Equal Respect for Women in Technology | A New IT Security Planet Column
We are pleased to introduce you to a new column on IT Security planet. The Equal Respect for Women in Technology column is a collaboration with Chenxi Wang.
Read Buy eBay shares
Chenxi's inaugural post below.
Featured Article

It's time to achieve equal respect for women in security, and the new Equal Respect column series is just what we need to bring it home. in this inaugural article, Chenxi Wang speaks of her new partnership with IT Security Planet and the fantastic lineup of contributors waiting in the wings to share their thoughts on this unwelcome industry challenge.

51% of women report that being a working parent makes it harder for them to advance in their career — versus just 16% of men. Caroline Wong illustrates the difficulty of balancing a demanding CISSP career with an equally demanding new baby and Buy Nike shares shares some techniques that have helped her not go insane.

A company can’t be diversified if its people aren’t diversified. This panel of five top-level women in the security industry discusses why the number of females in infosec and tech companies is actually declining, the inherent biases we all have about people, and what can be done to remove the obstacles to attract – and retain – more qualified women to this growing field.

It's time to achieve equal respect for women in security, and the new Equal Respect column series is just what we need to bring it home. in part 2 of this 2-part article in which Summer Craze Fowler shows how a lack of diversity affects all of us, she provides examples of what we can do to solve the disturbing fact that the number of women in the information security space is actually declining.
Latest From Our News Room

When it comes to the creation of this market, it all boils down to supply and demand. Jeremiah Grossman is nudging the supply along - letting people get a taste of it - and hopefully the market will soon start demanding it. In this article, Sean Martin explores the cyber guarantee portion of the topic and the ability to create a new market from scratch.

51% of women report that being a working parent makes it harder for them to advance in their career — versus just 16% of men. Caroline Wong illustrates the difficulty of balancing a demanding CISSP career with an equally demanding new baby and shares some techniques that have helped her not go insane.

‘Compliance does not equal security’ was the mantra of this session called Two-Factor Isn’t Enough – We Show You Why. Ryan Rowcliffe of SecureAuth reminded us that merely having a two-factor authentication technology in place isn’t nearly safe enough because when it comes to convenience, people will almost always eschew security measures.

When the weakest link in a business’ IT security is “end users who…are too easily fooled by social engineering attacks,” how do you protect your organization? Here are two studies that show just how foolish people can be.

A company can’t be diversified if its people aren’t diversified. This panel of five top-level women in the security industry discusses why the number of females in infosec and tech companies is actually declining, the inherent biases we all have about people, and what can be done to remove the obstacles to attract – and retain – more qualified women to this growing field.

Cybersecurity only works if you actually implement it – otherwise, it’s like having a state-of-the art alarm system on your house but then leaving the bedroom window open for fresh air. Unfortunately, the weakest link in the security chain comes down to the end users.

It's time to achieve equal respect for women in security, and the new Equal Respect column series is just what we need to bring it home. in part 2 of this 2-part article in which Summer Craze Fowler shows how a lack of diversity affects all of us, she provides examples of what we can do to solve the disturbing fact that the number of women in the information security space is actually declining.

It's time to achieve equal respect for women in security, and the new Equal Respect column series is just what we need to bring it home. in part 1 of this 2-part article, Summer Craze Fowler shows that the future of information security looks as male-dominated as ever and discusses the reasons we should all be concerned about the lack of diversity in this field.

There are no fewer than 256 companies (as of this writing) with reserved booths at Black Hat USA 2016 this year. As you plan your navigation of the hall to see that many vendors, there is a lot to consider. Sean Martin offers 5 tips and tricks to help Black Hat attendees make the most of their time on the Expo floor.
For many years Dinah Davis was afraid to speak up about bullying and discrimination. In the Equal Respect article, Dinah shares her experience of overcoming these issues to become a successful businesswoman in the field of cybersecurity.

Enough is enough - the lack of diversity in cybersecurity needs to end. In this article, Selena introduces the new column driven by our new partnership with Chenxi Wang, as we launch our new Equal Respect column series in the new Women in Security column on IT Security Planet.

It's time to achieve equal respect for women in security, and the new Equal Respect column series is just what we need to bring it home. in this inaugural article, Chenxi Wang speaks of her new partnership with IT Security Planet and the fantastic lineup of contributors waiting in the wings to share their thoughts on this unwelcome industry challenge.
The Word On The Street
We were there! Were you?
Get the latest posts from Black Hat USA 2016
More Events
Intensive learning. Actionable insight. Invaluable take-aways for technical professionals
To remain competitive, you’ve got to constantly provide great software to your customers.
Join us at ISSA-LA's August lunch meeting. Enjoy a delicious lunch, network with your peers, hear a great talk, earn 2 CPE credits.
Join Ars Technica and Leslie Miley for a conversation about Silicon Valley's problems with diversity.
To remain competitive, you’ve got to constantly provide great software to your customers.
To remain competitive, you’ve got to constantly provide great software to your customers.
ILTACON is a four-day educational conference that draws on the experience and success of professionals employing ever-changing technology within law firms and legal departments.
The CISO Toronto Summit is a chance for CISOs and IT security executives in Toronto to meet with peers from various industries, including, but not limited to, health care, finance, insurance, government, telecom, utilities and education.
On September 8, 2016 Carnegie Mellon University’s Software Engineering Institute will host the 2016 CERT Secure Coding Symposium.
Want to see your tweets here? Great!

Submit a press release
Have some news to share with the world and you want our growing audience of IT security analysts, managers, and executives so see it? Fill out the form and we’ll take care of the rest.

IT Security Planet's Experts Corner
Where great minds share their expert opinion on information security news and trends. Are you an expert? Then, join us! We are always looking for brilliant minds.

Where are we going?
Wow, that's a lot of conferences, events, and webinars. Let us help you connect with the right audience. Send us your event details and we’ll put it on the calendar.

ITSP Company Directory
We recently launched ITSP's Company Directory. Why isn't your company there yet? See who is already there and add your company to the list.