Lisi Hocke

@lisihocke
1.4K Followers
924 Following
10K Posts

security engineer, holistic tester, quality enabler, agile experimenter, sociotechnical symmathecist, team glue. volleyball player, game lover, story escapist. she/her.

#tech #security #CyberSecurity #SecurityEngineering #ProdSec #AppSec #DevSecOps #testing #quality #development #software #collaboration #pairing #EnsembleProgramming #EnsembleTesting #SoftwareTeaming #agile #experimenting #sociotechnical

Pronounsshe/her
Websitehttps://www.lisihocke.com
Linktreehttps://linktr.ee/lisihocke

Happy Autism Awareness Month.

We encourage everyone to celebrate, mostly by skipping small talk, indulging in interests that fascinate and grip you, and changing as much of your personal environment as possible to emphasize sensory fulfillment and comfort.

My greatest professional accomplishment of the year: I got my exec & manager teammates saying "point positive," a term from whitewater rafting and kayaking.

Meaning: when facing hazards, point people toward where to go/what to do, rather than drawing attention to everything to avoid.

About trans rights:

They're a wedge issue. If you think it's okay to deprive trans people of the right to exist in the public sphere then you're saying human rights are conditional and/or can be withdrawn. Which puts you on a slippery slope to no human rights for anyone.

When you trace the roots of the modern anti-trans movement they boil down to some combination of bigotry and billionaire bullshitβ€” the oligarchs think rights are for the rich.

So: trans-rights are human rights. No exceptions.

Another talk for BSides Luxembourg!

πŸ’₯πŸ”₯ π—§π—›π—˜ π—ͺπ—›π—œπ—¦π—§π—Ÿπ—˜π—¦ π—šπ—’ π—ͺ𝗒𝗒 π—ͺ𝗒𝗒: π—¦π—œπ—˜π—  π—”π—Ÿπ—˜π—₯𝗧𝗦, 𝗧𝗛π—₯π—˜π—”π—§ π——π—˜π—§π—˜π—–π—§π—œπ—’π—‘ 𝗔𝗑𝗗 π—§π—¨π—‘π—œπ—‘π—š π—¨π—‘π—‘π—˜π—–π—˜π—¦π—¦π—”π—₯𝗬 π—‘π—’π—œπ—¦π—˜ - π— π—˜π—Ÿπ—œπ—‘π—” π—£π—›π—œπ—Ÿπ—Ÿπ—œπ—£π—¦ ( @tx_princess ) πŸ•΅οΈβ€β™€οΈβš”οΈ

Security teams don’t miss alerts because they’re careless, they miss them because their SIEM never stops yelling. This talk shows how poorly timed, constant, or context-free alerts become meaningless noise and how simple fixes like throttling, prioritization, and timing can turn a SIEM into a tool that actually gets noticed when it matters.

Melina Phillips https://www.linkedin.com/in/melinaphillips-cissp/ is an Offensive Security Engineer with over 10 years in IT and 6 years in cybersecurity, specializing in security operations, incident detection, adversary simulation, and endpoint compromise. She has presented at BSides Cambridge, Security Fest, BruCon, LeHack, HackLu, and BlackAlps.

πŸ“… Conference dates: 6–8 May 2026 | 09:00–18:00
πŸ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
🎟️ Tickets: https://2026.bsides.lu/tickets/
πŸ“… Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/

#BSidesLuxembourg2026 #CyberSecurity #OffensiveSecurity #ThreatDetection #LinuxSecurity #Infosec

I believe stating facts of failure means we don't remain with failure. Swallowing exceptions, or treating honest feedback as something we can only whisper about is how you create perpetual bad.

I don't just report problems, I work to fix them. Acknowledging there is a problem and *I am a significant part of this problem* is a good start.

The psychological safety core principles.

The short version: it's a matter of equity and rights, not performance optimisation. Power is at the heart of it. The work is on the response, not the speaker. And it's never finished.

psychsafety.com/our-core-principles

β€œwe’re disrupting X” means we found a cheaper way to do X that externalises all the costs onto someone who can’t afford a lawyer

Shocked, I say.

https://browsergate.eu

LinkedIn Is Illegally Searching Your Computer

Microsoft is running one of the largest corporate espionage operations in modern history. Every time any of LinkedIn’s one billion users visits linkedin.com, hidden code searches their computer for installed software, collects the results, and transmits them to LinkedIn’s servers and to third-party companies including an American-Israeli cybersecurity firm. The user is never asked. Never told. LinkedIn’s privacy policy does not mention it. Because LinkedIn knows each user’s real name, employer, and job title, it is not searching anonymous visitors. It is searching identified people at identified companies. Millions of companies. Every day. All over the world.

BrowserGate
The true test of whether you're autistic is how much time you spend explaining that the diagnostic questions are unanswerable, overgeneralized, & hard to give a clear response to. πŸ˜…

https://pluralistic.net/2026/04/02/limited-monopoly/

β€œAnthropic has taken an extremely aggressive posture on copyright's "limitations and exceptions," arguing that it can train its models on any information it can find, and knowingly download massive troves of works for that purpose. It's darkly hilarious to see the company firehosing copyright complaints by the thousands to prevent the dissemination, dissection and discussion of the source-code that leaked due to the company's gross incompetence” @pluralistic

Pluralistic: It’s extremely good that Claude’s source-code leaked (02 Apr 2026) – Pluralistic: Daily links from Cory Doctorow