An Oeuf With Blockchain, Already
Uncategorized

Blockchain Eggs

I created a short video and slide deck to help illustrate how a blockchain works. This is not about Bitcoin, but is intended to help people who aren’t as experienced with Merkle trees understand that the idea of a blockchain is to be able to independently verify where and when a thing happened without being able to go back and…

Continue Reading

Uncategorized

Where are the women in cybersecurity leadership roles?

This post originally appeared on the OECD Forum’s site. It’s easy to feel like everything has already been said about why we need more women in cybersecurity. I’ve been explaining the economic benefits of hiring women as engineers, bringing in women as senior information security leaders, and going to work for women as board members and national influencers for a…

Continue Reading

Uncategorized

NATO, We Want To Go To War With You

Originally on Foreign Policy, December 22nd, 2020. Wargames can provide essential cybersecurity training for soldiers. But they won’t succeed unless the players confront real, independent hackers. BY TARAH WHEELER, AMY ERTAN | DECEMBER 22, 2020, 7:53 AM In recent years, NATO has begun to incorporate some innovative new cyberwarfare games and exercises into its annual wargames. But there is something missing. If NATO wants to…

Continue Reading

Uncategorized

The Lady of Shalott

I started this project when I was 19. I remember sitting on the lawn at Carroll College in Helena, Montana, and starting that first stitch up in the top left corner in DMC 420. The Lady of Shalott is a Teresa Wentzler pattern that came out in the late 1990s, and I’ve now finally finished it at the age of…

Continue Reading

Uncategorized

PKI — public key infrastructure, explained

(originally posted https://tisiphone.net/2018/03/07/the-infosec-amnesty-qa/ with thanks to Lesley “Hacks4Pancakes” Carhart) Here’s why I know about this My tech journey started in academia, where I spent my time writing math in Java. As I transitioned more and more to tech, I ended up as the de facto PKI manager for several projects. I handled certificate management while I was at Microsoft Game…

Continue Reading

Uncategorized

How much should startups spend on information security

When you have little to no budget, how do you start spending on information security in a startup to protect customer data and operations? I was asked to comment on this via email by Zack Whittaker for a story he was doing on TechCrunch, and in responding, I found myself getting writer-mad, so I knew I had something to say. Here’s his original…

Continue Reading