Tribe of Hackers is a must-have resource for security professionals who are looking to advance their careers, gain a fresh perspective and get serious about cybersecurity with thought-provoking insights from […]
What exactly is security logging and monitoring for an organization? Join Women in CyberSecurity (WiCyS) strategic partner, The Home Depot, as Lu Qiao, principal systems engineer, dives into the key […]
WiCyS Equity Advocacy Committee Meeting: Every month the WiCyS Equity Advocacy Committee (EAC) meets to help lead the WiCyS organization to ensure the nonprofit continues to lead internally and externally […]
West Village Residence Complex H, 440 Huntington Ave,Room 366, Boston, United States
We're excited to announce a collaboration between the New England WiCyS chapter and Northeastern's WiCyS chapter! We'll be bringing a mock security interview event to Northeastern on Monday, January 30 […]
Cyber attacks are rising against critical infrastructure systems and have serious implications for our national security. In addition, many interconnected systems are becoming increasingly cyber-physical due to modernization efforts. For […]
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.