A look back at my year in cybersecurity.
The difference between capturing flags and securing real applications.