Skip to content
I Help Women In Tech Earn More Money

I Help Women In Tech Earn More Money

  • Home
  • Secure The InfoSec Bag
  • About Keirsten
  • Why I Do This
  • FAQS
  • Resources

80+ Back Doors Into Cyber Careers

The million dollar question people always ask: how do I get a job in cyber? Unfortunately, the industry is not…

Continue Reading →

Posted in: Career Tips, JOB ALERT! Filed under: career tips, Cyber careers, JOB ALERT

#WeCyberToo: Danyetta Magana, CEO of Covenent Security

Editor’s note: Women of color were noticeably absent from most of the top women in cyber and top security bloggers lists…

Continue Reading →

Posted in: Career Tips, CISSP, Talent Spotlight Filed under: CISSP, Covenent Security Solutions, Danyetta Magana, Talent Spotlight

SQL vs. XXS Injection Attacks Explained

The main difference between a SQL and XSS injection attack is that SQL injection attacks are used to steal information…

Continue Reading →

Posted in: Web Attacks Filed under: cross site scripting, OWASP, SQL injection, XXS attacks

Snort Rules for ACK Scans, Oh My!

We were required to describe at least 2 rules that could be used by Snort to detect an ACK scan,…

Continue Reading →

Posted in: IDS/IPS Filed under: ACK Scans, Bro, IDS, IP, Snort, TCP

ARP Attack Detection Limitations

We were asked to describe or propose a way to detect ARP spoofing attack and consider possible weaknesses in the…

Continue Reading →

Posted in: VLAN Security Filed under: ARP poisoning, denial of service, IDS, MAC tables, session hijacking

IP Fragmentation vs IP Reassembly

Unlike IP fragmentation (which can be done by intermediate devices), IP reassembly can be done only at the final destination.…

Continue Reading →

Posted in: VLAN Security Filed under: datagrams, IP fragmentation, IP Reassembly

How to Marry IT and OT Security

The newly increased focus on cyber security will provide opportunities to make a positive impact, but security professionals should take…

Continue Reading →

Posted in: Career Tips, Critical Infrastructure Attacks Filed under: critical infrastructure, ICS, OT security, SCADA

The Worst Cyber Crime Today

The most damaging corporate computer crime today is hacking large companies that manage our nation’s critical infrastructure, such as electricity…

Continue Reading →

Posted in: Critical Infrastructure Attacks, Cybercrime Filed under: critical infrastructure, encryption, file obfuscation, forensics, HMI attacks, ICS, ransomware, SCADA

Cybercrime Law Review: Computer Fraud & Abuse Act

The most important cyber crime law available to law enforcement is the Computer Fraud and Abuse Act of 1986, commonly…

Continue Reading →

Posted in: Cybercrime Filed under: CFAA, Computer Fraud and Abuse Act, cybercrime, forensics, laws, TOR

Samsung’s $1 Billion Mistake: 2 Week Data Retention Policy

The American Bar Association requires all prosecutors to make a clear and complete record for review during trial. As with…

Continue Reading →

Posted in: Security Policies Filed under: admissibility, Apple, cyber policies, data retention, first responders, liabilities, Samsung

Post navigation

Page 7 of 8
← Previous 1 … 6 7 8 Next →

Let’s Connect!

  • LinkedIn
  • Twitter

Reader Favorites

  • #WeCyberToo: Quiessence Phillips, VP-Cybersecurity Ops
  • Secure The InfoSec Bag: Six Figure Career Guide For Women
  • How To Keep Your Accomplishments In Front Of Your Boss
  • How Credentials Impacted My Career
  • Salary Negotiation Tips from White Men in Tech: Part 1
  • Pass the new CISSP Exam
  • Security+ Exam Prep Tips
  • #FinanceFridays Recap: Life Insurance
  • Salary Negotiation Tips from White Men in Tech: Part 2

