Joannie Fu of Intel joined this episode of Diverse: a SWE podcast to share her personal and professional experiences on building a more inclusive tech sector....
Month: March 2025
Fostering Belonging: Read the 2023 SWE Diversity, Equity, Inclusion & Belonging Report
Explore SWE’s second annual DEI&B report that focuses on our efforts toward fostering a culture of belonging within the organization. Source Views: 0
Computer, Draw a Scientist: Do AI Images Reject or Reflect Gender Stereotypes?
Science writer Lisa M.P. Munoz recreated the famous Draw a Scientist exercise using AI prompts. Discover her findings and what they mean for entrenched biases in...
Affinity Groups at WE23: What to Know Before You Go!
Find out where and when to find our Affinity Groups at WE23, both in-person in Los Angeles, CA, and virtually! Source Views: 0
SWENext Influencers: Vanesa Aguay
Meet Vanesa Aguay, a Latina SWENext Influencer who plans to do great things in the field of biomedical engineering. Read more about her story and how...
Affinity Group Spotlight: SWE Entrepreneurs Affinity Group
Each month throughout the year, we’ll be spotlighting a SWE Affinity Group. We are excited to highlight SWE’s Entrepreneurs Affinity Group! Source Views: 0
Congratulations to our next SWE Advance Power User!
SWE is excited to announce Jennifer Klenka (She/Her) as this quarter’s Advance Power User! We asked Jennifer some questions regarding her dedication to lifelong learning and...
SWE Diverse Podcast Ep 230: From Doubt to Empowerment: Navigating Imposter Complex With Tanya Geisler
TEDxWomen speaker and leadership coach Tanya Geisler helps women engineers overcome imposter syndrome in this episode of Diverse: a Society of Women Engineers podcast! Source Views:...
What are the cost implications of maintaining NHI compliance? – Source: securityboulevard.com
Source: securityboulevard.com – Author: Amy Cohn Does Non-Human Identities Compliance Come with a Hefty Price Tag? Foremost among these challenges is securing a cloud environment from...
What best practices ensure long-term compliance for NHIs? – Source: securityboulevard.com
Source: securityboulevard.com – Author: Amy Cohn What Are the Essential Considerations for Long-Term Compliance of Non-Human Identities? The importance of Non-Human Identities (NHIs) in cybersecurity cannot...
How can technology simplify the process of NHI compliance? – Source: securityboulevard.com
Source: securityboulevard.com – Author: Amy Cohn How is Technology Revolutionizing Non-Human Identities (NHI) Compliance? How can the integration of advanced technology streamline the process of NHI...
BSidesLV24 – IATC – Time Is Up. You Have Three Years, 3 Months, 3 Weeks, To Protect Your Stuff. What Do You Do? – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Home » Security Bloggers Network » BSidesLV24 – IATC – Time Is Up. You Have Three Years, 3 Months, 3...
Babuk Locker 2.0 vs Seceon Platform: MITRE ATT&CK Mapping and Early-Stage Detection & Remediation – Source: securityboulevard.com
Source: securityboulevard.com – Author: Chandra Shekhar Pandey Overview of Babuk Locker 2.0 Babuk Locker 2.0 is a ransomware strain that employs double extortion, where attackers encrypt...
News alert: SquareX discloses nasty browser-native ransomware that’s undetectable by antivirus – Source: securityboulevard.com
Source: securityboulevard.com – Author: cybernewswire Palo Alto, Calif., Mar 28, 2025, CyberNewswire — From WannaCry to the MGM Resorts Hack, ransomware remains one of the most...
Executive Perspectives: Pierre Noel on Cybersecurity Leadership, Risk, and Resilience – Source: securityboulevard.com
Source: securityboulevard.com – Author: Axio In this edition of Axio’s Executive Insight Series, Scott Kannry, CEO of Axio, sits down with Pierre Noel, former CISO of...
Building Smarter, Safer Businesses: How SecureFLO is Bridging AI Innovation with Cybersecurity – Source: securityboulevard.com
Source: securityboulevard.com – Author: Karunakar Goud Building Smarter, Safer Businesses: How SecureFLO is Bridging AI Innovation with Cybersecurity Building Smarter, Safer Businesses: How SecureFLO is Bridging...
Malware in Lisp? Now you’re just being cruel – Source: go.theregister.com
Source: go.theregister.com – Author: Thomas Claburn Malware authors looking to evade analysis are turning to less popular programming languages like Delphi or Haskell. Computer scientists affiliated...
Birthday freebies: how to cash in on UK retailers’ gifts and discounts – Source: www.theguardian.com
Source: www.theguardian.com – Author: Mabel Banfield-Nwachi Celebrating your birthday isn’t just about getting presents and cards from family and friends. Signing up to loyalty schemes and...
Critical Condition: Legacy Medical Devices Remain Easy Targets for Ransomware – Source: www.securityweek.com
Source: www.securityweek.com – Author: Kevin Townsend Healthcare is consistently one of the most attacked critical industries – it is a prime ransomware target. The reasons are...
9-Year-Old NPM Crypto Package Hijacked for Information Theft – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Multiple NPM packages designed for blockchain application development have been hijacked to deliver information stealer malware, software supply chain management...
In Other News: Hellcat Hackers Unmasked, CrushFTP Bug Controversy, NYU Hacked – Source: www.securityweek.com
Source: www.securityweek.com – Author: SecurityWeek News SecurityWeek’s cybersecurity news roundup provides a concise compilation of noteworthy stories that might have slipped under the radar. We provide...
New Issuance Requirements Improve HTTPS Certificate Validation – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Trust in HTTPS certificate issuance has been enhanced with new practices mandated by the CA/Browser Forum Baseline Requirements meant to...
Morphing Meerkat Phishing Kits Target Over 100 Brands – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire A phishing-as-a-service (PhaaS) platform has been observed generating phishing kits that use DNS mail exchange (MX) records to serve fake...
Fresh Grandoreiro Banking Trojan Campaigns Target Latin America, Europe – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire The Grandoreiro banking trojan has reemerged in fresh phishing campaigns targeting users in Latin America and Europe, cybersecurity firm Forcepoint...
Firefox Affected by Flaw Similar to Chrome Zero-Day Exploited in Russia – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Mozilla says Firefox developers have determined that their browser is affected by a critical vulnerability that is similar to the...
Mid-Hudson SWE Section Members Shine at WE Local Cherry Hill Conference
Explore the four unique WE Local Cherry Hill sessions that featured local Society of Women Engineers (SWE) members, plus photos from the event. Source Views: 0
How I Became a Systems Engineer: Meet Cindy Paz
Cindy Paz shares her story of deciding to pursue engineering, what it’s like to be a systems engineer, and why volunteerism is important to her as...
SWE Dresden Affiliate and GlobalFoundries Host Valuable Professional Development Discussions
Read about the thought-provoking discussions that took place at this professional development event in Dresden, Germany. Source Views: 0
Everything You Need to Know to Have an Amazing IIBI Experience!
Invent It. Build It. is finally here! Get prepared for the event this Saturday, October 28th by reviewing the information below. Source Views: 0
What You Need to Know for WE23 – Onsite Attendees
Learn more about what to expect at WE23 and make your agenda! Source Views: 1