Women in security

Ada Lovelace Day: Celebrating Women’s Achievements in STEM
Ada Lovelace Day is October 12th, celebrating women in STEM, which includes cybersecurity! Every year, the holiday does end up being a history of computing, as Ada was composing what we’d now consider ...

Ask Chloé: How to Address Zoom Fatigue
Welcome to the Ask Chloé column on Security Boulevard! Each week, Chloé provides answers to readers’ questions to help guide them as they navigate the technology industry. This week, Chloé helps a reader address both ...
Top 8 Benefits of a Remote Internship at LogRhythm
Remote internships can provide a wide range of benefits. Whether you’re a current student or a recent graduate, an internship gives you the chance to apply your skills, advance your career, and ...

Women in Cybersecurity No Longer an ‘Anomaly’
Truth be told, there are many women in cybersecurity who are tired of talking about women in the industry as if they are anomalies. For many female professionals, it’s far past the ...
Women in Information Security: Claire Reckless
Last time, I had the opportunity to talk to Toronto’s own Jennifer Fernick. Somehow, she juggles graduate computer science studies with taking care of a bank’s cybersecurity. I couldn’t do that! This ...
Women in Information Security: Jennifer Fernick
Last time, I had the privilege of interviewing Fortalice Solutions founder Theresa Payton. Her combination of White House and private sector intelligence and cybersecurity experience gives her a truly one-of-a-kind perspective in ...
Monday, Aug. 6, Dtex in the News: The Pervasive Insider Threat, GDPR Creates Privileged User Security Problems, Vulnerable Humans Behind UnityPoint Data Breach
The Dtex 2018 Insider Threat Intelligence Report continues to lead industry discussions about how frequently the insider threat occurs in public and private sector organizations. Last week, CSO’s Christopher Burgess dove into ...
Women in Information Security: Monica Jain
Last time, I got the opportunity to speak with Jessica Hebenstreit. Not only is she a senior security consultant who has had a lot of different roles; she’s also the chief Operating ...
Monday, July 23: Dtex, Insider Threat, Privacy in the News: Top Ways Insiders Go Rogue, DOJ Shifts Focus to Election Security, HR Industry Eyes Importance of Privacy
It’s true that many of the most damaging data breaches are caused by trusted insiders who make mistakes and fall prey to attackers. There are also plenty of examples of malicious insiders ...
Women in Information Security: Jessica Hebenstreit
Last time, I had the pleasure of speaking with Roxy Dee. Her expertise is in vulnerability management, and she also loves to pay it forward by giving away books to her lucky ...