Women in cybersecurity

Women in cybersecurity

Up next

Women making fashion for all

Datshiane Navanayagam talks to two women whose life changing illnesses led them to set up new businesses after they discovered high street clothes are uncomfortable and difficult to wear when you have restricted mobility or medical needs.Victoria Jenkins is one of the UK's leadin ...  Show more

Researching the lives of women in the past

Have you ever wondered if there were a scandal buried in your family history? Datshiane Navanayagam meets two female genealogists from the US and Ireland to discuss the desire many of us have to dig into our heritage. Michele Soulli is an American genealogist who made headlines a ...  Show more

Recommended Episodes

Rediscover trust in cybersecurity: A women in cybersecurity podcast. [Special edition]
CyberWire Daily

It's important for employees to be brought into the fold as security's allies, rather than as its adversaries. For cybersecurity teams that operate with an adversarial mindset appropriate for external threats, it can be challenging to approach internal threats differently. You ca ...  Show more

Hacking and cybercrime
Start the Week

Just how safe is the online world? Yale Professor of Law and Philosophy Scott Shapiro delves into cybersecurity in his book, Fancy Bear Goes Phishing. The book’s title derives from the exploits of ‘Fancy Bear’, an elite unit of the Russian military intelligence that hacked the ...

  Show more

Guarding against the next cyber attack
FT Tech Tonic

Army veteran and cyber security expert Rick Howard talks to the FT's Hannah Kuchler about the current state of cyber security, what we have learned from recent large-scale attacks known as WannaCry and NotPetya and what companies can do to try to guard against ...  Show more

The Path to Cyber Resilience
Built for Change

Cyber attacks are on the rise – and companies face a constant battle to stay ahead. In 2021, breaches of data, networks, services and other assets climbed by 31%. In this episode, we’ll talk to a former hacker who, years ago, was responsible for one of the fastest-spreading compu ...  Show more