Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Dark Reading Radio: Breaking the Glass Ceiling in InfoSec
Newest First  |  Oldest First  |  Threaded View
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
6/12/2014 | 10:00:08 AM
Thanks to all for a fantastic radio show and discussion.
You can still listen to the broadcast and read (and add to the commentary. Just go to our Dark Reading Radio studio and start the audio player. 
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
6/11/2014 | 10:54:36 AM
Link to the Radio Show
We're just a few hours away from today's Radio Show. Here's the link to our studio where you can listen to the panel discussion and chat live with your peers. 

http://www.darkreading.com/radio.asp?webinar_id=93

See you at 1 pm ET/10 am PT. 
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
6/10/2014 | 3:52:21 PM
Re: Question to the Panelists
Looking forward to "seeiing" some new names & "faces" tomorrow for our Radio Show but if our date and time doesn't fit into your schedule please be sure to post your comments or questions here. Of course, we are an equal opportunity radio broadcast so if you aren't a woman in IT but work with one, are friends with one, or are related to one, we welcome you to the discussion as well.
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
6/9/2014 | 11:50:19 AM
Re: Question to the Panelists
Thanks for the clarifications. I'll make sure that gets asked during the broadcast or text chat on Wednesday. I hope you can make it -- then you can ask it yourself.

Marilyn
SecOpsSpecialist
SecOpsSpecialist,
User Rank: Moderator
6/9/2014 | 11:48:08 AM
Re: Question to the Panelists
Marilyn,

What I'm asking specifically is in their experience, they may have run into the perpetual issue where others in the field, or customers, do not believe that they have the technical chops to know what they are talking about, as such, how have they dealt with that adversity? What did they do to overcome it? How did they not let it bother them?

 

Sorry, should have been a touch more specific.
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
6/9/2014 | 11:41:47 AM
Re: Question to the Panelists
Thanks for your comment and question @SecOpsSpecialist.  I'm a little unclear about what you are asking. Do you mean your male colleagues don't think you have the appropriate knowledge and understanding of the job and the underlying technology? 

 
SecOpsSpecialist
SecOpsSpecialist,
User Rank: Moderator
6/9/2014 | 11:21:46 AM
Question to the Panelists
As a female security professional, I've been finding this one common theme in the computer STEM field:

Women are not expecting to know anything about their job or how a computer works.

 

As women in the Security field and the computer field which is male-dominated, how do you respond when you have to interact with someone who clearly views you as inferior to them? How do you get around it?
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
6/9/2014 | 9:38:59 AM
Re: Lysa Myers
Thanks for your comment, @christianbryan! This is indeed  great panel and it's one hat is open to everyone -- not just for women in InfoSec. Fathers, brothers and colleagues of women in InfoSec. Please come and add your voice and views to the discussion.

 
RetiredUser
RetiredUser,
User Rank: Ninja
6/7/2014 | 10:10:23 AM
Lysa Myers
I look forward to this, especially for Lysa Myers.  I've been following her writing and enjoy her style.  This is a great panel and, as I've noted in the past, as a father of daughters - one of whom is demonstrating high-tech abilities already - I'm really happy to see role models out there to reference if either of my girls chooses a professional path in tech.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1172
PUBLISHED: 2023-03-17
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that w...
CVE-2023-1469
PUBLISHED: 2023-03-17
The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pec_coupon[code]’ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenti...
CVE-2023-1466
PUBLISHED: 2023-03-17
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as critical. This issue affects the function view_student of the file admin/?page=students/view_student. The manipulation of the argument id with the input 3' AND (SELECT 2100 FROM (SELECT(...
CVE-2023-1467
PUBLISHED: 2023-03-17
A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file Master.php?f=delete_img of the component POST Parameter Handler. The manipulation of the argument path with the input C%3A%2Ffoo.txt le...
CVE-2023-1468
PUBLISHED: 2023-03-17
A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=reports&date_from=2023-02-17&date_to=2023-03-17 of the component Report Handler. The manipula...