Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Closing the Gender Gap in Cybersecurity: 3 Critical Steps
Newest First  |  Oldest First  |  Threaded View
josephrovira
50%
50%
josephrovira,
User Rank: Apprentice
5/23/2016 | 5:06:16 PM
Re: Women in Cybersecurit
I have been in this field for 34 years now and I can't think of anything that was really exciting. I can find many times that I have felt sheer panic and a sense of dread, nothing exciting in a good way. However, I am glad you can perhaps share some of your moments of excitement that would hopefully sway a promising student to go into our field.

Honestly, the main reason that I am in this field is that I am very good at it. Though it may be that I have just become jaded with it since I have never found it very challenging.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/23/2016 | 1:53:08 PM
Re: Gender Gap
The way I want to take this is that gender gap is just one of the parameters, skills and abilities that women bring into IT sector is valuable. That is why more women in IT better outcome for IT departments.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/23/2016 | 1:49:42 PM
Re: Gender Gap
"... Would I like to see more women in the IT Security realm?  Of course. ..."

I agree. I see it as balance between different perspectives. Women could bring better insight and organized approach to IT departments
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/23/2016 | 1:46:06 PM
Re: Women in Cybersecurit
".. I know this job sucks when it comes to talking about what you do to anyone that is not a part of it ..."

I actually consider IT exciting. Especially last 20 years has been great and the progress that has been made in IT way overpassed all other major areas and it is exciting to be in IT.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/23/2016 | 1:42:43 PM
Re: Women in Cybersecurit
"It would be awesome to have more women in cybersecurity ..."

I would agree with this. Women being detail oriented and organized they would be quite successful in cybersecurity.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/23/2016 | 1:40:45 PM
Lack of Women in IT
For me, this starts from the early education and then the collage. There are not enough females in IT classes, so we do not expect there will be women in IT departments.
RyanSepe
100%
0%
RyanSepe,
User Rank: Ninja
5/23/2016 | 10:22:01 AM
Re: Gender Gap
You hit all the major points of what I have been saying for a long time. Aside from the fact that there are disparities in different industry sectors with all physical architypes, a crusade to close gaps for the wrong reasons could be detrimental to women who actually want to get into the cybersecurity field.
rstoney
50%
50%
rstoney,
User Rank: Strategist
5/23/2016 | 9:46:15 AM
Gender Gap
Perhaps I will be accused of being a luddite here, or not seeing "The Big Picture" -- but I really do not care about the gender gap.  

When I engage in my profession, either in person or online, during work hours or what I do on my own I really do not care about your chromosome composition.  What I care about is that you are highly proficent and willing to teach, proficient and willing to teach, or even just starting out and wanting to learn.  Or any place on the sliding scale.  Nodding towards current events - which bathroom you decide to use is inane useless details to me.

Would I like to see more women in the IT Security realm?  Of course.  Because that means we have a greater pool of what could be proficient people in an important field of work.  And that is the only point I care about.  

 
josephrovira
100%
0%
josephrovira,
User Rank: Apprentice
5/20/2016 | 3:29:56 PM
Women in Cybersecurit
It would be awesome to have more women in cybersecurity or in the information systems field in general. However, unlike what I am hearing about statistics and unbalanced gender representation, the real reason is that women are valuable in this field just by their ability to offer a rare but essential perspective that is often overlooked by any gender dominated field. I am well aware that cybersecurity and the IT profsession is not really "glamourous" or an exiciting field to be in and thus not appealing to many. Diversity in the cybersecurity field is key to an effective method to combat the constant asymmetrical threats that we face. We must be able to have the different persective that are offered by both genders and cultures in order to do the jobs we are genourously paid for. I know this job sucks when it comes to talking about what you do to anyone that is not a part of it, but that is the nature of our profession. You can always get involved in a decent hobby that you can talk to your friends about.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-38481
PUBLISHED: 2021-10-22
The scheduler service running on a specific TCP port enables the user to start and stop jobs. There is no sanitation of the supplied JOB ID provided to the function. An attacker may send a malicious payload that can enable the user to execute another SQL expression by sending a specific string.
CVE-2021-41744
PUBLISHED: 2021-10-22
All versions of yongyou PLM are affected by a command injection issue. UFIDA PLM (Product Life Cycle Management) is a strategic management method. It applies a series of enterprise application systems to support the entire process from conceptual design to the end of product life, and the collaborat...
CVE-2021-41745
PUBLISHED: 2021-10-22
ShowDoc 2.8.3 ihas a file upload vulnerability, where attackers can use the vulnerability to obtain server permissions.
CVE-2021-41747
PUBLISHED: 2021-10-22
Cross-Site Scripting (XSS) vulnerability exists in Csdn APP 4.10.0, which can be exploited by attackers to obtain sensitive information such as user cookies.
CVE-2021-36357
PUBLISHED: 2021-10-22
An issue was discovered in OpenPOWER 2.6 firmware. unpack_timestamp() calls le32_to_cpu() for endian conversion of a uint16_t "year" value, resulting in a type mismatch that can truncate a higher integer value to a smaller one, and bypass a timestamp check. The fix is to use the right endi...