NEWS, NEWSLETTERS, BLOGS & PODCASTS

Delivered

Extra extra – read all about us! Check out our recent press release, news coverage and more below.

News

View WiCyS press releases, articles & news mentions
Read news

Newsletters

Your way to stay up-to-date on all things WiCyS
Read newsletters

BLOGS

View what our members have to share
Read blogs

PODCASTS

Listen to informative podcasts featuring the WiCyS community
Listen to Podcasts

WiCyS featured on…

NEWS

NEWSLETTERS

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

BLOGS

Why Bug Bounty is Trending? (Shivyanshi Shukla)

Submitted by: Shivyanshi Shukla Bug bounty, a big name among cybersecurity analysts and tech giants, has gained tremendous fame over time. This article will help you know the reason behind the exponential rise in the popularity of bug bounty programs. But before I...

read more

How to Build Trusted AI (Karen Jensen)

Submitted by: Karen Jensen Siri, Sophia, Grace, Alexa, Cortana – the voices of Artificial Intelligence platforms are overwhelmingly created with a female sounding voice. Is this an example of how to build Trusted AI? Big Tech companies tell us that research (sometimes...

read more

WiCyS Annual Conference (Dawn Kristy)

We Did It! The WiCyS Annual Conference 2021 met live on September 8 through 10 in Denver!  Women in CyberSecurity (aka WiCyS) just wrapped up a live annual conference in Denver that exceeded everyone’s expectations! To capture the essence of #WiCyS2021, one must feel...

read more

All about My First Cybersecurity Conference (Kate Esprit)

Submitted by: Kate Esprit Overview Last week, I was one of the lucky 1,500 women to attend the annual conference hosted by Women in Cybersecurity (WiCyS), a global organization dedicated to the recruitment, retention and advancement of women in the cybersecurity...

read more

De-identification: The Risk of Un-regulation (Maria Sherlyn)

Submitted by: Maria Sherlyn Not enough regulation exists for personal data protection. Even the largest companies have proven themselves self-disciplined in protecting their consumer data in the cases of enormous data breaches and when sharing data with others.  The...

read more

Have a blog to share…

PODCASTS

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.