Google

Spectre And Meltdown Vulnerabilities. Happy New Year!

Intel has confirmed findings by researchers (including from Google’s Project Zero) that the design of chips from Intel, AMD and ARM has – for more than a decade – permitted hackers to access memory on billions of business and consumer devices. So what, you ask? This is what.

So, How Does Machine Learning Apply To Cyber Security?

There has been a great deal of attention paid to the advantages of machine learning in security tools lately. And while it shows a great deal of promise, the reality is alone, machine learning is not enough to consistently and accurately detect, prevent or predict threats and is prone to false-positives. When considering how to reduce the overall threat exposure window, organizations need to understand how, only when combined with additional technologies, machine learning can be effective.

Your Blockchain Might Be Dead - and Alive - on Arrival

Government and business leaders in every corner are experimenting with blockchain solutions. But these projects face the risk of becoming dead-on-arrival if their designers fail to prepare for the looming threat of quantum computers.

Women in Cybersecurity (WiCyS) Conference Recap

An embedded systems security researcher at Cisco, Jennie Kam provides a recap of the Women in Cybersecurity (WiCyS) Conference. Her highlights include a motivating talk from DEF CON Kids co-founder and teenage hacker, career guidance sessions from government, corporate and academia, a bold and refreshing Facebook panel, and several InfoSec workshops like the one led by Google.

What Could Be the Mysterious Reason Why Girls Are Not Interested in Tech Careers?

When a girl gets a Computer Engineer Barbie who needs the help of two boys to code, that sends a very clear message to her. Barbie may be modeled on life, but Mattel must realize that it needs to ensure that it models the doll on relevant, inclusive, diverse life.

And Then, Suddenly, Women Stopped Coding. What Happened in 1984?

From ‘Dreamtime Barbie With Her Cuddly Bear’ to ‘I Can Be Computer Engineer Barbie,’ we’ve come a long way in showing girls what they can aspire to. So why has the number of women studying computer science been steadily declining since 1984?

8 Companies with Chief Diversity Officer Positions

The topic of diversity in the workplace has gotten more attention in the last few years, but what does that really mean in the tech industry? Many companies have put their money where their mouth is and created a Chief Diversity Officer position. Here are eight of them.

RSA Conference 2017 - Recap | Don’t Talk About Diversity, Live It!

This RSA panel of security experts discusses the lack of diversity in cybersecurity and explores the responsibility of women when it comes to changing unconscious bias.

OWASP AppSec California Brings Diversity to the Beach

At this year’s AppSec California conference – a yearly event for InfoSec professionals, developers, pentesters, and QA and testing professionals – the Women in Security panel was among the most highly attended, a very clear indication that this topic resonates strongly with both women and men.

This Is Why Men Should Fight Mightily to Defeat the Infosec Gender Gap

Entrepreneurs and businesses know, better than anyone, that survival is contingent upon adaptability. So why is there still a lack of diversity in this field? Avani Desai brings 15 years’ of experience in the IT field to offer her own suggestions as to how to close this gender gap.

Dear Santa, Please Keep My Customer Data Safe This Year

With hacking rampant, and the holiday shopping season upon us, no company wants to become the next headline. Lucas Long from InfoTrust shares 3 ways to keep customer data safe.