About Cybersecurity Management and Expectations

For the past decade, I have listened to a number of stories from a minority of cybersecurity professionals I talk to about unbelievably hostile and abusive workplaces. More insidious to me, are the workplaces that “pass” as okay on paper, but are continually undermining, failing, and gaslighting their junior employees. Unfortunately, it’s often harder for junior people to judge that they are not being treated fairly than in cases of extreme abuse.… Read More About Cybersecurity Management and Expectations

Ask Lesley InfoSec Advice Column: 2017-02-26

This week, we discuss red team and blue team self-study, getting kids interested in security, and security paranoia. As always, submit your problems here! Dear Lesley, I am a threat intelligence analyst who is currently underutilized in my current job, and feel like my skills and tradecraft are slipping because of it. I’m wanting to… Read More Ask Lesley InfoSec Advice Column: 2017-02-26

Ask Lesley InfoSec Advice Column: 2017-01-30

Thanks for another wonderful week of submissions to my “Ask Lesley” advice form. Today, we’ll discuss digital forensics methodology, security awareness, career paths, and hostile workplaces.   Dear Lesley, I’m a recent female college graduate that didn’t study computer science but is working in technical support at a software company. The more I learn about… Read More Ask Lesley InfoSec Advice Column: 2017-01-30

Ask Lesley InfoSec Advice Column: 2017-01-19

Thanks for your interesting question submissions to “Ask Lesley”! This column will repeat, on no specific schedule, when I receive interesting questions that are applicable to multiple people. See further details or submit a question, here. Without further ado, today we have OS debates, management communication issues, nation state actors, and career questions galore! Dear… Read More Ask Lesley InfoSec Advice Column: 2017-01-19