-
Continue reading →: Lesley on SheNomads Podcast
I had a absolutely fabulous time chatting with fellow Chicagoan @HashtagLaToya (of shenomads.com) about information security careers, OPSEC, the Chicago security community, and the accuracy of the Mr. Robot TV show. I highly recommend checking out her outreach and education work!
-
Continue reading →: Ask Lesley InfoSec Advice Column: 2017-01-30
Thanks for another wonderful week of submissions to my “Ask Lesley” advice form. Today, we’ll discuss digital forensics methodology, security awareness, career paths, and hostile workplaces. Dear Lesley, I’m a recent female college graduate that didn’t study computer science but is working in technical support at a software company.…
-
Continue reading →: Thwart my OSINT Efforts while Binging TV!There’s been a bit of a social media uproar recently about the data collection practices of people search service FamilyTreeNow. However, it’s certainly not the first, only, (or last) service to provide potentially uncomfortable private information about people on the internet without their knowledge or consent. Even the most technologically…
-
Continue reading →: Ask Lesley InfoSec Advice Column: 2017-01-19
Thanks for your interesting question submissions to “Ask Lesley”! This column will repeat, on no specific schedule, when I receive interesting questions that are applicable to multiple people. See further details or submit a question, here. Without further ado, today we have OS debates, management communication issues, nation state actors,…
-
Continue reading →: How do security professionals study threat actors, & why do we do it?I receive a lot of great questions about my work in Digital Forensics and Incident Response (DFIR), and while I’ve written a bit on the topic of threat actors and attribution, I’ve been repeatedly asked some interesting questions about this in specific. In the interest of not answering the same…
-
Continue reading →: Lesley on Cigital’s Silver Bullet Podcast
Listen as Gary and Lesley discuss incident response, digital forensics, security engineering, security certifications, and more. Source: Show 128: Lesley Carhart Discusses Incident Response and Digital Forensics | Cigital
-
Continue reading →: Health and Wellness in InfoSecMost of us know that being a hacker isn’t exactly the lowest stress gig out there. With the holiday season fast approaching, thinking about taking care of our well-being and that of our colleagues, family, and friends becomes even more important than usual. I’d like to have a quick chat…
-
Continue reading →: Using Team Cymru’s MHR with VolatilityToday we’ll briefly discuss crosschecking Team Cymru’s Malware Hash Registry against files found in memory or hibernation files by Volatility. We’re going to do it by hand at the command line, as a quick exercise in some ways to manipulate both tools and think through command line problems. Please note…
-
Continue reading →: 101 Ways I Screwed Up Making a Fake IdentityAs most of you know, my professional area of expertise in security is incident response, with an emphasis on system / malware forensics and OSINT. I’m fortunate enough in my position in the security education and con community to sometimes get pulled into other directions of blue teaming and the…
-
Continue reading →: What’s a Challenge Coin, Anyway? (For Hackers)So what are these “challenge coins”? Challenge coins come from an old military tradition that bled into the professional infosec realm then into the broader hacker community through the continual overlap between the communities. In some ways like an informal medal, coins generally represent somewhere you have been or something…




