Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Millennials Not Pursuing Cybersecurity Careers
Oldest First  |  Newest First  |  Threaded View
Page 1 / 3   >   >>
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
10/26/2015 | 11:13:51 PM
yup
Not that surprising, really.  Security has always been far less of a draw than other cyber roles -- and it's why good security is often lacking in many tools and environments.  Programmers usually want to work with features -- not security.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
10/27/2015 | 8:49:31 AM
Re: yup
Can't really blame programmers for being programmed that way. All kidding aside, the features are the core concept of technology its when we fail to ingrain security with them in the SDLC that we run into issues. But make no mistake, without the features there wouldn't be any security to apply.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
10/27/2015 | 9:39:28 AM
Re: yup
I speak to as many college students as I can about the opportunities in cybersecurity. But they all seem to be focused on coding, coding, coding, and few have any knowledge or insight into the security piece of that puzzle, nor the security industry itself. 
geriatric
100%
0%
geriatric,
User Rank: Moderator
10/27/2015 | 10:09:43 AM
Focus on the Solution
Invariably in these discussions, the gender gap is seen as some sort of problem that needs fixed. But why must we refuse the response of many women who say "I'm just not interested" without the reply being "But we have to find some way to MAKE you interested!". There's nothing inherently deficient about preferring one choice over another. Instead, focus on the characteristics that make for an effective cybersecurity professional, and target those individuals, regardless of irrelevant categories like race, gender, religion, sexual orientation or political party.
JimmyW414
0%
100%
JimmyW414,
User Rank: Apprentice
10/27/2015 | 2:53:15 PM
Re: yup
A big part of work for women is looking for a date. The IT field has the stereotype of being full of male geeks.
Marilyn Cohodas
100%
0%
Marilyn Cohodas,
User Rank: Strategist
10/27/2015 | 3:12:24 PM
Re: yup
I'm not a millennial but I certainly  speak for the vast majority of my female peers whose reason for working in IT has nothing to do with dating!  Think challenging work, good pay, opportunity in a growing field. Ladies, speak up!
Marilyn Cohodas
100%
0%
Marilyn Cohodas,
User Rank: Strategist
10/27/2015 | 3:12:35 PM
Re: yup
I'm not a millennial but I certainly  speak for the vast majority of my female peers whose reason for working in IT has nothing to do with dating!  Think challenging work, good pay, opportunity in a growing field. Ladies, speak up!
David Mudkips
100%
0%
David Mudkips,
User Rank: Apprentice
10/27/2015 | 3:23:34 PM
Re: yup
Not surprising with the heavy handed way young hackers are treated these days, putting them in prison or giving them a criminal record isn't going to encourage a new generation. You don't get any good at cybersecurity without breaking a few laws first.
fl0w3r
50%
50%
fl0w3r,
User Rank: Apprentice
10/27/2015 | 5:09:41 PM
Re: yup
You can learn hacking/pen testing without breaking the laws. That is what Google and capture the flags are made for. Also, set up VM's and have one as the victim and the other as an attacker. Then get books about hacking and practice the techniques with your VM's.
fl0w3r
50%
50%
fl0w3r,
User Rank: Apprentice
10/27/2015 | 5:18:35 PM
Re: yup
I didn't know much about security while I was in my university. Most courses weren't focused on it. It wasn't until I saw people using a web debugging proxy to steal digital goods that I was interested. I wasn't about to make a game and have all my work for nothing if people could just not pay for it. So I learned what people do to attack programs. Show them the significance of buffer overflow vulnerabilites, format string vulnerabilities, sql injection, etc, by showing how easy it is to do, and they might listen. I suggest picoctf dot com 2013:Toaster Wars and picoctf dot com 2014. It's a high school ctf, but it teaches what attackers do.
Page 1 / 3   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-42258
PUBLISHED: 2021-10-22
BQE BillQuick Web Suite 2018 through 2021 before 22.0.9.1 allows SQL injection for unauthenticated remote code execution, as exploited in the wild in October 2021 for ransomware installation. SQL injection can, for example, use the txtID (aka username) parameter. Successful exploitation can include ...
CVE-2020-28968
PUBLISHED: 2021-10-22
Draytek VigorAP 1000C contains a stored cross-site scripting (XSS) vulnerability in the RADIUS Setting - RADIUS Server Configuration module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the username input field.
CVE-2020-28969
PUBLISHED: 2021-10-22
Aplioxio PDF ShapingUp 5.0.0.139 contains a buffer overflow which allows attackers to cause a denial of service (DoS) via a crafted PDF file.
CVE-2020-36485
PUBLISHED: 2021-10-22
Portable Ltd Playable v9.18 was discovered to contain an arbitrary file upload vulnerability in the filename parameter of the upload module. This vulnerability allows attackers to execute arbitrary code via a crafted JPEG file.
CVE-2020-36486
PUBLISHED: 2021-10-22
Swift File Transfer Mobile v1.1.2 and below was discovered to contain a cross-site scripting (XSS) vulnerability via the 'path' parameter of the 'list' and 'download' exception-handling.