News

WiCyS 2019

For anyone who has ever considered attending a women’s tech conference or getting involved with organizations that seek to close the gender and diversity gaps in cybersecurity, I want to encourage you to do so.  The value in these organizations is that...

read more

Rethinking Cybersecurity Education

Education is continually evolving.  It used to be thought of as the 3 Rs: Reading, wRiting, and aRithmetic.  It moved forward to STEM: Science, Technology, Engineering, and Math. And, we’ve even expanded this to STEAM: Science, Technology, Engineering, the...

read more

CybHER: Where We’ve Been This Year

What a CybHER year it has been!  As we continue to follow our mission of empowering, motivating, educating, and changing the perception of girls and women in cybersecurity and have a great mid-year report to share with you!Between Summer and December of...

read more

The Language of Technology

Language is an important tool that we begin learning at a young age.  Through language, we express our needs, desires, and emotions; communicate ideas; share information; influence others; develop relationships; solve problems; and more.  Learning a...

read more

What’s Your Password?

If someone were to come up to you and ask you your password to any of your accounts, you’d probably think they were crazy and tell them, “No way!”  But, could they still gain access to your account?  It might take a lot less time and work than you think. ...

read more

What Will Your Score Be?

Let’s talk about information!  We know that information is money.  After all, information – or data – is a multi-billion dollar industry.  That’s right! Information that we provide via our social media, updates we post, pictures and videos we share, places...

read more

What Shoes does a Cybersecurity Professional Wear?

Do you wear Nikes? Adidas? Vans? Cowboy boots? Sandals? Shoes with heals? Flats? As diverse as the shoes your peers wear is the diversity we need in cybersecurity professionals. We need your unique ideas and skills in the cybersecurity profession. As there...

read more