Careers & People

7/31/2018
12:00 PM
Kelly Sheridan
Kelly Sheridan
Slideshows
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

10 More Women in Security You May Not Know But Should

The second installment in a series highlighting women who are driving change in cybersecurity but may not be on your radar - yet.
Previous
1 of 11
Next

(Image: Syda Productions via Shutterstock)

(Image: Syda Productions via Shutterstock)

Kelly Jackson Higgins contributed to this article.

The gender disparity plaguing cybersecurity – and the tech industry as a whole – isn't new, but it is particularly discouraging when the few women in the space aren't recognized for their work.

Women make up 11% of cybersecurity professionals around the world, researchers report, and even fewer hold leadership positions. Change in the industry has been slow-going, and it doesn't help that most male security pros believe women have the same opportunities for career advancement as they do. About half of women feel the same way, data indicates.

However, women can take steps to raise their visibility in the security industry – a sector in which most women are underpaid compared with their male colleagues and are more likely to face discrimination in the workplace. Raising awareness of the problem, embracing their roles as security experts, and serving as mentors to younger women are among the best practices.

The industry can also do more to support them. Plenty of women in the industry are making moves and changing cybersecurity for the better. Earlier this summer, for example, former Twistlock strategy officer and Forrester vice president Chenxi Wang debuted the first female-led cybersecurity venture capital firm, Rain Capital, a product of her security expertise and interest in investing in early-stage startups.

Wang isn't the only woman who is driving change in cybersecurity. In an effort to acknowledge the work women are doing to shape the industry, Dark Reading is publishing a series of articles about women who are making key contributions but aren't quite as well-known (yet), and who we think will make a difference in the future.

The first installment was published earlier this year, putting the spotlight on 10 women across all sectors of security. In this second installment, 10 more women were chosen based on research and recommendations from industry peers, experts, and colleagues. (Their profiles are in no particular order.) 

We are always looking to learn about women in cybersecurity whose work is poised to make a difference. If you know someone who belongs on this list, please send their names and any information about them and their work to [email protected].

 

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Previous
1 of 11
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
SaulMorris
50%
50%
SaulMorris,
User Rank: Apprentice
10/21/2018 | 7:46:18 AM
Re: Jamie Tomasello
i agree
gif-washco
50%
50%
gif-washco,
User Rank: Apprentice
8/17/2018 | 11:13:01 AM
Extroverts?
I have worked with and reported to female coworkers and leaders. The leaders in this article seem to have a common trait of being extroverts, no difference in comparison to their male counterparts. However, a lot of unsung female heros are not extroverts and work diligiently with their team members and customers. They do not want publicity. To me, they are also leaders...

 
aumickmanuela
100%
0%
aumickmanuela,
User Rank: Strategist
8/7/2018 | 4:42:15 AM
Jamie Tomasello
I don't know that in this sphere are working pretty girls, like this. This article is very interesting for me. Jamie Tomasello has interesting experience and give me good advices in my work!
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
2019 Attacker Playbook
Ericka Chickowski, Contributing Writer, Dark Reading,  12/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
[Sponsored Content] The State of Encryption and How to Improve It
[Sponsored Content] The State of Encryption and How to Improve It
Encryption and access controls are considered to be the ultimate safeguards to ensure the security and confidentiality of data, which is why they're mandated in so many compliance and regulatory standards. While the cybersecurity market boasts a wide variety of encryption technologies, many data breaches reveal that sensitive and personal data has often been left unencrypted and, therefore, vulnerable.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19790
PUBLISHED: 2018-12-18
An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restricti...
CVE-2018-19829
PUBLISHED: 2018-12-18
Artica Integria IMS 5.0.83 has CSRF in godmode/usuarios/lista_usuarios, resulting in the ability to delete an arbitrary user when the ID number is known.
CVE-2018-16884
PUBLISHED: 2018-12-18
A flaw was found in the Linux kernel in the NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel id and cause a use-after-free. Thus a malicious container user can cause a host kernel memory corruption and a system ...
CVE-2018-17777
PUBLISHED: 2018-12-18
An issue was discovered on D-Link DVA-5592 A1_WI_20180823 devices. If the PIN of the page "/ui/cbpc/login" is the default Parental Control PIN (0000), it is possible to bypass the login form by editing the path of the cookie "sid" generated by the page. The attacker will have acc...
CVE-2018-18921
PUBLISHED: 2018-12-18
PHP Server Monitor before 3.3.2 has CSRF, as demonstrated by a Delete action.