Welcome to my personal blog! Topics include; securing software, DevOps, secure coding, application security (AppSec), cloud security, MFA, InfoSec community stuff, and anything else nerdy I feel like sharing. Hope you like it!
OWASP Global AppSec Dublin 2023
Recently I had the pleasure of being one of the keynote speakers at OWASP Global AppSec, in Dublin Ireland. In this post I’m going to give a brief overview of some of the talks I saw while I was there, and the TONS of fun I had. I didn’t …
#CyberMentoringMonday and Advocating for Others
I have run an informal mentoring program, every single Monday, since 2018. It's very simple; I use the hashtag #CyberMentoringMonday on Twitter and Mastadon, to try to help people find each other.
Continuous Learning
Working in the information technology (IT) field means you need to be comfortable with things at work constantly changing and the need to continue to learn as your career grows. Working in information security (InfoSec) means you not only need to keep up with all sorts of IT trends, …
Consulting on Canada’s Approach to Cyber Security
You may not be aware but Canada's Public Safety department put out a call to Canadian Citizens (sorry brilliant people who are not Canadian), asking for ideas, suggestions and thoughts on what they should prioritize next for the Canadian Government for InfoSec. I WAS SO EXCITED WHEN I SAW …
Why can’t I get over log4j?
I haven’t written in my personal blog in a while, and I have good reasons (I moved to a new city, the new place will be a farm, I restarted my international travel, something secret that I can’t announce yet, and also did I mention I was a bit …
Parody Songs
For those who are not aware, I used to be a professional musician. I went both under my name (Tanya Janca, folk singer) and was in several different musical groups including Couchwrecked, who wrote the song Hottawa. I just released another parody video and thought I would share it. …
Sharing Another Talk with the Community
Three years ago I decided that I would share most of my talk content with my community (everything that I am not currently applying to conferences with). At the time, I only shared one, because…. I ran out of time. Now it's time to share the second talk, "Security …
Jobs in Information Security (InfoSec)
Almost all of the people who respond to my #CyberMentoringMonday tweets each week say that they want to “get into InfoSec” or “become a Penetration Tester”; they rarely choose any other jobs or are more specific than that. I believe the reason for this is that they are not aware of …
The Difference Between Applications and Infrastructure
Recently someone asked me what the difference was between Applications and Infrastructure. He asked why a Linux operating system wasn't "software" and I said it was but it's a perfect copy… I tend to speak about 'custom software'. We ended up talking for a very long time about it, …
Discoveries as a Result of the Log4j Debacle
Happier times, before I knew anything about log4j. Over the past 2 weeks many people working in IT have been dealing with the fallout of the vulnerabilities and exploits being carried out against servers and applications using the popular Log4J java library. Information security people have been responding 24/7 …
I want to talk about Log4j
Lots of people are talking about how Log4J affects servers, but if you subscribe to my newsletter or read my blog, you probably want to know about your apps. Let's talk about what the problem is, how to figure out if you have it, then what to do about …
My Career Story
I started coding at 17 years old, and it was love at first sight. I got great marks in all of my classes in high school, but loved computer science because in every class, I could “make something out of nothing.” Computer science runs deep in my family as …
#CyberMentoringMonday
Some people have been asking me online how to be a good mentor. Here are some thoughts for all of you. 😀 Some mentees don’t listen, and are not willing to put in the work. Some of them will astound you and excel beyond your wildest dreams. The key …
Security bugs are fundamentally different than quality bugs
This topic has come up a few times this year in question period: arguments that quality bugs and security bugs ‘have equal value’, that security testing and QA are ‘the same thing’, that security testing should ‘just be performed by QA’ and that ‘there’s no specific skillset’ required to …
Security Headers for ASP.Net and .Net CORE
For those who do not follow myself or Franziska Bühler, we have an open source project together called OWASP DevSlop in which we explore DevSecOps through writing vulnerable apps, creating pipelines, publishing proof of concepts, and documenting what we’ve learned on our YouTube Channel and our blogs. In this article we will explore adding security headers …
Hacking Robots and Eating Sushi
I recently had dinner with an old friend, Jesse Hones, the Engineering Manager of Systems / Senior Software Developer of Aprel. I remember when we first met he explained that he designed and programmed robots to measure radio frequencies at extremely precise levels. Fast forward a decade; I am an ethical …
Why I Love Password Managers
** This article is for beginners in security or other IT folk, not experts. 😀 Passwords are awful. The software security industry expects us to remember 100+ passwords, that are complex (variations of upper & lowercase, numbers and special characters), that are supposed to be changed every 3 months, …
VAs, Scans and PenTests; not the same thing
I’d like to define a couple of subjects that seem to be confused often in the industry of application security; Vulnerability Assessment (VA), Vulnerability Scan (VA Scan) and Penetration Test (PenTest). They are often used interchangeably, and the differences do not seem to be well-understood; I have seen this …
Threat Modelling Serverless
I met with my colleague Bryan Hughes the other day to discuss the security of a serverless app he’s creating for JSConf EU (there will be no spoilers about his creation, don’t worry). We had discussed the idea of threat modelling while on a business trip together and he wanted to give it …
Presentation Tips for Technical Talks
In the past few years I’ve given and watched several technical talks, and they are not all created equal. Recently I met with Teuta H Hyseni to talk about an upcoming talk she was planning (securing AI and ML, very interesting!), and afterwards I made several notes about general tips for …