
Tisiphone.net
15,138 FOLLOWERS
Tisiphone covers a range of topics including information security, hacking tools, malware, threat intelligence, incident response, digital forensics, OSINT, DFIR, and phishing. Written by Lesley Carhart, IT industry veteran & full spectrum cyber-warrior princess.
Tisiphone.net
1M ago
Happy Saturday, all! I hope you’re having a lovely weekend. This week, I had a fun chat with a long time friend and colleague, Ampyx‘s Patrick Miller. We talked about one of my favorite tech topics – digital forensics in the weird and wacky world of critical infrastructure – where it’s growing, where it’s struggling,… Read More A Fun Chat With Patrick Miller ..read more
Tisiphone.net
2M ago
I will be teaching two SANS ICS515 classes at upcoming events. You can attend in person or virtually at: San Francisco (Live and Online) Jan 27: https://www.sans.org/cyber-security-courses/ics-visibility-detection-response/ Dallas, TX (Live and Online) Mar 24: https://www.sans.org/cyber-security-courses/ics-visibility-detection-response ..read more
Tisiphone.net
2M ago
And, without further ado, here are some of the fun, smart people I have gotten to speak to on podcasts this year! Yes, blog aside, I’ve been busy! Cyber Uncut: Making your ICS/OT environments cyber secure, with Dragos’ Lesley Carhart Cyber Security Weekly Podcast: Episode 413 – Operational Technology (OT) Cybersecurity – Episode 4 Breaking… Read More Some of my favorite podcast appearances in 2024 ..read more
Tisiphone.net
2M ago
Hello, I understand I have been terribly delinquent in posting, so I wanted to share in the interim, some of my favorite talks of the past year. I hope you enjoy, and look forward to seeing you soon! I spoke to DomainTools about the current state of Industrial Cybersecurity and what I’m seeing in the… Read More Some of my favorite talks in 2024 ..read more
Tisiphone.net
2y ago
I now have some limited appointments for career counseling and resume discussion open for sign-ups. These sessions are free for college students and current enlisted military, and tip-what-you can for everyone else, if you feel my help was meaningful. You can sign up here: https://calendly.com/lesleycarhart
Keep in mind that I can only review North American style resumes, not international CVs, and I do not take the place of a grammar and style resume editor, who everyone should see. I review for content and discuss cybersecurity career paths and problems ..read more
Tisiphone.net
2y ago
Hi friends! I hope you’re having a wonderful Thanksgiving weekend (for the US folks), or a nice weekend regardless of location. I just wanted to drop a quick note to let you all know that from now on the best way to follow my daily social media posts, which include Q&As, cybersecurity news, and news commentary, will be on Mastodon. Unfortunately, the levels of direct abuse and spam my friends and I are receiving on Twitter have grown so untenable under the new management that I no longer feel comfortable trusting it as my primary platform for the foreseeable future. I may occasionally post ..read more
Tisiphone.net
2y ago
Hi pals! I hear you like lists as folks migrate over to Mastodon. Here are some I will keep relatively updated you may find useful, just to track people down! If you want me to remove you for some reason, contact me by DM or email. You can import these lists in your Mastodon preferences as you see fit, or add the accounts to your own lists. Mastodon does not allow for following other folks’ lists, natively.
Last updated, 11/10/22 10:00PM
Pancakes Short Stack (Mostly On-Topic Infosec News – this is a direct Twitter import)
Account address Show boosts
accidentalciso@infosec.exchange TRUE
gos ..read more
Tisiphone.net
2y ago
https://itspmagazinepodcast.com/episodes/martial-arts-marksmanship-and-ics-cyber-incident-response-a-conversation-with-lesley-carhart-cy-beat-podcast-with-deb-radcliff-2dWkd8yh ..read more
Tisiphone.net
2y ago
https://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/october/Your-Cyber-Response-Plan-Needs-These-6-Components/
Cybersecurity incidents are no longer a matter of if, but when. Building a good strategy and architecture to deter intrusions is incredibly important in reducing the frequency and severity of incidents, but there is no scenario where any organization is totally immune. That means that every organization must have a plan for what they will do in both their enterprise (IT) and operational technology (OT) environments in case an inciden ..read more