Dark Reading Radio
Breaking the Glass Ceiling in InfoSec
Date / Time: Wednesday, June 11, 2014, 1:00 PM New York/10:00 AM San Francisco
Click here to register

Lean In, says Facebook COO Sheryl Sandberg in her best-selling 2013 book of the same name, which advises women on how to shatter glass ceilings in tech and other male-dominated industries. But, as any woman in tech will tell you, the challenges today are daunting. And if you cant relate from your own personal experience, consider what Google owned up to recently in its first-ever public diversity report about the lack of diversity of its own workforce where the breakdown of male to female technical employees is an astonishing 83 percent male, 17 percent female. Were not where we want to be, observed Laszlo Bock, Googles Senior Vice President, People Operations, in what could easily qualify as the understatement of the year.

In our next episode of Dark Reading Radio, well discuss their challenges and successes in overcoming the gender gap in IT from the vantage point of three women in IT security. Our panel includes Marisa Fagan, community manager at Bugcrowd, Kerstyn Clover, consultant on the SecureState Attack and Defense Team, and Lysa Myers, security researcher for ESET.

Register for Dark Reading Newsletters
White Papers
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
According to industry estimates, about a million new IT security jobs will be created in the next two years but there aren't enough skilled professionals to fill them. On top of that, there isn't necessarily a clear path to a career in security. Dark Reading Executive Editor Kelly Jackson Higgins hosts guests Carson Sweet, co-founder and CTO of CloudPassage, which published a shocking study of the security gap in top US undergrad computer science programs, and Rodney Petersen, head of NIST's new National Initiative for Cybersecurity Education.