Wednesday, August 17, 2022
  • Security Automation Crash Course: Which Workflows Should I Automate?
  • Close the DevSecOps divide with Ted Lassos
  • Techstrong TV: Addressing Cybersecurity Tool Sprawl
  • Facing the Shift-Left Security Conundrum. A True Story
  • Aspen Security Forum 2022 – Anja Manuel – Aspen Security Forum Closing Remarks

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Events
    • Upcoming Events
    • Upcoming Webinars
    • On-Demand Events
    • On-Demand Webinars
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • Techstrong Group
    • Container Journal
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
    • Digital Anarchist
  • Media Kit
  • About Us

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Security Bloggers Network 

Home » Security Bloggers Network » Women in Information Security: Anna Westelius

SBN

Women in Information Security: Anna Westelius

by Tripwire Guest Authors on May 28, 2018

Last time, I had the honor of speaking with Veronica of DFIRLABS. She’s a self-described cyborg who got into cybersecurity early and has a passion for reverse engineering code.

AppSec/API Security 2022

This time, I got to speak with Anna Westelius. Not only is she a web security specialist; she also has experience with Linux driver development. What do Anna and I have in common with Girl with the Dragon Tattoo protagonist Lisbeth Salander?

Kim Crawley: Hi, Anna! Please tell me a bit about what you do and how you got there.

Anna Westelius: Currently, I’m senior director of security research over at a web security company in San Francisco called Distil Networks. We focus on combating the automated threat, and my role is to help improve our services and products through threat research, a lot of testing and security analysis. I’ve been running organizations, mainly focusing on security analysis, for the better part of the last 10 years in various roles.

I’d like to say that I started my tech career in the crib. I’ve been picking apart mechanical things for as long as I can remember, then building home networks and computers as a kid. I then had the luxury of stumbling into a computer club in the high school basement where the home built Linux distribution forced all involved to write their own drivers for any hardware we wanted to use. I eventually ended up getting a job writing ActionScript for direct marketing companies before starting my own company with two illustrators doing web development and security consultancy. Running my own company was a fantastic experience, but in some strange longing for a “real job,” I switched up and started doing Network Security Analysis for an MSSP in Stockholm and eventually went on to run their Security Operations and (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Tripwire Guest Authors. Read the original post at: https://www.tripwire.com/state-of-security/off-topic/women-information-security-anna-westelius/

May 28, 2018May 29, 2018 Tripwire Guest Authors Off Topic, Women in security
  • ← Arlington National Cemetary, Taps
  • Incompetent Intelligence: The Case of Black Cube →

TechStrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Subscribe to our Newsletters

Most Read on the Boulevard

Gmail Lets Candidates Spam You — FEC FAIL
The Power of Provenance: From Reactive to Proactive Cybersecurity
Lacework Adds Time Series Modeling to Cybersecurity Platform
Incident Response Teams Fight Back With Virtual Patching
The Importance of Timely Patching
Aspen Security Forum 2022 – Led By Penny Pritzkerl – Virtual Fireside Chat with Secretary Gina Raimondo
Aspen Security Forum 2022 – Moderator: Courtney Kube – Niamh King’s Opening Remarks & National Security Today: Emerging Challenges and Opportunities
Aspen Security Forum 2022 – Moderator: Edward Luce – Global Economy: Recovery Or Recession Bound?
XKCD ‘Coffee Cup Holes’
Black Hat: We Should Have Seen The Colonial Ransomware Attack Coming

Upcoming Webinars

Mon 22

API Security

August 22 @ 1:00 pm - 2:00 pm
Wed 24

Implementing Identity Access Prioritization and Risk-Based Alerting for High-Fidelity Alerts

August 24 @ 1:00 pm - 2:00 pm
Tue 30

CISO Talk Master Class Episode: Catch Lightning in a Bottle – The Essentials: Bringing It All Together

August 30 @ 1:00 pm - 2:00 pm
Sep 19

Identity Zero-Trust: From Vision to Practical Implementation

September 19 @ 11:00 am - 12:00 pm

More Webinars

Download Free eBook

7 Must-Read eBooks for Security Professionals

Industry Spotlight

Gmail Lets Candidates Spam You — FEC FAIL
Application Security Cloud Security Cloud Security Cyberlaw Cybersecurity DevOps Editorial Calendar Featured Governance, Risk & Compliance Identity & Access Incident Response Industry Spotlight Most Read This Week Network Security News Popular Post Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches 

Gmail Lets Candidates Spam You — FEC FAIL

August 15, 2022 Richi Jennings | 2 days ago 0
MiCODUS Car Trackers are SUPER Vulnerable and Dangerous
Analytics & Intelligence Application Security Cloud Security Cybersecurity Data Security DevOps Editorial Calendar Featured Identity & Access Identity and Access Management Incident Response Industry Spotlight IoT & ICS Security Malware Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

MiCODUS Car Trackers are SUPER Vulnerable and Dangerous

July 21, 2022 Richi Jennings | Jul 21 0
How AI Secures the Future of Digital Payments
Application Security Cloud Security Cybersecurity Data Security Industry Spotlight Security Boulevard (Original) 

How AI Secures the Future of Digital Payments

July 18, 2022 Natasha Lane | Jul 18 Comments Off on How AI Secures the Future of Digital Payments

Top Stories

Radware Report Sees Major Spike in DDoS Attacks
Featured News Spotlight Uncategorized 

Radware Report Sees Major Spike in DDoS Attacks

August 17, 2022 Michael Vizard | Yesterday 0
AuditBoard Adds Ability to Assess Third-Party Risk
Featured News Spotlight Uncategorized 

AuditBoard Adds Ability to Assess Third-Party Risk

August 16, 2022 Michael Vizard | 1 day ago 0
Incident Response Teams Fight Back With Virtual Patching
Cybersecurity Endpoint Incident Response News Security Awareness Security Boulevard (Original) Threat Intelligence 

Incident Response Teams Fight Back With Virtual Patching

August 16, 2022 George V. Hulme | 1 day ago 0

Security Humor

Daniel Stori's 'terminal transparency'

Daniel Stori’s ‘terminal transparency’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Container Journal
  • DevOps.com
  • Techstrong Research
  • Techstrong TV
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
  • Digital Anarchist
Powered by Techstrong Group
Copyright © 2022 Techstrong Group Inc. All rights reserved.