Submitted by: Alexis CulpWe have been facing a cybersecurity talent shortage in this industry since the industry was born. As time elapsed, we started integrating more and more of our businesses and lives around the internet, which allowed for more vectors of...
Submitted by: Kate Esprit & Meghan Jacquot Overview: LAPSUS$ Group What does Microsoft, Samsung, T-Mobile, Okta, and the Brazilian Ministry of Health all have in common? All of these entities have fallen victim to cyberattacks by the LAPSUS$ hacking group. LAPSUS$...
Submitted by: Jo Anna Parker Martin When I look for cybersecurity books to review I specifically keep an eye out for books written by women and minorities for a broad range of perspectives. This one caught my interest with its strong title and black minimalist cover....
Submitted by: Yansi Keim Hello all, thanks for visiting this article. I am Yansi Keim (former President of WiCyS Purdue University Chapter). Today, I am sharing my experience and advice on running a successful and engaging Women in Cybersecurity (WiCyS) Chapter. My...
Submitted by: April Hubbard During the final keynote of WiCyS 2022 in Cleveland, Ohio, we all had the wonderful pleasure of hearing some of the stories of individuals and what WiCys means to them. They joined the stage while “Can’t Stop This Feeling” by Justin...
Submitted by: Dawn BeyerHave you ever experienced “imposter syndrome” or felt like you don’t have the knowledge for your role? Oh, yes!First, what is Imposter syndrome? According to Merriam-Webster Dictionary, Imposter Syndrome is a psychological...