{"id":48772,"date":"2023-03-06T04:21:05","date_gmt":"2023-03-06T04:21:05","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/where-are-the-women-in-cyber-security-the-register\/"},"modified":"2023-03-06T04:22:25","modified_gmt":"2023-03-06T04:22:25","slug":"where-are-the-women-in-cyber-security-the-register","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/where-are-the-women-in-cyber-security-the-register\/","title":{"rendered":"Where are the women in cyber security? \u2022 The Register"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<\/p>\n<div id=\"body\">\n<p><span class=\"label\">In Temporary<\/span> If you cannot be a part of them, then it&#8217;s possible you&#8217;ll as effectively attempt to beat them \u2013 no less than for those who&#8217;re a gifted safety engineer on the lookout for a job and also you occur to be a lady.\u00a0<\/p>\n<p>As we have famous earlier than, the infosec world strikes at a <a href=\"https:\/\/www.theregister.com\/2022\/10\/15\/infosec_boys_club\/\">glacial pace toward gender equity<\/a>. It seems that&#8217;s not the case within the cyber felony underground, in accordance with Pattern Micro, which lately printed a examine during which it claims no less than 30 p.c \u2013 if no more \u2013 of cyber felony discussion board customers are ladies.<\/p>\n<p>For its examine, Pattern Micro checked out 5 English-language cyber crime boards: Sinister, Cracked, Breached, Hackforums and (now defunct) Raidforum. And it inspected 5 Russian-language websites: XSS, Exploit, Vavilon, BHF and WWH-Membership.\u00a0<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\">\n        <noscript><br \/>\n            <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZAVqMP0wm5S66QguS7JfFQAAAEs&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener\"><br \/>\n                <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZAVqMP0wm5S66QguS7JfFQAAAEs&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt=\"\"\/><br \/>\n            <\/a><br \/>\n        <\/noscript>\n    <\/div>\n<p>To be honest, Pattern Micro&#8217;s methodology is a bit iffy \u2013 and the report itself admits as a lot. Customers on these boards are are largely nameless, necessitating use of instruments like Semrush and uClassify&#8217;s Gender Analyzer V5 to make what quantities to guesses \u2013 at greatest.\u00a0<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\">\n            <noscript><br \/>\n                <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZAVqMP0wm5S66QguS7JfFQAAAEs&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"><br \/>\n                    <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZAVqMP0wm5S66QguS7JfFQAAAEs&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt=\"\"\/><br \/>\n                <\/a><br \/>\n            <\/noscript>\n        <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\">\n                <noscript><br \/>\n                    <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZAVqMP0wm5S66QguS7JfFQAAAEs&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"><br \/>\n                        <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZAVqMP0wm5S66QguS7JfFQAAAEs&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt=\"\"\/><br \/>\n                    <\/a><br \/>\n                <\/noscript>\n            <\/div>\n<\/p><\/div>\n<p>Nonetheless, Pattern Micro mentioned it analyzed posts and visitors on the ten boards and located that, for English language websites, some 40 p.c of customers look like ladies, and 42.6 p.c of Russian cyber crime discussion board customers had been ladies, or no less than write like them.<\/p>\n<p>&#8220;When in comparison with Stack Overflow, a developer and programming discussion board, solely 12 p.c of holiday makers had been feminine,&#8221; Pattern Micro mentioned of its use of Semrush.\u00a0<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\">\n            <noscript><br \/>\n                <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZAVqMP0wm5S66QguS7JfFQAAAEs&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"><br \/>\n                    <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZAVqMP0wm5S66QguS7JfFQAAAEs&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt=\"\"\/><br \/>\n                <\/a><br \/>\n            <\/noscript>\n        <\/div>\n<p>Gender Analyzer V5 is educated on 5,500 weblog posts written by ladies, and the identical quantity by males, with a purpose to analyze language for indicators of gendered utilization, which Pattern Micro used to research a subset of profiles on English web site Hackforums and Russian XSS. In keeping with the report, 36 p.c of customers at Hackforums had been seemingly ladies based mostly on their use of language, and 30 p.c of XSS discussion board customers had been reportedly ladies based mostly on the identical evaluation.