Developing an Online Cybersecurity Course

I am so excited to announce that a startup in San Jose has asked me to develop and teach an […]

Speaking at ICMC 2018

I am thrilled to announce that I will be speaking at the International Cryptographic Module Conference in Ottawa.  I along […]

ROBOT Attacks TLS_RSA ciphers

A nearly twenty year old vulnerability in SSL using RSA for encryption has been retooled to exploit current implementations of […]

Recommended TLS Ciphers

Use: TLS v1.1 and 1.2 Avoid: TLSv1.0 or lower or SSLv3 or lower TLS Recommended Ciphers: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 as defined in […]

CYS Report – Latest in Cybersecurity from Around the Web

Do you have 10 minutes? Quickly and easily browse the latest in Cybersecurity News from around the web at CYS […]

Webcast: Women in Cybersecurity: Is This a Good Time?

I was honored to participate in a panel with some other awesome women in cybersecurity.  Take a listen: https://www.brighttalk.com/webcast/14643/245367

ISO 27001 and Common Criteria

How does Common Criteria relate to ISO 27001?  ISO 27001:2013 is a standard that covers a company’s Information Security Management […]