-
The $5 Vendor-Free Crash Course: Cyber Threat Intel
Published by
on
Continue reading →: The $5 Vendor-Free Crash Course: Cyber Threat IntelThreat intelligence is currently the trendy thing in information security, and as with many new security trends, frequently misunderstood and misused. I want to take the time to discuss some common misunderstandings about what threat intelligence is and isn’t, where it can be beneficial, and where it’s wasting your (and…
-
Continue reading →: CypherCon ’16 Presentation – “You’re Right, this Sucks”
(In this presentation, penetration tester and “TSA Key Guy” Johnny Christmas and I discuss the problems inherent to the disconnect between the information security community and the public and media at large, and how to bridge the skills and stigmas gap between “us” and “them”.)
-
Continue reading →: Why do Smartphones make great Spy Devices?
There has been extensive, emotional political debate over the use of shadow IT and misuse of mobile phones in sensitive areas by former US Secretaries of State Colin Powell and Hillary Clinton. There is a much needed and very complex discussion we must have about executive security awareness and buy-in,…
-
Continue reading →: Starting an InfoSec Career – The Megamix – Chapter 7
Chapter 7: Landing the Job So, we’ve come this far in your infosec journey. You’ve studied hard, attended conferences, played a CTF or two, updated your resume, and networked a bit within the information security community. Great work! Let’s prepare for your very first information security interview. ===…
-
Continue reading →: The Worst InfoSec Resume, Ever
I do quite a bit of InfoSec résumé reviewing and critiquing, both personally and professionally, so I’m repeatedly asked for tips on common problems. In order to ensure that these problems were not exclusive to me, I recently had a lengthy discussion with a number of InfoSec professionals involved in…
-
Continue reading →: Starting an InfoSec Career – The Megamix – Chapter 6
[You can find the previous chapters in this continuing blog series here: Starting an InfoSec Career – The Megamix – Chapters 1-3 Starting an InfoSec Career – The Megamix – Chapters 4-5] Chapter 6: Self-Study Options In the previous chapters, I’ve discussed potential career paths, education and certification options, and the fundamental…
-
Continue reading →: Hair Dryers, Hacking, and Us
In case you’ve been living under a rock for the past several days, IBM posted, then ultimately removed a video promoting STEM fields for women via “hacking hairdryers”, to a great deal of public outcry from STEM professionals. The unhappiness stemmed not only from perceived sexism, but also tremendously poor…
-
Continue reading →: Starting an InfoSec Career – The Megamix – Chapters 4-5
Chapter 4: Blue Team Careers With the help of many people in InfoSec who kindly gave me advice and quotes, I have created a perhaps overly simplistic listing of common InfoSec roles in today’s market. For each role I have listed a brief summary of what the job does, where…




