I created a short video and slide deck to help illustrate how a blockchain works. This is not about Bitcoin, but is intended to help people who aren’t as experienced with Merkle trees understand that the idea of a blockchain is to be able to independently verify where and when a thing happened without being able to go back and…
Category: Uncategorized
Where are the women in cybersecurity leadership roles?
This post originally appeared on the OECD Forum’s site. It’s easy to feel like everything has already been said about why we need more women in cybersecurity. I’ve been explaining the economic benefits of hiring women as engineers, bringing in women as senior information security leaders, and going to work for women as board members and national influencers for a…
NATO, We Want To Go To War With You
Originally on Foreign Policy, December 22nd, 2020. Wargames can provide essential cybersecurity training for soldiers. But they won’t succeed unless the players confront real, independent hackers. BY TARAH WHEELER, AMY ERTAN | DECEMBER 22, 2020, 7:53 AM In recent years, NATO has begun to incorporate some innovative new cyberwarfare games and exercises into its annual wargames. But there is something missing. If NATO wants to…
The Lady of Shalott
I started this project when I was 19. I remember sitting on the lawn at Carroll College in Helena, Montana, and starting that first stitch up in the top left corner in DMC 420. The Lady of Shalott is a Teresa Wentzler pattern that came out in the late 1990s, and I’ve now finally finished it at the age of…
PKI — public key infrastructure, explained
(originally posted https://tisiphone.net/2018/03/07/the-infosec-amnesty-qa/ with thanks to Lesley “Hacks4Pancakes” Carhart) Here’s why I know about this My tech journey started in academia, where I spent my time writing math in Java. As I transitioned more and more to tech, I ended up as the de facto PKI manager for several projects. I handled certificate management while I was at Microsoft Game…
How much should startups spend on information security
When you have little to no budget, how do you start spending on information security in a startup to protect customer data and operations? I was asked to comment on this via email by Zack Whittaker for a story he was doing on TechCrunch, and in responding, I found myself getting writer-mad, so I knew I had something to say. Here’s his original…
Yes, there was a hidden epic cryptographic puzzle story inside my book, “Women In Tech.”
And the champions just received their solid silver medals for solving the series. EDIT: the writeup in Techdirt by Mike Masnick was lovely. Five Years Later, Team Solves Puzzles In Women In Tech Book I wrote a book called Women In Tech that came out in 2016 which has become one of the top books on Amazon in their Career…
Your private ssh keys do not copy over with a sudo dolphin! You must use bash in Kubuntu.
I’m glad I keep good backups. When backing up your Kubuntu box, do not just drag and drop one home folder from a hard disk to another hard disk. Your ssh keys will not be copied over, even though you may have opened the Dolphin file manager over with the command sudo dolphin To ensure you have admin privileges over…
An update to the bash script that takes a parameter:
#!/bin/bash book=$1 [[ -z $book ]] && { echo “No argument supplied, exiting!”; exit 1; } [[ ! -e $book ]] && { echo “Can’t find a file with the name $book, exiting”; exit 1; } title=${book%.*} bookcounter=0 linecounter=0 sed -i ‘s/\r$//’ “$book” while read line do ((linecounter+=1)) if [[ $linecounter -gt 300 && -z “$line” || -z “$output_file” ]];…