As part of the Late Career & Retiree Affinity Group’s spotlight month, Vicki Johnson (she/her) reflects on her retirement journey and connections with other LCR AG...
Day: March 2, 2025
SWE Diverse Podcast Ep 251: Highlighting Women Scientists on Wikipedia With Dr. Jess Wade
Dr. Jess Wade has created thousands of Wikipedia pages that highlight the achievements of women scientists and engineers. Hear her story on Diverse: a SWE podcast!...
Making Connections at the SWE Virtual Career Fair for Professionals
Sunita Ramnarinesingh, an electrical engineer and SWE member, shares about her experience at SWE’s Virtual Career Fair for Professionals and shines a light on how to...
Adapting to Change in the Engineering Workplace
Smita Tharoor shares the four types of workplace change and how emotional resilience ties into change management. Plus, join her free course “Transforming Together: Change Management...
Five Tips for Work-Life Harmonization
Grisel Quiles, senior director of reagents manufacturing at BD (Becton, Dickinson and Company), shares her reflections on how women in STEM can achieve harmony and balance...
Making Strides in an Era of Hats, Gloves and Teas
In honor of Women’s History Month, read about the experience of Society of Women Engineers (SWE) members in the 1950s and 1960s in this article by...
SWE Honors Bechtel’s Commitment to Gender Diversity and Inclusion With FY23 President’s Award
Bechtel has partnered with SWE on a number of important initiatives that showcase a strong commitment to gender diversity and inclusion. Source Views: 0
Gender Scan in India: A Survey on Gender Equity in STEM Education and the Workforce
Learn about the current state of women in STEM in India from this survey issued to students and employees, including topics such as remote work, gender...
Justified Spending on Cybersecurity Technology? – Source: securityboulevard.com
Source: securityboulevard.com – Author: Amy Cohn With digital becoming more complex, organizations are continually urged to increase their cybersecurity spending. But the crucial question that arises...
How Supported is Your NHIs Policy Enforcement? – Source: securityboulevard.com
Source: securityboulevard.com – Author: Amy Cohn Does Your Approach to NHI Policy Enforcement Make the Grade? One question that often arises is: “how effectively are we...
Freedom to Choose the Best Secrets Vault? – Source: securityboulevard.com
Source: securityboulevard.com – Author: Amy Cohn Are You Making Informed Decisions About Your Secrets Vault? It’s a question that resonates deeply among cybersecurity professionals today. A...
When Your SaaS Vendor Goes Dark: A Guide to Protecting Your Business – Source: securityboulevard.com
Source: securityboulevard.com – Author: Deepak Gupta – Tech Entrepreneur, Cybersecurity Author The Software as a Service (SaaS) model has revolutionized how businesses operate, offering cost-effective, scalable...
DEF CON 32 – No Symbols When Reversing: No Problem Bring Your Own – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Home » Security Bloggers Network » DEF CON 32 – No Symbols When Reversing: No Problem Bring Your Own Author/Presenter:...
Certain About Your Data Privacy Measures? – Source: securityboulevard.com
Source: securityboulevard.com – Author: Amy Cohn Are You Confident in Your Data Privacy Measures? Professionals in financial services in healthcare, travel, DevOps, and SOC teams that...
How Stable is Your Cloud Infrastructure Security? – Source: securityboulevard.com
Source: securityboulevard.com – Author: Amy Cohn Are Your Machine Identities Protected Within Your Cloud Infrastructure? Let’s delve into a thought-provoking question: Within your seemingly secure systems,...
Independent Audit for Your Secrets Management? – Source: securityboulevard.com
Source: securityboulevard.com – Author: Amy Cohn Why Should Organizations Focus on Independent Audit for Secrets Management? Are you overlooking an essential aspect of your organization’s cybersecurity...