Georgia WeidmanFrom Misstep to Momentum: Turning a Diversity Disaster into ProgressA disaster recovery plan for companies that have made marketing misteps with regard to women in tech.Aug 19Aug 19
Georgia WeidmanAutistic Toxic Nightmare Girl: A Trainwreck’s Travelogue (Part 1)[Note: I wrote this in 2019 before COVID-19 and right after the Tribe of Hackers summit. For whatever reason, I never released it. I…Jul 1Jul 1
Georgia WeidmanFive-Minute Web App Security AssessmentThis post will examine three free online tools for checking websites for common security misconfiguration vulnerabilities. Before we dive…Jun 24Jun 24
Georgia WeidmanMy Journey to Achieving the LinkedIn Top Voice in Cybersecurity: A Tale of Rapid Success in Just 2…(And in the top 2% of quality contributors in less than a week)Jun 17Jun 17
Georgia WeidmanExploit Development Space Issues: A Relative JumpNote: These are writeups for the exercise for a previous version of my Exploit Development class that I’m not releasing for free. They…Apr 1, 2020Apr 1, 2020
Georgia WeidmanDefence Against the Dark Arts: Hacking Isn’t MagicAdditional thoughts about my panel at the Bloomberg “Sooner Than You Think” conference on data breaches.Nov 21, 2019Nov 21, 2019
Georgia WeidmanAdditional Book Exercises: Apache Tomcat Guessable CredentialsIn the first edition of Penetration Testing: A Hands-On Introduction to Hacking, you looked at specific examples of vulnerabilities. My…Apr 18, 2019Apr 18, 2019
Georgia WeidmanShitsco CTF Problem WalkthroughAn in-depth beginner friendly walkthrough of a previous Defcon Capture the Flag problem. Ideal for readers of my Penetration Testing book.Feb 26, 20194Feb 26, 20194
Georgia WeidmanCFP Yoga PantsA story about the time I secretly listened in on a CFP review call.Feb 17, 2019Feb 17, 2019
Georgia WeidmanChanges in Pattern RecognitionMy Women’s Cyberjutsu award speech. A call to arms for women in Cybersecurity.Feb 3, 2019Feb 3, 2019