Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
How to Crack Cybersecurity’s Glass Ceiling
Newest First  |  Oldest First  |  Threaded View
techelek
techelek,
User Rank: Apprentice
4/13/2017 | 9:28:46 AM
Read advice
As a woman working in the IT and cybersecurity industry for over 15 years, I can tell you the glass ceiling is real and that I am treated differently than my male co-workers in the workplace. I am treated differently because of social norms and how men are used to relating to women. Men initially interact with me as if I'm either their mother or their wife/girlfriend. It takes some months to set the working relationship into the only-professional relation which men automatically assume with each other. 

That aside, I don't think this article was helpful at all and in fact hurts how people interact at work. First off, the author is representing women's rights against her will or "whether I like it or not", so she's definitely not passionate about the subject. And why should she be? She had support to enter a technical career since she was a little girl and she doesn't experience the glass-ceiling on a daily basis. I can't think of a less qualified person to give me advice. As for earplugs when can't or don't is said, should I wear ear plugs when I am told I can't attend the meeting or we don't need your input? Or should I put them in when I'm told I can't expect that pay raise and don't even think about negotiating for better pay? Is that when I become silent and deaf? And did you seriously just pull the "women's intuition" card? Is that my super power? Should I intuit how my router is configured or if my server room door meets physical security standards? No, that's called work, education, attention to detail; all the same things my male co-workers have and do. That kind of stereotypical rhetoric will only continue the idea that men and women posses unique traits which make them uniquely unqualified to do certain kinds of work. Do Jewish people have a mathematical intuition and white men have no intuition of rhythm? I mean, let's double down on those stereotypes! 

You want some advice. Here. Pretend it doesn't matter. Pretend you don't notice. All the routers have the password "crackwhorz"? Don't bat an eye. Do conversations fall silent when you arrive? Don't miss a beat. Are you not invited to Friday's lunch at the local strip club, where they apparently have an amazing buffet? Bring your lunch on Friday's. Wave after wave of bulls***- let it go. There's another woman right behind you, drafting off your progress. Do it for her sake, if you can't do it for own.
PaTr10t
PaTr10t,
User Rank: Strategist
4/11/2017 | 2:28:38 PM
Inaccurate Op-Ed
At it's premise, I get the basic intent of this piece, yet after reading through it a few times I find myself disagreeing with many of the points within. Simply because an industry is populated by more males than females does not necessarily correlate to an existence of a "glass ceiling" within that realm. With specific regards to this continual reference to a wage gap, which, thanks to the Equal Pay Act of 1963, is a complete null-issue.

Where the thin argument comes from stating that women earn a mere .75 cents to every dollar that a man does, comes from a skewed and cherry-picked array of data. Meaning, people are comparing a female with less than a year at an entry level IT position to a male with 40 years and is a CEO. Thanks to the Equal Pay Act of 1963, paying someone less because of their gender for doing the SAME job is federally illegal.

As to your point about more women working lower paying jobs than men, here's a few reasons straight from U.S Bureau of Labor Statistics:

-Men choose jobs that are more dangerous / time intensive / physically demanding.

-Males are more likely to work in less desirable locations

-Men work longer hours, the weekends / holidays

-Men are more likely to pursue higher-stress / higher-paying specializations.

What does this imply? This is what men "choose" to do, while women choose to go other routes based on comfort, fullfillment, autonomy and safety. Nursing, teaching, social sciences, fashion, retail etc. Also, unmarried females make statistically MORE than unmarried males across the board.

Secondly, the cybersecurity industry, in the grand scope of the field, is a fairly young discipline. Specifically, to how it exists today. I realize components of it have been around for many years, cryptography, risk management, physical security and etc. Yet as it is today, its combined application as a suite of tools is young comparatively. That being said, the lack of women within this field does not correlate to some unified oppressive front to prevent them from joining, and benefitting, this industry.

They are simply *choosing* not to at this point, in a substantially less amount that men *are*.

Third, women have the exact same rights as men do in the U.S. Period. Again, it is federally illegal if any entity, in any capacity, to exclude or prevent them from doing so. Staing you're a women's rights activist within the IT industry..for what? You point out any specific instance of a woman being denied pay, training, opportunities or promotion based solely on the fact of her gender and I'm right there with you in the fight. Until then, please let me know what rights are being infringed upon that require such activism?

Yet another point of contradiction I read was your closing paragraph versus the one before it that stated the need for a plethora of programs aimed at females for STEM. You encourage women to believe in themselves, self-motivate, and ignore others' attitudes..but say they should have their own preferential programs? Does that not, at its very core, undermine the entire premise of gender equality? If a male or a female are competing for the same spot in a cybersecurity firm, shouldn't the position be awarded to the one most technically proficient? Saying women require their own special programs seems to damage their case more than enhance it.

In the end, your successes and hard work are more of an example to emulate as well as being a beacon to women not yet in the industry, than saying they are doomed to be crushed under a glass ceiling that, quite frankly, exists because people keep stating it does.

Also, the entirety of this article lost its punch with me when you added "You have to believe you are just as good as men, and maybe better because of women's intuition". Again, it undermines premise of equality by implying a genetic advantage, and also, further perpetuates the notion of "us vs them". Which is incredibly dangerous and divisive in itself. When it should be all of *us* in cyber security are versus *them* trying to break our systems and companies.. 

 
JulietteRizkallah
JulietteRizkallah,
User Rank: Ninja
4/11/2017 | 12:50:02 PM
Israel does it right
When it comes to women in Cybersecurity or Hight Tech, Israel does it right. Having worked as an executive for several years in an Isareli Security company, i have seen it first hand: there is there no difference between what a woman or a man can achieve in Isreali executives' mind.  It is rooted in the country traditions: after all, women  have to do military service.  There is no "light" treatment of women for hard tasks if they are up for them, nor for technical tasks.  Parents and teachers support them, through strong training and by building character.  I believe it starts with parenting, pushing our daughters and sons similarly through all tasks and developing their determination so that they reach the goals they want to achieve. 
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
4/11/2017 | 11:16:35 AM
Stats
Thanks for sharing the stats from the EEOC.  I have seen a variety of statistics putting women in tech at 15 percent to 50 percent and everywhere in between.  It'd be nice to have hard data with transparent methodology on this.
vinderofficial
vinderofficial,
User Rank: Apprentice
4/10/2017 | 5:45:21 AM
SSC Exam Calendar 2017
Staff Selection Commission Board has recently released a notification for the latest Exam Calendar for the year 2017. All the exam will be conducted through the SSC Exam Calendar 2017.

SSC Exam Calendar 2017
vinderofficial
vinderofficial,
User Rank: Apprentice
4/10/2017 | 5:44:19 AM
SSC Exam Calendar 2017
Staff Selection Commission Board has recently released a notification for the latest Exam Calendar for the year 2017. All the exam will be conducted through the SSC Exam Calendar 2017.

SSC Exam Calendar 2017
cybersecfem
cybersecfem,
User Rank: Apprentice
4/6/2017 | 4:37:18 PM
Thank you!
Being a female in a Cybersecurity program, I have felt the pressures of being in a male-dominated field already. Although I feel very comfortable around men, being no stranger to this atmosphere in prior career paths I have chosen, I feel a very intense pressure to have to prove myself in this field already. I thank you for writing this article, it has given me a new sense of determination and confirmation that I have made the right decision by going choosing this field of study.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file