-
Continue reading →: Ask Lesley InfoSec Advice Column: 2017-03-16
This week, I address some burning questions about education and training. As always, submit your problems here! Dear Lesley, Let’s cut to the chase. I hate coding. I don’t enjoy building things from scratch. I do, however, love taking things apart, and would probably be able to learn to…
-
Continue reading →: Phishing Exercises, without the “Ish”Much like open offices and outsourcing in business, information security is subject to trends. One you probably saw in your vendor spam folder over the past couple of years is phishing awareness exercises. The premise sounds simple – phish your employees before the bad guys do, monitor how they respond,…
-
Continue reading →: Ask Lesley InfoSec Advice Column: 2017-02-26
This week, we discuss red team and blue team self-study, getting kids interested in security, and security paranoia. As always, submit your problems here! Dear Lesley, I am a threat intelligence analyst who is currently underutilized in my current job, and feel like my skills and tradecraft are slipping because…
-
Continue reading →: Is Digital Privacy a Privilege Of The Wealthy?Through a series of eight scenarios, I’ve invited seven security and digital privacy professionals to weigh in on the fundamental question of how much of a privilege digital privacy, and the abilities to “restrict” or “remove” our digital footprint, really are.
-
Continue reading →: Lesley on SheNomads Podcast
I had a absolutely fabulous time chatting with fellow Chicagoan @HashtagLaToya (of shenomads.com) about information security careers, OPSEC, the Chicago security community, and the accuracy of the Mr. Robot TV show. I highly recommend checking out her outreach and education work!
-
Continue reading →: Ask Lesley InfoSec Advice Column: 2017-01-30
Thanks for another wonderful week of submissions to my “Ask Lesley” advice form. Today, we’ll discuss digital forensics methodology, security awareness, career paths, and hostile workplaces. Dear Lesley, I’m a recent female college graduate that didn’t study computer science but is working in technical support at a software company.…
-
Continue reading →: Thwart my OSINT Efforts while Binging TV!There’s been a bit of a social media uproar recently about the data collection practices of people search service FamilyTreeNow. However, it’s certainly not the first, only, (or last) service to provide potentially uncomfortable private information about people on the internet without their knowledge or consent. Even the most technologically…
-
Continue reading →: Ask Lesley InfoSec Advice Column: 2017-01-19
Thanks for your interesting question submissions to “Ask Lesley”! This column will repeat, on no specific schedule, when I receive interesting questions that are applicable to multiple people. See further details or submit a question, here. Without further ado, today we have OS debates, management communication issues, nation state actors,…
-
Continue reading →: How do security professionals study threat actors, & why do we do it?I receive a lot of great questions about my work in Digital Forensics and Incident Response (DFIR), and while I’ve written a bit on the topic of threat actors and attribution, I’ve been repeatedly asked some interesting questions about this in specific. In the interest of not answering the same…
-
Continue reading →: Lesley on Cigital’s Silver Bullet Podcast
Listen as Gary and Lesley discuss incident response, digital forensics, security engineering, security certifications, and more. Source: Show 128: Lesley Carhart Discusses Incident Response and Digital Forensics | Cigital






