Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Ada Lovelace Day: Celebrating Women’s Achievements in STEM
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Ada Lovelace Day: Celebrating Women’s Achievements in STEM

5 years ago Rita Nygren
Ada Lovelace Day: Celebrating Women’s Achievements in STEM

Ada Lovelace Day is October 12th, celebrating women in STEM, which includes cybersecurity! Every year, the holiday does end up being a history of computing, as Ada was composing what we’d now consider the software for a theoretical first computer that had not been built. But that was in the 1840s. What are women doing today?

Have you heard of Window?

“One single vulnerability is all an attacker needs.” – Window Snyder; Chief Security Officer, Fastly (now at Thistle)

Window Snyder is one of the first computer scientist to specialize in cybersecurity, and to proactively try to bridge the gap between corporations and the security researchers often termed ‘hackers’. She literally wrote the book on Thread Modelling in 2004. Follow her on Twitter (@window). You can hear a short summary of her 2018 RCA talk here:

Singing Cyber Sea Shanties

Does your favorite woman in STEM sing sea shanties? Rachel Tobac has one for you:  

On top of this, she’s got some great info on how to defend yourself from…well, her. She’s a white hat hacker helping both companies and individuals protect their data. https://blog.dashlane.com/interview-hacker-rachel-tobac/ 

Follow her on Twitter @RachelTobac.

Climbing the Anti-Stalkerware Ladder

Domestic abuse does intersect cybersecurity, and Eva Galperin wants you to know if someone has installed stalkerware on your devices. Until her campaign, no antivirus called it out to let you know someone was spying on your device (learn more here: https://www.wired.com/story/eva-galperin-stalkerware-kaspersky-antivirus/). She’s EFF’s Directory of Cybersecurity and in addition, she’s an acrobat. Follow her on Twitter at @evacide.

Hacking the Planet

Katie Moussouris did some data driven analysis regarding bugs and vulnerability and helped develop bug bounties for Microsoft and the Department of Defense. She started out as a teen – or apparently earlier with a screwdriver, taking apart whatever she could to see how it worked – and has presented to Congress, discussing the imbalance between those finding bugs and those able to fix them.  

“We have an Internet built on rock and roll and silly string.” Katie Moussouris, Luta Security.

Check out her 2019 discussion on the history and future of white hat hacking:

Follow Katie on Twitter at @k8em0

Ada Lovelace day was created in 2009, nearly 200 years after the namesake’s birth. The holiday celebrates women’s achievements in science, technology, engineering and math (STEM), as well as highlighting role models for more girls to pursue STEM careers, and support women already working in STEM. Check out https://findingada.com/ for more information on the holiday or to find events in your region.

The post ” Ada Lovelace Day: Celebrating Women’s Achievements in STEM” appeared first on TripWire

Source:TripWire – Rita Nygren

Tags: Bug, Hacker, Microsoft, TripWire

Continue Reading

Previous Indian-Made Mobile Spyware Targeted Human Rights Activist in Togo
Next Incident Response: 5 Principles to Boost the Infosec/Legal Relationship

More Stories

  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE

3 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Microsoft’s MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday

19 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation

20 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

[Webinar] Why Your AppSec Tools Miss the “Lethal Path” (and How to Fix It)

21 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Most Remediation Programs Never Confirm the Fix Actually Worked

22 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws

23 hours ago [email protected] (The Hacker News)

Recent Posts

  • 18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE
  • Microsoft’s MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday
  • Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation
  • [Webinar] Why Your AppSec Tools Miss the “Lethal Path” (and How to Fix It)
  • Most Remediation Programs Never Confirm the Fix Actually Worked

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT