<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Gertrude Abagale</title>
    <description>The latest articles on DEV Community by Gertrude Abagale (@gertrude_abagale).</description>
    <link>https://dev.to/gertrude_abagale</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F766186%2F2f79311f-c04f-450a-8b75-e9747eab367a.jpg</url>
      <title>DEV Community: Gertrude Abagale</title>
      <link>https://dev.to/gertrude_abagale</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/gertrude_abagale"/>
    <language>en</language>
    <item>
      <title>Finding Your Niche in Tech: A Guide for the Confused but Curious</title>
      <dc:creator>Gertrude Abagale</dc:creator>
      <pubDate>Tue, 08 Jul 2025 10:49:07 +0000</pubDate>
      <link>https://dev.to/gertrude_abagale/finding-your-niche-in-tech-a-guide-for-the-confused-but-curious-4m9e</link>
      <guid>https://dev.to/gertrude_abagale/finding-your-niche-in-tech-a-guide-for-the-confused-but-curious-4m9e</guid>
      <description>&lt;p&gt;Over the years, I’ve met countless individuals eager to transition into tech. They’re motivated, they’re taking courses, and they’re networking. But there’s often one key piece missing: they don’t know what niche in tech they want to go into.&lt;/p&gt;

&lt;p&gt;Recently, I participated in a webinar as a guest speaker, and this topic arose again. A recurring pattern emerged. People are diving into tech without a clear understanding of the diverse opportunities available or what roles suit them. And without that direction, it’s easy to feel overwhelmed, lost, or like an impostor.&lt;/p&gt;

&lt;p&gt;If that sounds like you, I want you to know you’re not alone, and it’s okay not to have it all figured out right away. But the earlier you start exploring where your strengths and interests align, the easier it becomes to carve out your path.&lt;/p&gt;

&lt;p&gt;So, How Do You Find Your Niche in Tech?&lt;br&gt;
When people reach out to me for mentorship and I sense they’re uncertain about their direction, I always ask one simple question:&lt;/p&gt;

&lt;h3&gt;
  
  
  “What do you naturally enjoy doing?”
&lt;/h3&gt;

&lt;p&gt;This is where your journey should begin. Your tech niche should complement your interests and personality. Here’s a framework I recommend:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Identify What You Enjoy Doing&lt;br&gt;
Are you someone who:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Loves reading and writing?&lt;br&gt;
Thrives on solving math or logic problems?&lt;br&gt;
Enjoys designing or building things from scratch?&lt;br&gt;
Gets a thrill from investigating issues or solving mysteries?&lt;br&gt;
Prefers working with people over working with code?&lt;br&gt;
Your answer to these can steer you toward a field that will feel less like work and more like purpose.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Map Interests to Tech Roles&lt;br&gt;
Once you identify your strengths or preferences, try mapping them to tech niches like so:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If You Enjoy… Explore Roles In…&lt;/p&gt;

&lt;p&gt;Writing &amp;amp; Storytelling - Technical Writing, UX Writing, Content Design Math &amp;amp; Problem Solving - Data Science, Cybersecurity, Backend Developer Designing &amp;amp; Creating - UI/UX Design, Frontend Dev, Product Design Investigating &amp;amp; Analyzing - Cybersecurity, QA Testing, SOC Analyst Teaching &amp;amp; People Skills - Developer Advocacy, Customer Engineering&lt;/p&gt;

&lt;p&gt;The list goes on.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Do Targeted Research&lt;br&gt;
Now that you’ve narrowed down a few possible directions, dive deeper:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Watch YouTube videos about a “day in the life” of people in that role.&lt;br&gt;
Join Slack or Discord communities where people in that niche hang out.&lt;br&gt;
Take a short beginner course or tutorial.&lt;br&gt;
Follow professionals on LinkedIn or Medium who share insights in those fields.&lt;br&gt;
Your goal here is to test the waters before committing.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Talk to People in That Niche&lt;br&gt;
Don’t underestimate the power of a 20-minute coffee chat. Reach out to people doing what you’re curious about and ask questions like:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;What do you love about your role?&lt;br&gt;
What skills are most important in your job?&lt;br&gt;
If you could go back and learn one thing earlier, what would it be?&lt;br&gt;
You’ll be surprised how generous the tech community can be with their time and advice.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. Give Yourself Permission to Pivot&lt;/strong&gt;&lt;br&gt;
Your first tech niche doesn’t have to be your final destination. Many people start in one role and evolve into others. The key is to start somewhere aligned with your current interests, build real skills, and allow yourself to grow.&lt;/p&gt;

&lt;h3&gt;
  
  
  Final Thoughts
&lt;/h3&gt;

&lt;p&gt;The tech industry is vast, and that can feel both exciting and intimidating. But clarity comes with exploration and action. Don’t pressure yourself to have all the answers now, just take the next right step based on who you are and what lights you up. Find what feels like “you,” and let that be your compass. If you’re currently trying to find your path in tech, I’d love to hear from you. What interests you? What are you struggling to decide?&lt;/p&gt;

&lt;p&gt;Drop a comment or connect with me.&lt;/p&gt;

</description>
      <category>startingintech</category>
      <category>nicheintech</category>
      <category>technology</category>
      <category>todayisearched</category>
    </item>
    <item>
      <title>The Scariest Threat in Cybersecurity? It Might Be the Person Sitting Next to You</title>
      <dc:creator>Gertrude Abagale</dc:creator>
      <pubDate>Mon, 07 Jul 2025 01:48:29 +0000</pubDate>
      <link>https://dev.to/gertrude_abagale/the-scariest-threat-in-cybersecurity-it-might-be-the-person-sitting-next-to-you-58cj</link>
      <guid>https://dev.to/gertrude_abagale/the-scariest-threat-in-cybersecurity-it-might-be-the-person-sitting-next-to-you-58cj</guid>
      <description>&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;When we think of cyber threats, we often picture shadowy individuals in hoodies, typing away in dark basements. In essence, external hackers targeting your systems from miles away. But what if the real danger was much closer? What if it were someone with a badge, an email address, and access to your most critical systems?&lt;/p&gt;

&lt;p&gt;Welcome to the world of insider threats, one of the most underestimated yet devastating types of cybersecurity risk, in my opinion.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Is an Insider Threat?
&lt;/h2&gt;

&lt;p&gt;Insider threat is a security threat that originates from within the targeted organization. This can be a current or former employee, contractor, vendor, or anyone who has (or had) authorized access to sensitive information, systems, data, or networks and chooses to misuse that access.&lt;/p&gt;

&lt;h2&gt;
  
  
  These threats fall into two categories:
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Intentional insiders&lt;/strong&gt;: Individuals who intentionally harm the organization out of revenge, financial gain, or allegiance to a competitor.&lt;br&gt;
&lt;strong&gt;Unintentional insiders&lt;/strong&gt;: Well-meaning employees who accidentally expose data or create vulnerabilities, often through phishing, weak passwords, or misconfigurations.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Insider Threats Are So Dangerous?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Insider threats are especially scary because:
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Access is already granted&lt;/strong&gt;: Unlike external hackers, insiders don’t need to break through firewalls; they’re already inside.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Harder to detect&lt;/strong&gt;: Their actions can blend in with regular activity, making it difficult for traditional security tools to catch them.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Damage can be catastrophic&lt;/strong&gt;: From leaking trade secrets to sabotaging systems, the fallout of an insider attack can be long-lasting and extremely costly.&lt;br&gt;
Real-World Examples&lt;/p&gt;

&lt;h3&gt;
  
  
  Let’s look at a few incidents that prove how dangerous insider threats can be:
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Edward Snowden (NSA)&lt;/strong&gt;: Arguably the most famous insider threat case. Snowden, a former contractor, leaked classified information about government surveillance programs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tesla Sabotage (2018)&lt;/strong&gt;: A disgruntled employee modified code in Tesla’s manufacturing system and exported sensitive data to outsiders.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Capital One Breach (2019)&lt;/strong&gt;: A former employee of Amazon Web Services exploited misconfigured servers, exposing the personal data of over 100 million customers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Common Ways Insider Threats Manifest
&lt;/h2&gt;

&lt;p&gt;Downloading or emailing sensitive files to personal accounts&lt;br&gt;
Abusing access privileges after being terminated (or right before leaving)&lt;/p&gt;

&lt;p&gt;Falling for phishing attacks and giving away login credentials&lt;br&gt;
Misconfiguring systems that expose company data to the public&lt;br&gt;
How to Reduce Insider Threat Risk&lt;br&gt;
Unfortunately, Insider Threat is difficult to eliminate, but you can &lt;/p&gt;

&lt;h3&gt;
  
  
  significantly reduce its likelihood and impact:
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Implement the Principle of Least Privilege&lt;/strong&gt;: Employees should only have access to what they need. No more, no less.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Monitor User Behaviour&lt;/strong&gt;: Use tools like User and Entity Behaviour Analytics (UEBA) to detect unusual patterns such as massive downloads, off-hour activity, or unauthorized data access.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conduct Regular Training&lt;/strong&gt;: Phishing simulations and cybersecurity awareness programs help employees recognize threats and understand the weight of their responsibilities.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Create a Strong Offboarding Process&lt;/strong&gt;: Disable access immediately when someone leaves the company. Delays can lead to misuse.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Foster a Healthy Work Culture&lt;/strong&gt;: Disgruntled employees are more likely to become threats. Promoting transparency and respect can help reduce the motivation for revenge or sabotage.&lt;/p&gt;

&lt;h2&gt;
  
  
  Final Thoughts
&lt;/h2&gt;

&lt;p&gt;Insider threats aren’t just a technical issue; they’re a human one. They remind us that security isn’t only about firewalls and encryption; it’s also about trust, accountability, and vigilance.&lt;/p&gt;

&lt;p&gt;The scariest threat might not be some anonymous hacker overseas. It could be someone in your Slack channel, your Zoom call, or your office.&lt;/p&gt;

&lt;p&gt;Stay alert. Stay informed. And never underestimate the risk from within.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>insiderthreat</category>
      <category>cybercrime</category>
    </item>
  </channel>
</rss>
