NEWS, NEWSLETTERS, BLOGS & PODCASTS
Delivered
Extra extra – read all about us! Check out our recent press release, news coverage and more below.
News
View WiCyS press releases, articles & news mentions
Read news
Newsletters
Read newsletters
BLOGS
View what our members have to share
Read blogs
PODCASTS
Listen to Podcasts
NEWS
12 Ways to Approach the Cybersecurity Skills Gap Challenge in 2023
A 2022 study from cybersecurity training and certifications non-profit the International Information System Security Certification Consortium (ISC)² found that the worldwide gap of cybersecurity workers totals 3.4 million. The need to fill those positions is unlikely...
Google Launches Entry-Level CyberSecurity Certificate To Teach Threat Detection Skills
By Michael Hill Google has announced a new entry-level cybersecurity certificate to teach learners how to identify common risks, threats, and vulnerabilities, as well as the techniques to mitigate them. Designed and taught by Google’s cybersecurity experts, the Google...
Computer Science Students Take First Place At CyberSecurity Competition
By Lisa Knebl At the Women in Cybersecurity (WiCyS) Colorado & Security Innovation Virtual Capture the Flag (CTF) in April, six students from Colorado State University’s WiCyS student chapter pit their cybersecurity skills against teams from around the nation in a...
Google Launches Cybersecurity Certificates for Entry-Level Workers
Google is expanding its Career Certificates program with a course in cybersecurity designed to teach newcomers to the field the basic skills necessary to work as an analyst. Phil Venables, chief information security officer at Google Cloud, said the course will teach...
The Systemic Barriers To Landing A Big Tech Internship
Farmer: One thing that I have heard is that recruiting budgets have been cut. And what that is going to mean is that the recruiting teams of companies aren’t going to have as much capacity to go beyond a handful of schools. And that’s where we start to have a...
GISF signs MoU with WiCyS West Africa to promote cybersecurity awareness
The Ghana Internet Safety Foundation (GISF) has signed a Memorandum of Understanding with the Women in Cybersecurity (WiCyS) West Africa, an affiliate of Women in Cybersecurity (WiCyS) Global. The partnership is to boost collaboration between the two parties as they...
Women in Cybersecurity Still Fight for Inclusion Despite the Talent Shortage
The cybersecurity field is riddled with stringent job descriptions that can alienate applicants across technical and non-technical roles. It’s also contributing to a broad gender imbalance. A global cybersecurity talent shortage continues to put networks and...
What’s Really Causing the Cybersecurity Gender Gap?
People, more than policies, are to blame for experiences of exclusion, according to Women in CyberSecurity research. Cybersecurity has a talent gap that may only get bigger as the industry races to catch up with continually more sophisticated cyber threats....
Women Feel Excluded in Cybersecurity Roles, Study Says
A lack of career and growth opportunities, as well as a lack of respect from company leadership, direct managers and peers may hold women back in the industry. Women in the cybersecurity industry experience workplace situations that contribute to an overall feeling...
How to Encourage Diversity in Cyber Security
In this exclusive interview ahead of her session at Cyber Security Hub’s All Access: Cyber Security Global, executive director of Women in Cyber Security (WiCyS) Lynn Dohm shares her views on why diversity is integral to cyber security and how to encourage this within...
BLOGS
Dissecting Imposter Syndrome by Dr. Dawn Beyer, Lockheed Martin Senior Fellow and WiCyS Board Member (Dawn Beyer)
Submitted by: Dawn BeyerHave you ever experienced "imposter syndrome" or felt like you don't have the knowledge for your role? Oh, yes!First, what is Imposter syndrome? According to Merriam-Webster Dictionary, Imposter Syndrome is a psychological condition that is...
My Time At WiCyS (Women in CyberSecurity) Cleveland 2022 (April Hubbard)
Submitted by: April Hubbard From Thursday, March 17th, 2022, until Saturday, March 19th, 2022, I attended my very first WiCyS (Women in CyberSecurity) conference, and let me just tell you in one word how this conference went --- Phenomenal! WiCyS (Women in...
There is no substitute for a CISO…or is there? (Pam Lindemoen)
Submitted by: Pam Lindemoen You haven’t had an uninterrupted vacation in years, your presentation at the last board meeting fell short, and it’s hard for you to imagine how the organization would function without you at the helm. These are all very real situations...
DevSecOps-Making a difference from traditional DevOps (Noel Varghese)
Premise The problem with programming in its initial phase was its inconvenience in not being able to collaborate with fellow programmers and bringing better logic and implementation to the fore. Earlier, software only required annual updates or quarterly maintenance...
Women in CyberSecurity (WiCyS) Security Training Scholarship Program (Dominique Serna)
Women in CyberSecurity (WiCys) Established in 2012 by Dr. Ambareen Siraj of Tennessee Tech University through a grant from the National Science Foundation, Women in CyberSecurity (WiCyS), a global community of women and men, is thriving, fulfilling our spirit...
GFACT (GIAC Foundational Cybersecurity Technologies) Certification (Sakshi Aggarwal)
Submitted by: Sakshi Aggarwal Recently I passed, GFACT (GIAC Foundational Cybersecurity Technologies) Certification provided by Global Information Assurance Certification (GIAC). In this article I will be writing about: What is GFACT certification and what areas does...
Two Military Veterans, Two Pathways to Cyber Women in Cybersecurity (WiCyS) Lockheed Martin Affiliate (WiLMA) article (Joann Gerena and Jaidie Vargas)
Joann Gerena and Jaidie Vargas are members of the Women in CyberSecurity (WiCyS) organization and cybersecurity professionals at Lockheed Martin. Their stories are similar but uniquely different – both starting their post-high school journeys by sampling college and...
What Is an Information Security Analyst? What Do They Do? (Kerry Halladay)
Submitted by: Kerry Halladay More a jack-of-all-trades role than a specific title, information security analysts keep people, organizations, and their data safe. Though the title “information security analyst” — or the often synonymous cybersecurity analyst — might...
Parenthood to Pentester: Insights from a Woman in Cybersecurity (Dru Macasieb)
Submitted by: Dru Macasieb, WiCyS San Diego Affiliate Earlier this year, I had the honor of interviewing Jennifer “Jen” Bate, a parent turned professional penetration tester who happens to be a woman in cybersecurity. But don't call her a professional pentester,...
Why Bug Bounty is Trending? (Shivyanshi Shukla)
Submitted by: Shivyanshi Shukla Bug bounty, a big name among cybersecurity analysts and tech giants, has gained tremendous fame over time. This article will help you know the reason behind the exponential rise in the popularity of bug bounty programs. But before I...
Have a blog to share…
PODCASTS
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.