Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Women In Security: We've Still Got A Long Way To Go, Baby
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
5/24/2014 | 6:10:40 PM
Re: No problem
I have to agree with you on some level even if your portayal comes off blunt. 

There are gender gaps, yes but I believe they people are putting too much detrimental emphasis on them. I think this becomes an entirely different issue if people are deterred from even trying and if that is the case then I apologize. However, @anon's analogy is very appropriate. There may be a gender gap with IT, but there also is with teaching, construction, nursing. However, I would not categorize these things as a problem. 

Statistically it would seem that interests between the majority of males and females are different. This is no cause for alarm. I think we are wasting time and resources by trying to make everything 50/50 when there isn't a detriment to the current scenario. If the status quo remains with the gender gap, what takes a hit? Can I get an outer perspective as to the harm this causes? This may help my understanding of why this might cause issue with some.

A better avenue to place time and resources would be gender inequality as it relates to pay. That should be the same for who ever is in that role, male or female. If the person has the same amount of experience, same responsibilities, and all other ancillary factors are congruent then the person should be provided the same compensation as their counterpart.
anon9675841497
50%
50%
anon9675841497,
User Rank: Apprentice
5/24/2014 | 1:47:26 PM
No problem
"there is a gender problem in IT"

 

No, there isn't. Why is it no one is writing stories about the "gender problem" with kindergarten teachers? Why can't people just accept the fact that women choose not to enter the field?
RetiredUser
50%
50%
RetiredUser,
User Rank: Ninja
5/23/2014 | 4:45:32 PM
FOSS and Women
As the father of two daughters, I take a real close look at the communities I'm a part of.  I'm thankful to be part of the Free and Open Source (FOSS) communities because I am always running into smart female hackers who work in the industry.  I don't claim that everything is perfect, but when I'm at the Southern California Linux Expo (SCALE) I'm constantly impressed by how many more professional women there are every year; and I'm not just talking about LinuxChix Los Angeles (who I love to death) but every other booth I stop at reflects a new dynamic from the stuffy male-driven conferences of the past. 

Now, I'm not saying that corporate IT environments and underground cyber communities are worse than FOSS when it comes to female equality (I can name many women in both thos environments that probably have set the tone for future increased female participation), but I have found that FOSS communities shine with smart and respected female hackers. 

As has always been the hacker tradition, I say "show me the code" should be the measuring stick in IT and whatever the gender, religion, sexual identity of the hacker in question, the code rules.  Maybe if we can follow that rule of thumb we can put bias of all types in IT behind us and start having more fun!

I hope we get there soon, too - my daughter turns seven soon and she's already got all the signs of being a great FOSS hacker.  She is currently editing her LibreOffice "Nature Explorer" database on her gNewSense-driven laptop with dreams and potential I never had at that age. 

Happy gender-neutral hacking!

 
Sara Peters
50%
50%
Sara Peters,
User Rank: Author
5/23/2014 | 11:22:34 AM
Re: Great column and thanks for sharing
@Marilyn  It's so true! Another thing in The Atlantic story was that women only asked for promotions when they were sure that they fulfilled 100% of the job requirements. Men asked when they fulfilled only 50%.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
5/23/2014 | 11:01:13 AM
Great column and thanks for sharing
What struck me in your blog was the reference from The Atlantic cover story "The Confidence Gap." You wrote that there is evidence that "success, it turns out, correlates just as closely with confidence as it does with competence,"

It took me more than 50 years on this earth to realize that I was just as competent as many of my male peers in journalism. But the guys were always more confident about taking risks -- even for jobs they were barely competent in. It's something we gals need to keep in mind when considering opportunities that will make us stretch.

 

 
<<   <   Page 2 / 2


COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/17/2020
Cybersecurity Bounces Back, but Talent Still Absent
Simone Petrella, Chief Executive Officer, CyberVista,  9/16/2020
Meet the Computer Scientist Who Helped Push for Paper Ballots
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8225
PUBLISHED: 2020-09-18
A cleartext storage of sensitive information in Nextcloud Desktop Client 2.6.4 gave away information about used proxies and their authentication credentials.
CVE-2020-8237
PUBLISHED: 2020-09-18
Prototype pollution in json-bigint npm package &lt; 1.0.0 may lead to a denial-of-service (DoS) attack.
CVE-2020-8245
PUBLISHED: 2020-09-18
Improper Input Validation on Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11....
CVE-2020-8246
PUBLISHED: 2020-09-18
Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-W...
CVE-2020-8247
PUBLISHED: 2020-09-18
Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-W...