Categories

Recent Posts

  • Promote Yourself. But Also, How Does Wealth Work?
  • ASK FOR THE DAM BONUS! + Last Chance for Stocks101
  • Stop Underestimating Your Value
  • Sip & Stocks101: Feb 14
  • Stocks101 Resources
  • #FinanceFridays Recap: Life Insurance
  • Closing Keynote Speaker at Diana Initiative Virtual Conference!
  • Cyberjutsu Con Speaker!
  • How I Passed My GICSP Exam
  • Women’s Society of Cyberjutsu Career Webinar Oct. 17th
  • HouSecCon2019 ICS Track Speaker
  • Salary Negotiation Tips from White Men in Tech: Part 2
  • Salary Negotiation Tips from White Men in Tech: Part 1
  • Tripwire Resources for Aspiring Engineers
  • Tribe of Hackers out January 28th!
  • Walker’s Legacy Power15 Houston Honoree
  • University of Houston Energy Sector Cyber Career Event
  • How To Keep Your Accomplishments In Front Of Your Boss
  • Keynote Speaker at Diana Initiative!
  • Digital Security Check-up
  • Listen While You Work
  • Did You Earn Certs & Expect a $20,000 Raise?
  • Support Other Women + Save The Date!
  • Secure The InfoSec Bag: Six Figure Career Guide For Women
  • Dark Reading Women Changing The Game
  • Women in Security Panel at HouSecCon
  • Tripwire Post: Security Research Ideas to Improve Post-Graduation Outcomes
  • It’s Ok To Be Extra
  • Go to Grad School or Get a Job?
  • How Credentials Impacted My Career
  • How She Passed Her First PCI Audit
  • Should Researchers Hack Back? My answer: NO
  • Talent Shortage Sanity Check
  • #WeCyberToo: Sakinah Tanzil, Sr. Security Pro
  • How To Write a Business Continuity Paper
  • How To Write An Abstract
  • Medical Records Breach: Part 2
  • Medical Records Breach: Part 1
  • #WeCyberToo: Nicole Fagin, Sr. InfoSec Pro
  • #WeCyberToo: Dr. Stephanie Carter, CEO
  • Forensics Sources Part 4: Logs
  • HOU.SEC.CON 7.0 Review
  • Forensics Sources Part 3: File Systems
  • #WeCyberToo: Quiessence Phillips, VP-Cybersecurity Ops
  • Forensics Sources Part 2: Memory
  • #WeCyberToo: Cassandra Giddings, Security Engineer
  • #WeCyberToo: Tiffany L. Smith, Security Analyst, Fortune 100 Company
  • Forensics Sources Part 1: Packet Capture (PCAP)
  • Malware: How it hides, detects, and reacts
  • CASP Exam Prep. Fail. Give Back.
  • Jopwell: A Career Platform For Us, By Us
  • Security+ Exam Prep Tips
  • #WeCyberToo: Zilphia Martin, Cyber Defense Threat Analyst
  • #WeCyberToo: Krista Theodore, Security Engineer
  • Ladies: GET OUT!
  • Security is NOT Just Hacking!
  • A 3-Pronged Approach To Insider Threats
  • How To Communicate With Non-Technical Audiences
  • #WeCyberToo: Glenise Moore, Sr. Associate Schellman & Company
  • Review: Teaching Cyber at the Collegiate Level
  • 80+ Back Doors Into Cyber Careers
  • #WeCyberToo: Danyetta Magana, CEO of Covenent Security
  • SQL vs. XXS Injection Attacks Explained
  • Snort Rules for ACK Scans, Oh My!
  • ARP Attack Detection Limitations
  • IP Fragmentation vs IP Reassembly
  • How to Marry IT and OT Security
  • The Worst Cyber Crime Today
  • Cybercrime Law Review: Computer Fraud & Abuse Act
  • Samsung’s $1 Billion Mistake: 2 Week Data Retention Policy
  • Most Important in Digital Forensics: Preparation or Preservation?
  • Digital Forensics: Can You Find Hidden Data?
  • 2016 ICS Security Incidents
  • Ace Your Papers & Advance Your Career
  • Power Utility Attack Lessons Learned
  • Basic and Double Encapsulation VLAN Hopping
  • Security Design Case Study
  • Pass the new CISSP Exam
Copyright © 2020 @keirstenbrager