Profiles of five women who are advancing the IT security field through their advocacy, legal expertise, engineering acumen and entrepreneurial efforts.
We enlisted a team of moderators to ask a number of prominent IT security professionals about the challenges they faced as a woman entering the field, the prejudices they deal with every day and the skills they use to navigate within their business.
Welcome to the second annual Women in IT Security issue.
Veteran female executives, as well as women new to IT security, are looking to blaze their own trail, reports Karen Epper Hoffman.
Women take a stand against revenge porn and implore the security community to help protect the public. Danielle Walker reports.
These 10 women were selected for their longstanding contributions to the IT security space.
Much of the road to diversity still stretches out in front of Silicon Valley firms where women are very clearly still in the passenger seat, reports Teri Robinson.
This is an exciting - albeit overwhelming - time for security pros, says Daniel Polly.
The DHS has been thrust into the midst of threat intelligence sharing. But will Corporate America embrace the effort? Lee Sustar reports.
Sign up to our newsletters
SC Magazine Articles
- Oracle PeopleSoft attack could enable big data breaches
- Zero-day in Fiat Chrysler feature allows remote control of vehicles
- Cyber attack on U.S. power grid could rack up $1 trillion in losses, study says
- All smartwatches are vulnerable to attack, finds study
- 'GSMem' malware designed to infiltrate air-gapped computers, steal data
- Nearly 90 percent of Android devices vulnerable to endless reboot bug
- VPN gone bad: APT actors enlist Chinese 'Terracotta' provider to hide criminal activity
- Zero-day exploit hits fully patched Macs
- Harman Kardon claims only Chrysler vehicles may have vulnerable system
- Government 'Cybersecurity Sprint' spurs agency authentication measures