I Write Policies Not Tragedies: An Intro to Security Management

Estimated difficulty: 💜💜💜🤍🤍

Chances are, if you study or work in Information Technology, or specifically the realm of Information Security, you’ve heard of security management. Security management, though broad, is pretty nuanced and encompasses every domain of security in one way or another – this post will cover at a high level what some areas of security management are, (we’ll look at these in more individual detail in later posts) and briefly what some of the problems are that organisations face with security management.

Misery Business: Sextortion Emails

Estimated difficulty: 💜🤍🤍🤍🤍
Content Warning: This post includes discussion of sensitive topics such as revenge porn and blackmail. This week I’m primarily going to cover sextortion phishing campaigns, and a little about how to deal with these sorts of emails. I’ll also include some resources at the end of the post discussing general (non-phishing) sextortion, and organisations who can help if somebody tries to blackmail you with, or releases your personal content without your consent.

Cryptography Terms

Estimated difficulty: 💜🤍🤍🤍🤍

Hey! This is a quick, simplified overview of some related terms for anyone who isn’t familiar with cryptography. I’ll add to this as time goes on to try and make sure it includes the terms used in other posts. 🥳


Estimated difficulty: 💜🤍🤍🤍🤍

Welcome to week four of government-mandated sourdough-baking and Netflix-binging, and my first post on Security Queens. 🎉

I’m asked quite often how I managed to get into the security industry, coming from a non-technical background, and for useful resources for people just starting out…