The difference between capturing flags and securing real applications.
A look back at my year in cybersecurity.