Thirty-four Years in IT -  Leadership Chaos, Career Derailed (Part 10)

Thirty-four Years in IT – Leadership Chaos, Career Derailed (Part 10)

| | career
This post is the hardest one to write. I've been thinking about it for years without being able to put words to paper. With the COVID-19 stay-at-home directive, I can't procrastinate anymore, ...

YesWeHack Cybersecurity Training Temporarily Free for Schools and Universities

YesWeHack, a European bug bounty platform, is providing universities and schools with free access to its educational platform YesWeHackEDU. This offer aims to allow educational institutions to hold a practice-oriented cybersecurity training ...

How I Became a Security Consultant: AbsoluteAppsec Interview

Every so often, podcasts and such will invite me to speak on a variety of topics. And this week, I was very excited to join @cktricky and @sethlaw on the Absolute AppSec ...
mentoring

The Power of Mentoring in Threat Research

As I took the stage at DEF CON 27, I looked out into the crowd. My close friend and mentor of more than 10 years had flown out to Las Vegas to ...
Security Boulevard
Thirty-four years in IT - The Application That Almost Broke Me (Part 9)

Thirty-four years in IT – The Application That Almost Broke Me (Part 9)

| | career, Oracle, performance
The last half of 2011 was for me an my team a really, really tough time.As I hinted to in this post, by August 2011 we were buried in Oracle 11 & ...
EH-Net - Steph Ihezukwu - BBP: My Path to the CISO Chair

BBP: My Path to the CISO Chair

Testing, testing. May I have your attention, please. *Ahem* Allow me to introduce myself and this new series of articles for The Ethical Hacker Network. My name is Stephanie, better known as ...
Thirty-four years in IT - Swimming with the Itanic (Part 8)

Thirty-four years in IT – Swimming with the Itanic (Part 8)

For historical reasons, we were a strong VMS shop. Before they imploded, Digital Equipment treated EDU's very kindly, offering extremely good pricing on software in exchange for hardware adoption. In essence, a ...
Thirty-four Years in IT - Addressing Application Security (Part 7)

Thirty-four Years in IT – Addressing Application Security (Part 7)

| | career, security, software
In the 2008-2009 period, we finally started to seriously address application layer security in our development group.By that time is was clear that the threat to hosted applications had moved up the ...
EH-Net - Community Articles - From Politics to Penetration Testing

From Politics to Penetration Testing

Not all politicians are lifers, said no politician ever. Until now. It was a mere 12 months ago that I left the political realm after losing a run for the Ohio General ...
SAFETY Act: A Safety Net for Companies

Cybersecurity Career Path: A Beginner’s Guide

The time is now to start a cybersecurity career, as the need is more urgent than ever Cyberattacks happen every day to all types of businesses and organizations. That’s why keeping hardware, ...
Security Boulevard