Open in app

Sign In

Write

Sign In

Tash Norris
Tash Norris

34 Followers

Home

About

Sep 10, 2019

Welcome to our space

Back in March this year, a group of ladies met in a pub in Farringdon. We’d met at security meet-ups and networking events, bonded over red wine and decided to meet to debate whether all women spaces were needed in the info-sec London world. Spoiler: We decided that a space…

Tech

4 min read

Welcome to our space
Welcome to our space
Tech

4 min read


Jul 14, 2019

Are we making our engineers Blue?

Free and easy goodies to help bring more visibility and defensive capabilities to your product teams and AWS environment. — When we consider our current challenge as security teams; the main one, the one for me that’s always been prevalent, is that we often have some kind of us and them (them being everyone else in the business)mentality. It’s often there in the business too — Security at one point…

AWS

5 min read

Are we making our engineers Blue?
Are we making our engineers Blue?
AWS

5 min read


Jul 4, 2019

Why I ran a lock-picking session in my office.

“What an opportunity to demonstrate the power of collaboration between security and engineering when building a product.” Head to any major security conference, be it B-Sides, BlackHat or DefCon you’re likely to come across a lock picking village. But why? Aside from the fact that it’s good to just sit and be still (see n number of posts on mindfulness), I truly believe lock picking provides a good ice breaker and an avenue…

Security

3 min read

Why I ran a lock-picking session in my office.
Why I ran a lock-picking session in my office.
Security

3 min read


Jun 17, 2019

Using threat models for incidents (and how incidents helped me like attack trees)

A run down on how your Security Engineering / Application Security teams can support your incident process. — My favourite part; when we’re remediating issues during incidents we’re not just fixing the root cause, but also identifying other potential causes and remediating those too. Threat Modeling I really enjoy talking about threat models, they’re kind of like art to me. There are so many different ways to do them, they…

Security

4 min read

Using threat models for incidents (and how incidents helped me like attack trees)
Using threat models for incidents (and how incidents helped me like attack trees)
Security

4 min read


Feb 10, 2019

Wine and Py; Using Deep Work to learn a new skill

I recently read a blog from Azeria over at azeria-labs.com (@Fox0x01 on Twitter) on Deliberate Practice and Deep Work and it really stuck with me. …

Productivity

4 min read

Wine and Py; Using Deep Work to learn a new skill
Wine and Py; Using Deep Work to learn a new skill
Productivity

4 min read

Tash Norris

Tash Norris

34 Followers

Cyber Security | eCommerce | FinTech

Following
  • Teri Radichel

    Teri Radichel

  • Adam Shostack

    Adam Shostack

  • Zoe Braiterman

    Zoe Braiterman

  • Moonpig Engineering

    Moonpig Engineering

  • Aneesh Sebastian

    Aneesh Sebastian

See all (10)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams