U.S. Has World's Worst Gender Gap in Cyber Security Education

JEFF GOLDMAN |

article image
According to the results of a recent survey of 3,871 adults aged 18 to 26 in Australia, Estonia, France, Germany, Japan, Poland, Qatar, the Republic of Korea, the U.K., the United Arab Emirates and the U.S., 52 percent of female respondents said they felt no cyber security programs or activities were available to them, compared to 39 percent of male respondents.The study, entitled "Securing Our Future: Closing the Cybersecurity Talent Gap" [PDF], was commissioned by Raytheon and the National Cyber Security Alliance (NCSA) and conducted by Zogby Analytics from July 29 to August 10, 2015.

Spotlight

GBHackers On Cyber Security

GBHackers on Security is Advanced Persistent Cyber Security Online platform which including Cyber Security Research,Web Application and Network Penetration Testing, Hacking Tutorials,Live Security Updates ,Security investigations With dedicated Cyber security Expert Team and help to community more secure.

OTHER ARTICLES

The British government thinks process sensor cyber issues are real – what about everyone else

Article | February 16, 2020

When Joe refers to analogue devices, he is generally referring to ISA99 / IEC 62443 Level 0 devices, i.e. the sensors and actuators required in any cyber physical system. The vulnerability of these devices is often ignored as the security measures required to protect them are not purely technical but also involve physical and personnel security aspects along with process security (both of the metrology and processing by the device, as well as configuration management and control issues over the lifecycle of analogue devices). The security situation is not helped by the simplistic application of the triad of security goals (confidentiality, integrity and availability) to cyber physical systems.

Read More

Authentication and Passwords Concerns Top New Ponemon Institute Report

Article | February 16, 2020

IT security practitioners are aware of good habits when it comes to strong authentication and password management, yet often fail to implement them due to poor usability or inconvenience, says the 2020 State of Password and Authentication Security Behaviors Report by Yubico and Ponemon Institute. According to the report,IT security practitioners and individuals are both engaging in risky password and authentication practices, yet expectation and reality are often misaligned when it comes to the implementation of usable and desirable security solutions. The tools and processes that organizations put in place are not widely adopted by employees or customers, making it abundantly clear that new technologies are needed for enterprises and individuals to reach a safer future together.

Read More

Coronavirus and the Cybersecurity Threat Landscape

Article | February 16, 2020

Cybersecurity professionals are always interested in understanding how evolving events shape the threat landscape. Events such as WannaCry and NotPetya may have temporarily crippled technology environments that were running with third-rate security*, but the repercussions from the coronavirus will hit every organization, no matter how resilient they thought they were. No single event to date has changed the tech threat landscape more than the consequences and impacts developing around the Coronavirus (aka SARS-CoV-2 and the disease CoViD-19). Then there are the business consequences, such as the sudden changes in consumer patterns and steep loss of income. The coronavirus is unmistakably a black swan event. It falls outside of the outliers. It creates a situation that many security professionals are familiar with: The Medusa Effect.

Read More

Creating and rolling out an effective cyber security strategy

Article | February 16, 2020

What’s more, organisations should also keep in mind that prevention alone is not enough; according to IBM, the average breach detection and containment times currently sits in the region of 280 days. In this time, it’s easy for cyber attackers to gain a foothold in an environment and quickly cause damage. “When developing a cyber security strategy, traditionally enterprises have focused on the threat prevention with little attention given to detection and often none to response,” said Martin Riley, director of managed security services at Bridewell Consulting.

Read More

Spotlight

GBHackers On Cyber Security

GBHackers on Security is Advanced Persistent Cyber Security Online platform which including Cyber Security Research,Web Application and Network Penetration Testing, Hacking Tutorials,Live Security Updates ,Security investigations With dedicated Cyber security Expert Team and help to community more secure.

Events