Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Women In Security: We've Still Got A Long Way To Go, Baby
Oldest First  |  Newest First  |  Threaded View
Page 1 / 2   >   >>
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
5/23/2014 | 11:01:13 AM
Great column and thanks for sharing
What struck me in your blog was the reference from The Atlantic cover story "The Confidence Gap." You wrote that there is evidence that "success, it turns out, correlates just as closely with confidence as it does with competence,"

It took me more than 50 years on this earth to realize that I was just as competent as many of my male peers in journalism. But the guys were always more confident about taking risks -- even for jobs they were barely competent in. It's something we gals need to keep in mind when considering opportunities that will make us stretch.

 

 
Sara Peters
Sara Peters,
User Rank: Author
5/23/2014 | 11:22:34 AM
Re: Great column and thanks for sharing
@Marilyn  It's so true! Another thing in The Atlantic story was that women only asked for promotions when they were sure that they fulfilled 100% of the job requirements. Men asked when they fulfilled only 50%.
RetiredUser
RetiredUser,
User Rank: Ninja
5/23/2014 | 4:45:32 PM
FOSS and Women
As the father of two daughters, I take a real close look at the communities I'm a part of.  I'm thankful to be part of the Free and Open Source (FOSS) communities because I am always running into smart female hackers who work in the industry.  I don't claim that everything is perfect, but when I'm at the Southern California Linux Expo (SCALE) I'm constantly impressed by how many more professional women there are every year; and I'm not just talking about LinuxChix Los Angeles (who I love to death) but every other booth I stop at reflects a new dynamic from the stuffy male-driven conferences of the past. 

Now, I'm not saying that corporate IT environments and underground cyber communities are worse than FOSS when it comes to female equality (I can name many women in both thos environments that probably have set the tone for future increased female participation), but I have found that FOSS communities shine with smart and respected female hackers. 

As has always been the hacker tradition, I say "show me the code" should be the measuring stick in IT and whatever the gender, religion, sexual identity of the hacker in question, the code rules.  Maybe if we can follow that rule of thumb we can put bias of all types in IT behind us and start having more fun!

I hope we get there soon, too - my daughter turns seven soon and she's already got all the signs of being a great FOSS hacker.  She is currently editing her LibreOffice "Nature Explorer" database on her gNewSense-driven laptop with dreams and potential I never had at that age. 

Happy gender-neutral hacking!

 
anon9675841497
anon9675841497,
User Rank: Apprentice
5/24/2014 | 1:47:26 PM
No problem
"there is a gender problem in IT"

 

No, there isn't. Why is it no one is writing stories about the "gender problem" with kindergarten teachers? Why can't people just accept the fact that women choose not to enter the field?
RyanSepe
RyanSepe,
User Rank: Ninja
5/24/2014 | 6:10:40 PM
Re: No problem
I have to agree with you on some level even if your portayal comes off blunt. 

There are gender gaps, yes but I believe they people are putting too much detrimental emphasis on them. I think this becomes an entirely different issue if people are deterred from even trying and if that is the case then I apologize. However, @anon's analogy is very appropriate. There may be a gender gap with IT, but there also is with teaching, construction, nursing. However, I would not categorize these things as a problem. 

Statistically it would seem that interests between the majority of males and females are different. This is no cause for alarm. I think we are wasting time and resources by trying to make everything 50/50 when there isn't a detriment to the current scenario. If the status quo remains with the gender gap, what takes a hit? Can I get an outer perspective as to the harm this causes? This may help my understanding of why this might cause issue with some.

A better avenue to place time and resources would be gender inequality as it relates to pay. That should be the same for who ever is in that role, male or female. If the person has the same amount of experience, same responsibilities, and all other ancillary factors are congruent then the person should be provided the same compensation as their counterpart.
SachinEE
SachinEE,
User Rank: Apprentice
5/26/2014 | 12:44:42 PM
Re : Women In Security: We've Still Got A Long Way To Go, Baby
In order to be taken seriously by men a woman should show she has the guts to face up to challenges brought out in a work place. Sara when you asked for a promotion, you should have just come out and said you want a pay rise too. Why did he give you the promotion if he didn't think you are not qualified to get the promotion? It just needs guts.
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
5/27/2014 | 9:57:54 AM
Re: Re : Women In Security: We've Still Got A Long Way To Go, Baby
@SachinEE Knowing Sara, I'm sure she has the guts to ask for a raise. And as the daughter of an assertive working mother and the mother of an assertive (when she wants to be) daughter I totally agree that being proactive is an important strategy for women who want to achieve pay parity and recognization in security-- along with many other fields.

While I can't speak directly about women in security, after 30-plus years in the workforce, I've seen plenty of examples of "exclusionary macho culture and a lack of executive sponsorship" as mentioned in the article. We all have to play a role in elimiinating that bias.
Sara Peters
Sara Peters,
User Rank: Author
5/27/2014 | 10:00:47 AM
Re: No problem
@RyanSepe  Well, I agree with you that aiming for a 50/50 split is pointless, but I don't think that's really what anybody's goal is. Certain fields attract more women, others attract more men, and there's nothing wrong with that. The trouble is when someone is attracted to a field that then rejects them.

What concerns me is that maybe the split would be 20:80, if half the women who left the field after a year decided to stay instead.
Sara Peters
Sara Peters,
User Rank: Author
5/27/2014 | 10:07:30 AM
Re: Re : Women In Security: We've Still Got A Long Way To Go, Baby
@SachinEE @Marilyn   Well it might be a problem with a lack of guts. But I can tell you that the time I asked for the promotion but not the raise was because I knew the better title would help me do a better job (because people were more likely to return my phone calls), but I also knew that the company was struggling a bit financially and I didn't want to a) hurt the company, or b) have them immediately reject my request for a promotion.

So, I guess it was partly a lack of confidence and partly a willingness to sacrifice a little something for the sake of the company. I think both of those things are rather common among women.

Regardless... I should have at least asked for the raise, even if I was willing to take the promotion without the money if they said they couldn't afford it. It's silly that I didn't do it.


 
Sara Peters
Sara Peters,
User Rank: Author
5/27/2014 | 10:23:55 AM
Re: FOSS and Women
@christianabryant  Thank you for the info and for being such a responsible dad to daughters! Hopefully they'll find the same supportive environment in the IT world as they get older.
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1172
PUBLISHED: 2023-03-17
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that w...
CVE-2023-1469
PUBLISHED: 2023-03-17
The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pec_coupon[code]’ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenti...
CVE-2023-1466
PUBLISHED: 2023-03-17
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as critical. This issue affects the function view_student of the file admin/?page=students/view_student. The manipulation of the argument id with the input 3' AND (SELECT 2100 FROM (SELECT(...
CVE-2023-1467
PUBLISHED: 2023-03-17
A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file Master.php?f=delete_img of the component POST Parameter Handler. The manipulation of the argument path with the input C%3A%2Ffoo.txt le...
CVE-2023-1468
PUBLISHED: 2023-03-17
A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=reports&date_from=2023-02-17&date_to=2023-03-17 of the component Report Handler. The manipula...