Careers & People

7/31/2018
12:00 PM
Kelly Sheridan
Kelly Sheridan
Slideshows
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

10 More Women in Security You May Not Know But Should

The second installment in a series highlighting women who are driving change in cybersecurity but may not be on your radar - yet.
Previous
1 of 11
Next

(Image: Syda Productions via Shutterstock)

(Image: Syda Productions via Shutterstock)

Kelly Jackson Higgins contributed to this article.

The gender disparity plaguing cybersecurity – and the tech industry as a whole – isn't new, but it is particularly discouraging when the few women in the space aren't recognized for their work.

Women make up 11% of cybersecurity professionals around the world, researchers report, and even fewer hold leadership positions. Change in the industry has been slow-going, and it doesn't help that most male security pros believe women have the same opportunities for career advancement as they do. About half of women feel the same way, data indicates.

However, women can take steps to raise their visibility in the security industry – a sector in which most women are underpaid compared with their male colleagues and are more likely to face discrimination in the workplace. Raising awareness of the problem, embracing their roles as security experts, and serving as mentors to younger women are among the best practices.

The industry can also do more to support them. Plenty of women in the industry are making moves and changing cybersecurity for the better. Earlier this summer, for example, former Twistlock strategy officer and Forrester vice president Chenxi Wang debuted the first female-led cybersecurity venture capital firm, Rain Capital, a product of her security expertise and interest in investing in early-stage startups.

Wang isn't the only woman who is driving change in cybersecurity. In an effort to acknowledge the work women are doing to shape the industry, Dark Reading is publishing a series of articles about women who are making key contributions but aren't quite as well-known (yet), and who we think will make a difference in the future.

The first installment was published earlier this year, putting the spotlight on 10 women across all sectors of security. In this second installment, 10 more women were chosen based on research and recommendations from industry peers, experts, and colleagues. (Their profiles are in no particular order.) 

We are always looking to learn about women in cybersecurity whose work is poised to make a difference. If you know someone who belongs on this list, please send their names and any information about them and their work to [email protected].

 

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Previous
1 of 11
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
gif-washco
50%
50%
gif-washco,
User Rank: Apprentice
8/17/2018 | 11:13:01 AM
Extroverts?
I have worked with and reported to female coworkers and leaders. The leaders in this article seem to have a common trait of being extroverts, no difference in comparison to their male counterparts. However, a lot of unsung female heros are not extroverts and work diligiently with their team members and customers. They do not want publicity. To me, they are also leaders...

 
aumickmanuela
100%
0%
aumickmanuela,
User Rank: Strategist
8/7/2018 | 4:42:15 AM
Jamie Tomasello
I don't know that in this sphere are working pretty girls, like this. This article is very interesting for me. Jamie Tomasello has interesting experience and give me good advices in my work!
New Cold Boot Attack Gives Hackers the Keys to PCs, Macs
Kelly Sheridan, Staff Editor, Dark Reading,  9/13/2018
Yahoo Class-Action Suits Set for Settlement
Dark Reading Staff 9/17/2018
RDP Ports Prove Hot Commodities on the Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: In Russia, application hangs YOU!
Current Issue
Flash Poll
Surviving the IT Security Skills Shortage
Surviving the IT Security Skills Shortage
Cybersecurity professionals are in high demand -- and short supply. Find out what Dark Reading discovered during their 2017 Security Staffing Survey and get some strategies for getting through the drought. Download the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-6693
PUBLISHED: 2018-09-18
An unprivileged user can delete arbitrary files on a Linux system running ENSLTP 10.5.1, 10.5.0, and 10.2.3 Hotfix 1246778 and earlier. By exploiting a time of check to time of use (TOCTOU) race condition during a specific scanning sequence, the unprivileged user is able to perform a privilege escal...
CVE-2018-16515
PUBLISHED: 2018-09-18
Matrix Synapse before 0.33.3.1 allows remote attackers to spoof events and possibly have unspecified other impacts by leveraging improper transaction and event signature validation.
CVE-2018-16794
PUBLISHED: 2018-09-18
Microsoft ADFS 4.0 Windows Server 2016 and previous (Active Directory Federation Services) has an SSRF vulnerability via the txtBoxEmail parameter in /adfs/ls.
CVE-2018-16819
PUBLISHED: 2018-09-18
admin/index.php in Monstra CMS 3.0.4 allows arbitrary file deletion via id=filesmanager&path=uploads/.......//./.......//./&delete_file= requests.
CVE-2018-16820
PUBLISHED: 2018-09-18
admin/index.php in Monstra CMS 3.0.4 allows arbitrary directory listing via id=filesmanager&path=uploads/.......//./.......//./ requests.