Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
What Women in Cybersecurity Really Think About Their Careers
Newest First  |  Oldest First  |  Threaded View
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
8/7/2017 | 3:28:50 PM
Re: Are we equal yet?
@SchemaCzar It's likely that you haven't seen "anti-woman prejudice" because you haven't experienced it firsthand like many women in this industry do. The goal of Wong's report was to highlight how women who are in this industry feel about their jobs and their roles in the industry despite implicit biases they and minorities face on a regular basis. It's not meant to be a jab at men or "old-boy exclusiveness" as you described, but instead to be honest and open about these experiences and what can be done to foster a more inclusive environment. Awareness of biases we all have is key to opening the door for more talent in the industry.

The report had a positive spin indeed because many women are proud of the work they do and the contributions they make to the industry. That should speak for itself on how they are an important "subgroup" of the security profession. 
GonzSTL
100%
0%
GonzSTL,
User Rank: Ninja
8/7/2017 | 1:53:35 PM
Re: Are we equal yet?

I was on a panel a few weeks ago in a discussion about Diversity in IT that included, besides myself, 3 women: 2 CIOs and a managing principal for an IT staffing firm. The discussion was quite eye opening, and a lot of it centered on a person's life balances as a huge factor in choosing their profession. The question was not really whether or not we are equal, but instead revolved more around the circumstances that heavily influenced decisions, and what would be a better fit in their family life. Although I readily admit that IT security (really, IT in general) has since the beginning been a male dominated discipline, I'm not sure that disparaging attitudes towards women in IT are prevalent and cause their lack of representation.

I am glad that the author touched on the pipeline problem. We must find a way to inspire girls and young women to consider a career in cybersecurity (really, IT in general). In the USA, almost 47% of the workforce are women, and if only 11% in the (cybersecurity) industry are women, then we have a serious issue because we are missing out on a very large group of people. I'm not saying that we must necessarily have 47 %, but surely something larger than 11%. Peer and societal pressures play such a heavy role on career selections, and those are the toughest to overcome. It would be good for women in cybersecurity to share their stories so that women can be inspired to pursue that career. Those stories should be heard by girls at an early age, as stereotypical images are formed at earlier ages these days.

SchemaCzar
50%
50%
SchemaCzar,
User Rank: Strategist
8/7/2017 | 12:34:05 PM
Are we equal yet?
I'm really not sure why I'm still seeing articles about women as an important subgroup in this profession because of their gender.  In my entire professional life, I've seen only a handful of real anti-woman prejudice events and a ton of scrupulous even-handedness. I am glad that Wong seems to see "improvement," because sometimes  articles with such topics can seem like veiled accusations of old-boy exclusiveness.  But this article still doesn't help me at all in my security work and research.

I will say this:we need a boatload of additional security professionals whatever their demographics.


COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
'BootHole' Vulnerability Exposes Secure Boot Devices to Attack
Kelly Sheridan, Staff Editor, Dark Reading,  7/29/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-16192
PUBLISHED: 2020-08-05
LimeSurvey 4.3.2 allows reflected XSS because application/controllers/LSBaseController.php lacks code to validate parameters.
CVE-2020-17364
PUBLISHED: 2020-08-05
USVN (aka User-friendly SVN) before 1.0.9 allows XSS via SVN logs.
CVE-2020-4481
PUBLISHED: 2020-08-05
IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 7.0.3.0, and 7.0.4.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 181848.
CVE-2020-5608
PUBLISHED: 2020-08-05
CAMS for HIS CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01 allows a remote unauthenticated attacker to bypass authentication and send altered c...
CVE-2020-5609
PUBLISHED: 2020-08-05
Directory traversal vulnerability in CAMS for HIS CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01 allows a remote unauthenticated attacker to cre...