Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
How to Build a Path Toward Diversity in Information Security
Newest First  |  Oldest First  |  Threaded View
RetiredUser
50%
50%
RetiredUser,
User Rank: Ninja
7/31/2017 | 12:29:59 PM
Long-term Effects of Gender Diversity
I've worked over a decade in an environment of deep diversity.  At all levels of management and labor, we have vastly diverse backgrounds in education, religious beliefs, nationality and gender.  As a techie I've worked at plenty of organizations that had what has now become the stereotypical view of software company employees on comedy shows.  Not here.  And after over a decade working with, under and over female employees I can say that the long-term effects of gender diversity are, in fact, not bad at all.  As the father of two daughters, I can finally assure my girls there is a place they can thrive, be seen as potential leaders and innovators and not be restricted by gender perceptions.  I hope for that throughout the whole tech industry.  Interacting with vendors across the industry, I feel that this is slowly changing; some of the most talented hackers I've worked with are women, and it doesn't take long after working with them to reach that "gender neutral" state because, big surprise, men and women in tech are ultimately different sides of the same coin.  Go figure.  
Carter25
0%
100%
Carter25,
User Rank: Apprentice
7/28/2017 | 9:15:19 AM
In Your Shoes
Currently as a woman, as the [only] security administrator, team of all men.. I face this every day. 

"Not being able to speak up becuase of always being dismissed." portion. My last two jobs. Im young. I'm blonde. I'm not taken seriously. And I'm shut down by others consistantly, from multiple teams. This is more frequent than people know.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-21933
PUBLISHED: 2022-01-21
ASUS VivoMini/Mini PC device has an improper input validation vulnerability. A local attacker with system privilege can use system management interrupt (SMI) to modify memory, resulting in arbitrary code execution for controlling the system or disrupting service.
CVE-2022-0326
PUBLISHED: 2022-01-21
NULL Pointer Dereference in Homebrew mruby prior to 3.2.
CVE-2022-22930
PUBLISHED: 2022-01-21
A remote code execution (RCE) vulnerability in the Template Management function of MCMS v5.2.4 allows attackers to execute arbitrary code via a crafted payload.
CVE-2022-23314
PUBLISHED: 2022-01-21
MCMS v5.2.4 was discovered to contain a SQL injection vulnerability via /ms/mdiy/model/importJson.do.
CVE-2022-23315
PUBLISHED: 2022-01-21
MCMS v5.2.4 was discovered to contain an arbitrary file upload vulnerability via the component /ms/template/writeFileContent.do.