\u00a0<\/p>\n<p>So, what does that every one imply? In keeping with Pattern Micro, it signifies that the cyber felony underground is extra meritocratic than the white hat world.\u00a0<\/p>\n<p>&#8220;Builders are valued for his or her expertise and expertise, and never essentially for his or her gender in terms of conducting enterprise within the underground,&#8221; Pattern Micro mentioned. As such, they are saying that investigators ought to keep away from defaulting to &#8220;he&#8221; when discussing cyber criminals. However there is a extra apparent lesson to be discovered right here.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\">\n            <noscript><br \/>\n                <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZAVqMP0wm5S66QguS7JfFQAAAEs&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"><br \/>\n                    <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZAVqMP0wm5S66QguS7JfFQAAAEs&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt=\"\"\/><br \/>\n                <\/a><br \/>\n            <\/noscript>\n        <\/div>\n<p>In case you overlook certified safety professionals on the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/08\/2-5-million-plus-cybersecurity-jobs-are-open-women-can-fill-them\/\" rel=\"nofollow\">basis of gender<\/a>, do not be stunned in the event that they find yourself in your radar once more. Although maybe within the type of a researcher bearing a pleasant breach discover, and never somebody out for felony revenue.<\/p>\n<div class=\"boxout\">\n<h3 class=\"crosshead\">Let&#8217;s get crucial<\/h3>\n<p>Topping this week&#8217;s record of vulnerabilities is a pair of flaws within the CryptParameterDecryption operate of Trusted Platform Module 2.0&#8217;s reference implementation code \u2013 critical whatever the rating, which is not but listed within the CVE web page for the vulnerabilities.<\/p>\n<ul>\n<li>CVSS ? \u2013 <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-1017\" rel=\"nofollow\">CVE-2023-1017<\/a> \u2013 An absence of size checks might enable an attacker to jot down two bytes previous the top of the buffer;<\/li>\n<li>CVSS ? \u2013 <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-1018\" rel=\"nofollow\">CVE-2023-1018<\/a> \u2013 And the attacker may also use the identical vulnerability to learn two bytes previous the buffer. If used collectively, exploitation can result in native info disclosure or escalation of privileges.<\/li>\n<\/ul>\n<p>A number of fashions of Cisco IP Telephones had been discovered to be sporting a <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-ip-phone-cmd-inj-KMFynVcP?emailclick=CNSemail\" rel=\"nofollow\">pair of vulnerabilities<\/a>, one fairly critical and one considerably much less so.<\/p>\n<p>IP telephone fashions 6800, 7800 and 8800 are all susceptible to:<\/p>\n<ul>\n<li>CVSS 9.8 \u2013 CVE-2023-20078 \u2013 An unauthenticated distant attacker might inject arbitrary instructions by way of the web-based administration interface to inject arbitrary instructions and execute them with root privileges.<\/li>\n<\/ul>\n<p>Along with the three fashions above, Unified IP Convention Cellphone 8831 and the identical mannequin with multi platform firmware, and Unified IP Cellphone 7900 collection are susceptible to:<\/p>\n<ul>\n<li>CVSS 7.5 \u2013 CVE-2023-20079 \u2013 The online-based administration platform might enable an unauthenticated distant attacker to trigger the machine to reboot, leading to denial of service.<\/li>\n<\/ul>\n<p>As well as, Cisco Utility Coverage Infrastructure Controller and Cisco Cloud Community controller have a vulnerability, for which a CVE quantity wasn&#8217;t offered:<\/p>\n<ul>\n<li>CVSS 8.8 \u2013 The online-based administration platform for Cisco APIC and Cloud Community Controller are susceptible to a cross-site request forgery assault.<\/li>\n<\/ul>\n<p>CISA handed alongside seven industrial management system vulnerabilities this week, however solely three of them ranked crucial:<\/p>\n<ul>\n<li>CVSS 10 \u2013 <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-0776\" rel=\"nofollow\">CVE-2023-0776<\/a> \u2013 <a href=\"https:\/\/www.cisa.gov\/news-events\/ics-advisories\/icsa-23-061-02\" rel=\"nofollow\">Baicells<\/a> Nova 436Q, 430E and 430I; and Neutrino 430 LTE TDD eNodeB gadgets with firmware variations by means of QRTB 2.12.7 are susceptible to HTTP command injections that allow distant shell code exploitation;<\/li>\n<li>CVSS 9.3 \u2013 <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-14521\" rel=\"nofollow\">CVE-2020-14521<\/a> \u2013 A <a href=\"https:\/\/www.cisa.gov\/news-events\/ics-advisories\/icsa-20-212-04\" rel=\"nofollow\">whole bunch<\/a> of Mitsubishi Electrical Manufacturing facility Automation engineering merchandise comprise a code execution vulnerability that would let an attacker acquire or modify knowledge and trigger denial-of-service situations;\u00a0<\/li>\n<li>CVSS 8.6 \u2013 <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-25161\" rel=\"nofollow\">CVE-2022-25161<\/a> \u2013\u00a0A number of Mitsubishi Electrical MELSEC iQ-F CPU modules embody a pair of improper enter validation bugs that would trigger DoS requiring a system reboot to repair.