Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
It's Time To Address The Cybersecurity Gender Gap Before It's Too Late
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
lorraine89
50%
50%
lorraine89,
User Rank: Ninja
11/9/2016 | 9:09:46 AM
Cyber security
Cyber security is something so important and yet it has been totally ignored and neglected by the millennials and all. It is important to start securing our IP addresses from possible data hacks or IP tracking services. I use PureVPN US server to anonymize my IP address and to securely browse the web without anyone snooping me around. 

https://www.purevpn.com 
lorraine89
50%
50%
lorraine89,
User Rank: Ninja
11/9/2016 | 9:09:21 AM
Cyber security
Cyber security is something so important and yet it has been totally ignored and neglected by the millennials and all. It is important to start securing our IP addresses from possible data hacks or IP tracking services. I use PureVPN US server to anonymize my IP address and to securely browse the web without anyone snooping me around. 

https://www.purevpn.com 
misty0219
0%
100%
misty0219,
User Rank: Apprentice
11/8/2016 | 12:34:31 PM
Re: Edit requested
I couldn't agree more. I'm currently in the process of focusing much more on cybersecurity and it's not a walk in the park without guidance. Luckily, I'm used to the struggle of being a woman in the field so it's tolerable. Finding a female mentor is challenging and, while I hate to say it, I've had more support from the males throughout my whole career. The very simple fact of the matter is, the women that are in the roles to offer guidance usually don't. Change starts with other women in the field and nobody else. 
BrooklynNellie2
50%
50%
BrooklynNellie2,
User Rank: Strategist
11/4/2016 | 9:34:17 AM
Are Women Smarter?
As evidenced by their avoidance of this boring and thankless job, I have to conclude that the answer is "yes".
rstoney
100%
0%
rstoney,
User Rank: Strategist
11/3/2016 | 9:26:15 AM
Qualified people > Gender Gap
My work in the IT Security field is more focused on the technical aspects.  As such I tend to care not a bit about your gender.  As a co-worker - I care about the quality of your work and your knowledge.

If you are better than I - I will learn from you

If you are about equal - we can learn from each other

If I am better than you - I will teach you.

I don't care if you are male/female.  It won't matter to me if you color your hair chartreuse. (although I will tease you about it) I don't care about your age.  

 

This "gender gap" worry is inane.  I am dramatically more concerned with "skilled people"   As should you be.
DavidA833
67%
33%
DavidA833,
User Rank: Apprentice
11/3/2016 | 7:46:56 AM
Re: Gebder Bias
Is this even a serious post?  We have barely a soul in the cybersecurity inductry, and the person is screaming gender biased?  Give the industry a chance to even start before you start decrying its failures.

You must have al daughters - or your wife is mad at you.
banasidhe
50%
50%
banasidhe,
User Rank: Apprentice
11/3/2016 | 2:05:15 AM
Edit requested
FTFY

 

Women currently working in the sector can provide valuable guidance, acting as mentors to the next generation of potential cybersecurity workers. Cybersecurity professionals such as Google's Parisa Tabriz and Katie Moussouris (who helped launched Microsoft's bug bounty program) can help promote a healthy image of women thriving in the sector, reshaping public perception of what a security expert looks like.
<<   <   Page 2 / 2


COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Cybersecurity Bounces Back, but Talent Still Absent
Simone Petrella, Chief Executive Officer, CyberVista,  9/16/2020
Meet the Computer Scientist Who Helped Push for Paper Ballots
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: Exactly
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-6564
PUBLISHED: 2020-09-21
Inappropriate implementation in permissions in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to spoof the contents of a permission dialog via a crafted HTML page.
CVE-2020-6565
PUBLISHED: 2020-09-21
Inappropriate implementation in Omnibox in Google Chrome on iOS prior to 85.0.4183.83 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
CVE-2020-6566
PUBLISHED: 2020-09-21
Insufficient policy enforcement in media in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
CVE-2020-6567
PUBLISHED: 2020-09-21
Insufficient validation of untrusted input in command line handling in Google Chrome on Windows prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
CVE-2020-6568
PUBLISHED: 2020-09-21
Insufficient policy enforcement in intent handling in Google Chrome on Android prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.