Johns Hopkins and Cryptographic Knowledge Base

I was able to present at the Triangle InfoSeCon on the Johns Hopkins University Cryptographic Knowledge Base that I am […]

Securing a WordPress Blog or Website

So you want to start a blog or website?  If you want to add google adsense ads or any other […]

CISSP Test Taking Tips

Getting your CISSP Certification I have two ISC2 certifications, the Certified Information Systems Security Professional (CISSP) and most recently the […]

Speaking at Triangle InfoSeCon

Not to be missed!  I am speaking at the Triangle InfoSeCon in October.  I will be presenting on the Johns […]

CYS Report – Latest in Cybersecurity from Around the Web

Do you have 10 minutes? Quickly and easily browse the latest in Cybersecurity News from around the web at CYS […]

Webcast: Women in Cybersecurity: Is This a Good Time?

I was honored to participate in a panel with some other awesome women in cybersecurity.  Take a listen: https://www.brighttalk.com/webcast/14643/245367

Working on a Crypto Best Practices Knowledge Base with JHU

We are working on the knowledge base now so stay tuned! Update:  I just found out that Cisco has fully […]

Recommended TLS Ciphers

Use: TLS v1.1 and 1.2 Avoid: TLSv1.0 or lower or SSLv3 or lower TLS Recommended Ciphers: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 as defined in […]

ISO 27001 and Common Criteria

How does Common Criteria relate to ISO 27001?  ISO 27001:2013 is a standard that covers a company’s Information Security Management […]

SSH Algorithms to Use

For SSHv2 key exchange: Recommended: diffie-hellmann-group14-sha1 (2048 bit) for SSH key exchange Allowed:  ecdh-sha2-nistp256, ecdh-sha2-nistp384, and ecdh-sha2-nistp521 Avoid: diffie-hellman-group1-sha1 (768 bit),diffie-hellman-group2-sha1 […]