<\/li>\n<\/ul>\n<p>NIST recognized only one new exploit within the wild this week:<\/p>\n<ul>\n<li>CVSS 7.5 \u2013 <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-36537\" rel=\"nofollow\">CVE-2022-36537<\/a> \u2013 The open supply ZK Java Framework AuUploader servlet is being actively exploited to permit an attacker to retrieve the content material of a file situated within the internet context.\u00a0<\/li>\n<\/ul>\n<p>As all the time, patches for these vulnerabilities can be found, so if you end up answerable for any associated {hardware} or software program, get patching.<\/p>\n<\/div>\n<h3 class=\"crosshead\">Royal ransomware: Not only a healthcare drawback anymore<\/h3>\n<p>The FBI and Cybersecurity and Infrastructure Safety Company launched an <a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa23-061a\" rel=\"nofollow\">advisory<\/a> this week warning that the Royal ransomware variant is not simply concentrating on the healthcare sector anymore. It is expanded its attain to quite a few crucial infrastructure sectors.<\/p>\n<p>Because the US Division of Well being and Human Companies <a href=\"https:\/\/www.theregister.com\/2022\/12\/09\/royal_ransomware_hhs_warning\/\">warned<\/a> the medical world in December, the FBI and CISA mentioned that Royal and the parents behind it have made ransom calls for as excessive as \u00a39.1 million ($11 million) since coming onto the scene final September.\u00a0<\/p>\n<p>Together with healthcare, the FBI and CISA mentioned that Royal&#8217;s controllers have deployed it in opposition to manufacturing, communications and schooling organizations, although the pool of affected sectors is not restricted to these.\u00a0<\/p>\n<p>Royal ransomware makes use of a partial encryption method that helps it evade detection, and usually break into methods compromised by way of phishing assaults. The FBI and CISA did say the group behind Royal has additionally leveraged compromised RDP connections and exploited public-facing purposes to realize a foothold,. Brokers have additionally been used, the businesses mentioned.\u00a0<\/p>\n<p>Ransomware assaults had been <a href=\"https:\/\/www.theregister.com\/2022\/10\/26\/sonicwall_ransomware_raas\/\">reportedly down<\/a> as of late 2022 \u2013 although with the caveat that, even at &#8220;decrease&#8221; ranges reported late final yr, the entire variety of ransomware incidents was nonetheless greater than earlier years.\u00a0<\/p>\n<p>To keep away from a Royal ache within the rear, CISA and the FBI suggest following the usual record of mitigations for such threats \u2013 like requiring multifactor authentication, retaining software program up-to-date and the like.\u00a0\u00ae<\/p>\n<\/p><\/div>\n<iframe data-lazy=\"true\" data-src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2023\/03\/06\/in_brief_security\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In Temporary If you cannot be a part of them, then it&#8217;s possible you&#8217;ll as effectively attempt to beat them \u2013 no less than for&#8230;<\/p>\n","protected":false},"author":1,"featured_media":48773,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-48772","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Where are the women in cyber security? \u2022 The Register - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/where-are-the-women-in-cyber-security-the-register\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Where are the women in cyber security? \u2022 The Register - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/where-are-the-women-in-cyber-security-the-register\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-06T04:21:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-06T04:22:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/03\/hacker_shutterstock.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/06\\\/where-are-the-women-in-cyber-security-the-register\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/06\\\/where-are-the-women-in-cyber-security-the-register\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"Where are the women in cyber security? \u2022 The Register\",\"datePublished\":\"2023-03-06T04:21:05+00:00\",\"dateModified\":\"2023-03-06T04:22:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/06\\\/where-are-the-women-in-cyber-security-the-register\\\/\"},\"wordCount\":1187,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/06\\\/where-are-the-women-in-cyber-security-the-register\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/hacker_shutterstock.jpg\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/06\\\/where-are-the-women-in-cyber-security-the-register\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/06\\\/where-are-the-women-in-cyber-security-the-register\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/06\\\/where-are-the-women-in-cyber-security-the-register\\\/\",\"name\":\"Where