Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Women In Security: We've Still Got A Long Way To Go, Baby
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
RyanSepe
RyanSepe,
User Rank: Ninja
5/24/2014 | 6:10:40 PM
Re: No problem
I have to agree with you on some level even if your portayal comes off blunt. 

There are gender gaps, yes but I believe they people are putting too much detrimental emphasis on them. I think this becomes an entirely different issue if people are deterred from even trying and if that is the case then I apologize. However, @anon's analogy is very appropriate. There may be a gender gap with IT, but there also is with teaching, construction, nursing. However, I would not categorize these things as a problem. 

Statistically it would seem that interests between the majority of males and females are different. This is no cause for alarm. I think we are wasting time and resources by trying to make everything 50/50 when there isn't a detriment to the current scenario. If the status quo remains with the gender gap, what takes a hit? Can I get an outer perspective as to the harm this causes? This may help my understanding of why this might cause issue with some.

A better avenue to place time and resources would be gender inequality as it relates to pay. That should be the same for who ever is in that role, male or female. If the person has the same amount of experience, same responsibilities, and all other ancillary factors are congruent then the person should be provided the same compensation as their counterpart.
anon9675841497
anon9675841497,
User Rank: Apprentice
5/24/2014 | 1:47:26 PM
No problem
"there is a gender problem in IT"

 

No, there isn't. Why is it no one is writing stories about the "gender problem" with kindergarten teachers? Why can't people just accept the fact that women choose not to enter the field?
RetiredUser
RetiredUser,
User Rank: Ninja
5/23/2014 | 4:45:32 PM
FOSS and Women
As the father of two daughters, I take a real close look at the communities I'm a part of.  I'm thankful to be part of the Free and Open Source (FOSS) communities because I am always running into smart female hackers who work in the industry.  I don't claim that everything is perfect, but when I'm at the Southern California Linux Expo (SCALE) I'm constantly impressed by how many more professional women there are every year; and I'm not just talking about LinuxChix Los Angeles (who I love to death) but every other booth I stop at reflects a new dynamic from the stuffy male-driven conferences of the past. 

Now, I'm not saying that corporate IT environments and underground cyber communities are worse than FOSS when it comes to female equality (I can name many women in both thos environments that probably have set the tone for future increased female participation), but I have found that FOSS communities shine with smart and respected female hackers. 

As has always been the hacker tradition, I say "show me the code" should be the measuring stick in IT and whatever the gender, religion, sexual identity of the hacker in question, the code rules.  Maybe if we can follow that rule of thumb we can put bias of all types in IT behind us and start having more fun!

I hope we get there soon, too - my daughter turns seven soon and she's already got all the signs of being a great FOSS hacker.  She is currently editing her LibreOffice "Nature Explorer" database on her gNewSense-driven laptop with dreams and potential I never had at that age. 

Happy gender-neutral hacking!

 
Sara Peters
Sara Peters,
User Rank: Author
5/23/2014 | 11:22:34 AM
Re: Great column and thanks for sharing
@Marilyn  It's so true! Another thing in The Atlantic story was that women only asked for promotions when they were sure that they fulfilled 100% of the job requirements. Men asked when they fulfilled only 50%.
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
5/23/2014 | 11:01:13 AM
Great column and thanks for sharing
What struck me in your blog was the reference from The Atlantic cover story "The Confidence Gap." You wrote that there is evidence that "success, it turns out, correlates just as closely with confidence as it does with competence,"

It took me more than 50 years on this earth to realize that I was just as competent as many of my male peers in journalism. But the guys were always more confident about taking risks -- even for jobs they were barely competent in. It's something we gals need to keep in mind when considering opportunities that will make us stretch.

 

 
<<   <   Page 2 / 2


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1142
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL decoding to retrieve system files, credentials, and bypass authentication resulting in privilege escalation.
CVE-2023-1143
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
CVE-2023-1144
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access control vulnerability in which an attacker can use the Device-Gateway service and bypass authorization, which could result in privilege escalation.
CVE-2023-1145
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-DataCollect service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
CVE-2023-1655
PUBLISHED: 2023-03-27
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.