🌐 Cybersecurity Awareness Month: Protecting Yourself in the Digital Age In this age of unprecedented connectivity and digital transformation, ensuring our online security has never been more important. Cybersecurity isn’t just a work-related concern; it’s a life skill that safeguards our personal and professional worlds. As

Cybersecurity Awareness Month: Protecting Yourself in the Digital Age Read More »

Scroll to Top