Skip to content
  • Home
  • GIAC Test Advice
  • InfoSec Careers & Education
  • SOC & IR
  • DFIR
  • IoT / ICS
  • “Ask Lesley”

tisiphone.net

[Lesley Carhart, Full Spectrum Cyber-Warrior Princess]

Tag: featured

The Biggest “Small” Personal Digital Security Mistakes

I recently read a friend’s post about her family’s catastrophic woes dealing with a hacked Apple ID account. Her story was so troubling that it inspired me to remind folks of some of a few small security things that slip through the cracks in our daily lives that can cause a profound impact on our… Read More The Biggest “Small” Personal Digital Security Mistakes

May 1, 2018May 2, 2018 hacks4pancakes7 Comments

The Infosec of Ready Player One – A Review

A Ready Player One major motion picture directed by Steven Spielberg is scheduled for release in March 2018, resulting in a recent resurgence of popularity of the Ernest Cline cyberpunk novel which serves as its inspiration. So, this seems like as good a time as any for me to briefly revisit the 2011 novel and… Read More The Infosec of Ready Player One – A Review

November 6, 2017May 2, 2018 hacks4pancakes8 Comments

Consolidated Malware Sinkhole List

A common practice of researchers studying a piece of malware is to seize control of its malicious command and control domains, then redirect traffic to them to benign research servers for analysis and victim notification. I always highly recommend monitoring for traffic to these sinkholes – it is frequently indicative of infection. I’ve found no… Read More Consolidated Malware Sinkhole List

May 16, 2017May 2, 2018 hacks4pancakes2 Comments

What’s in my (Hacking Con) bag?

A number of people have asked about what I carry at a typical hacking con. In the blog below, I provide a brief overview. This article isn’t meant to be an endorsement and was in no way sponsored. Use what works for you, but I have included links for things when I can remember where… Read More What’s in my (Hacking Con) bag?

April 28, 2017May 2, 2018 hacks4pancakes4 Comments

Recent Posts

  • PancakesCon 2!
  • Uh oh, Orion.
  • Ask Lesley: “I want to hire more diverse senior people”
  • VetSecCon – All About Securing ICS
  • SC Media: Here’s a five-step security plan for industrial environments
  • About Cybersecurity Management and Expectations
  • So You Want to Learn ICS Security…
  • Presenting Virtually? Here’s How to Do it Right (RSAC Webinar)?
  • PancakesCon 2020: Quarantine Edition
  • Avant Technology Insights Podcast: A Mindshift in IT Security
  • Derbycon 2019 – Confessions of an IT OT Marriage Counselor
  • KringleCon 2019 – Over 90,000: Ups and Downs of my InfoSec Twitter Journey
  • BSidesKC 2019 Keynote – Choose Your Own Cyberpunk Dystopia
  • Bad, Good, and Super-Cringey Infosec Lab Environments
  • Human Honeypots: I Make Friends (and So Should You)
My Tweets

Recent Comments

SolarWinds Active Ex… on Uh oh, Orion.
Week 49 – 2020… on Ask Lesley: “I want to h…
020d on Ask Lesley: “I want to h…
Edwin Gerena on Presenting Virtually? Here…
So You Want to Learn… on Starting an InfoSec Career – T…
Follow tisiphone.net on WordPress.com

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 442 other followers

RSS

RSS Feed

Disclaimer & Legal

All opinions expressed here and on my social media profiles are solely mine and do not reflect those of my employer, Retweets and mentions of products do not constitute endorsement of any position, product, or service.

Tags

careers certification cfp challenge coins conferences congoing consumer security credit cards CTF cyber range dfir digital forensics education equifax featured ff giac hacking hacking tools hacktools health and wellness honey person honeypot ics incident response infographic information security infosec infosec education infosec in film iot labs malware management nation state attacks notpetya off topic osint phishing playbooks podcast privacy ready player one risk security awareness security education security operations self study sinkholes smart apartment smarthome social media talks team dynamics threat attribution threat hunting threat intelligence travel university video volatility women in tech

Blog Information

  • About Lesley
  • Content Credit
  • ‘Ask Lesley’ for Advice
Create a website or blog at WordPress.com
Cancel