are the women in cyber security? \u2022 The Register - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/06\\\/where-are-the-women-in-cyber-security-the-register\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/06\\\/where-are-the-women-in-cyber-security-the-register\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/hacker_shutterstock.jpg\",\"datePublished\":\"2023-03-06T04:21:05+00:00\",\"dateModified\":\"2023-03-06T04:22:25+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/06\\\/where-are-the-women-in-cyber-security-the-register\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/06\\\/where-are-the-women-in-cyber-security-the-register\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/06\\\/where-are-the-women-in-cyber-security-the-register\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/hacker_shutterstock.jpg\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/hacker_shutterstock.jpg\",\"width\":648,\"height\":432},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/06\\\/where-are-the-women-in-cyber-security-the-register\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Where are the women in cyber security? \u2022 The Register\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Where are the women in cyber security? \u2022 The Register - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/where-are-the-women-in-cyber-security-the-register\/","og_locale":"en_US","og_type":"article","og_title":"Where are the women in cyber security? \u2022 The Register - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/where-are-the-women-in-cyber-security-the-register\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2023-03-06T04:21:05+00:00","article_modified_time":"2023-03-06T04:22:25+00:00","og_image":[{"width":648,"height":432,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/03\/hacker_shutterstock.jpg","type":"image\/jpeg"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/where-are-the-women-in-cyber-security-the-register\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/where-are-the-women-in-cyber-security-the-register\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"Where are the women in cyber security? \u2022 The Register","datePublished":"2023-03-06T04:21:05+00:00","dateModified":"2023-03-06T04:22:25+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/where-are-the-women-in-cyber-security-the-register\/"},"wordCount":1187,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/where-are-the-women-in-cyber-security-the-register\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/03\/hacker_shutterstock.jpg","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/where-are-the-women-in-cyber-security-the-register\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/where-are-the-women-in-cyber-security-the-register\/","url":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/where-are-the-women-in-cyber-security-the-register\/","name":"Where are the women in cyber security? \u2022 The Register - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/where-are-the-women-in-cyber-security-the-register\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/where-are-the-women-in-cyber-security-the-register\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/03\/hacker_shutterstock.jpg","datePublished":"2023-03-06T04:21:05+00:00","dateModified":"2023-03-06T04:22:25+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/where-are-the-women-in-cyber-security-the-register\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/where-are-the-women-in-cyber-security-the-register\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/where-are-the-women-in-cyber-security-the-register\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/03\/hacker_shutterstock.jpg","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/03\/hacker_shutterstock.jpg","width":648,"height":432},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/06\/where-are-the-women-in-cyber-security-the-register\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"Where are the women in cyber security? \u2022 The Register"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/48772","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=48772"}],"version-history":[{"count":1,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/48772\/revisions"}],"predecessor-version":[{"id":48774,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/48772\/revisions\/48774"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/48773"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=48772"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=48772"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=48772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}