Skip to content
I Help Women In Tech Earn More Money

I Help Women In Tech Earn More Money

  • Home
  • Secure The InfoSec Bag
  • About Keirsten
  • Why I Do This
  • FAQS
  • Resources

Author: Keirsten Brager

Most Important in Digital Forensics: Preparation or Preservation?

I believe the preparation phase of a digital search is the most important because it determines whether evidence will meet…

Continue Reading →

Posted in: Digital Forensics Filed under: digital forensics, Federal Rules of Evidence, legal issues in cyber

Digital Forensics: Can You Find Hidden Data?

Digital forensics are. Here are some ways that data can be hidden within storage media : Example 1: Deleted Files…

Continue Reading →

Posted in: Digital Forensics Filed under: cyber security, digital forensics, file integrity monitoring, Tripwire

2016 ICS Security Incidents

1 Comment

Back in October, we were asked to analyze significant events that impacted critical infrastructure in 2016. I reviewed publicly available…

Continue Reading →

Posted in: Critical Infrastructure Attacks Filed under: critical infrastructure, DDoS, ICS, remote access, security solutions

Ace Your Papers & Advance Your Career

My most recent Tripwire State of Security Blog post is about communication skills for academic excellence and how it translates…

Continue Reading →

Posted in: Career Tips, Research Papers Filed under: career advancement, communication skills, Cyber careers

Power Utility Attack Lessons Learned

One of my first graduate research papers was about cyber attacks against critical infrastructure. After that, I became passionate about…

Continue Reading →

Posted in: Critical Infrastructure Attacks Filed under: Cyber careers, ICS, power utilities, risk mitigation, SCADA, security solutions

Basic and Double Encapsulation VLAN Hopping

4 Comments

Our weekly course module introduced us to layer 2 attacks, specifically MAC & ARP attacks. I added to the discussion…

Continue Reading →

Posted in: VLAN Security Filed under: Cisco, risk mitigation, router security, VLAN hopping, VLAN security

Security Design Case Study

1 Comment

A recent case study required students to provide recommendations for addressing security in the overall technical design of a fictitious company…

Continue Reading →

Posted in: Security Case Studies

Pass the new CISSP Exam

2 Comments

Are you planning to take the CISSP exam? If you are considering taking the leap, please understand that this is…

Continue Reading →

Posted in: CISSP Filed under: CISSP

Post navigation

Page 8 of 8
← Previous 1 … 7 8

Let’s Connect!

  • LinkedIn
  • Twitter

Reader Favorites

  • #WeCyberToo: Quiessence Phillips, VP-Cybersecurity Ops
  • Secure The InfoSec Bag: Six Figure Career Guide For Women
  • How To Keep Your Accomplishments In Front Of Your Boss
  • How Credentials Impacted My Career
  • Salary Negotiation Tips from White Men in Tech: Part 1
  • Pass the new CISSP Exam
  • Security+ Exam Prep Tips
  • #FinanceFridays Recap: Life Insurance
  • Salary Negotiation Tips from White Men in Tech: Part 2

Categories

Recent Posts

  • Promote Yourself. But Also, How Does Wealth Work?
  • ASK FOR THE DAM BONUS! + Last Chance for Stocks101
  • Stop Underestimating Your Value
  • Sip & Stocks101: Feb 14
  • Stocks101 Resources
  • #FinanceFridays Recap: Life Insurance
  • Closing Keynote Speaker at Diana Initiative Virtual Conference!
  • Cyberjutsu Con Speaker!
  • How I Passed My GICSP Exam
  • Women’s Society of Cyberjutsu Career Webinar Oct. 17th
  • HouSecCon2019 ICS Track Speaker
  • Salary Negotiation Tips from White Men in Tech: Part 2
  • Salary Negotiation Tips from White Men in Tech: Part 1
  • Tripwire Resources for Aspiring Engineers
  • Tribe of Hackers out January 28th!
  • Walker’s Legacy Power15 Houston Honoree
  • University of Houston Energy Sector Cyber Career Event
  • How To Keep Your Accomplishments In Front Of Your Boss
  • Keynote Speaker at Diana Initiative!
  • Digital Security Check-up
  • Listen While You Work
  • Did You Earn Certs & Expect a $20,000 Raise?
  • Support Other Women + Save The Date!
  • Secure The InfoSec Bag: Six Figure Career Guide For Women
  • Dark Reading Women Changing The Game
  • Women in Security Panel at HouSecCon
  • Tripwire Post: Security Research Ideas to Improve Post-Graduation Outcomes
  • It’s Ok To Be Extra
  • Go to Grad School or Get a Job?
  • How Credentials Impacted My Career
  • How She Passed Her First PCI Audit
  • Should Researchers Hack Back? My answer: NO
  • Talent Shortage Sanity Check
  • #WeCyberToo: Sakinah Tanzil, Sr. Security Pro
  • How To Write a Business Continuity Paper
  • How To Write An Abstract
  • Medical Records Breach: Part 2
  • Medical Records Breach: Part 1
  • #WeCyberToo: Nicole Fagin, Sr. InfoSec Pro
  • #WeCyberToo: Dr. Stephanie Carter, CEO
  • Forensics Sources Part 4: Logs
  • HOU.SEC.CON 7.0 Review
  • Forensics Sources Part 3: File Systems
  • #WeCyberToo: Quiessence Phillips, VP-Cybersecurity Ops
  • Forensics Sources Part 2: Memory
  • #WeCyberToo: Cassandra Giddings, Security Engineer
  • #WeCyberToo: Tiffany L. Smith, Security Analyst, Fortune 100 Company
  • Forensics Sources Part 1: Packet Capture (PCAP)
  • Malware: How it hides, detects, and reacts
  • CASP Exam Prep. Fail. Give Back.
  • Jopwell: A Career Platform For Us, By Us
  • Security+ Exam Prep Tips
  • #WeCyberToo: Zilphia Martin, Cyber Defense Threat Analyst
  • #WeCyberToo: Krista Theodore, Security Engineer
  • Ladies: GET OUT!
  • Security is NOT Just Hacking!
  • A 3-Pronged Approach To Insider Threats
  • How To Communicate With Non-Technical Audiences
  • #WeCyberToo: Glenise Moore, Sr. Associate Schellman & Company
  • Review: Teaching Cyber at the Collegiate Level
  • 80+ Back Doors Into Cyber Careers
  • #WeCyberToo: Danyetta Magana, CEO of Covenent Security
  • SQL vs. XXS Injection Attacks Explained
  • Snort Rules for ACK Scans, Oh My!
  • ARP Attack Detection Limitations
  • IP Fragmentation vs IP Reassembly
  • How to Marry IT and OT Security
  • The Worst Cyber Crime Today
  • Cybercrime Law Review: Computer Fraud & Abuse Act
  • Samsung’s $1 Billion Mistake: 2 Week Data Retention Policy
  • Most Important in Digital Forensics: Preparation or Preservation?
  • Digital Forensics: Can You Find Hidden Data?
  • 2016 ICS Security Incidents
  • Ace Your Papers & Advance Your Career
  • Power Utility Attack Lessons Learned
  • Basic and Double Encapsulation VLAN Hopping
  • Security Design Case Study
  • Pass the new CISSP Exam
Copyright © 2020 @keirstenbrager

Enjoy this blog? Please spread the love :)

  • TWITTER
  • FACEBOOK
    fb-share-icon
  • LINKEDIN
  • RSS
  • EMAIL