SWE supports diversity within the United States Patent and Trademark Office (USTPO) patent making process to ensure a more inclusive and equitable system. Source Views: 2
Month: April 2025
Systems Engineering: Rube Goldberg Machine (RGM)
Try out this iconic engineering exercise and make your own Rube Goldberg machine! Source Views: 3
A Day in the Life of a Systems Engineer: Tuyet-Hanh Schnell
Tuyet-Hanh Schnell is a Systems Engineering Lead at Lockheed Martin. Learn more about her work as a systems engineer and how you can #BeThatEngineer! Source Views:...
Systems Engineering Student of the Month: Grace Khouri
Grace Khouri is a senior at the University of Minnesota, located in the Twin Cities of Minneapolis and St. Paul. She studies industrial and systems engineering...
SWENext Club Feature: Libya SWENext Club
The LYBOTICS organization, the organization for robotics clubs in Libya, became a FIRST Tech Challenge partner in 2021 and continues its work for women in engineering....
SWE Diverse Podcast: Ep. 216: Asian Americans in STEM: Vietnamese Refugee Stories
Hear the personal stories of Hang Loi and Dr. Tracy Nguyen, two Asian American women leaders in STEM who escaped Vietnam as children during the fall...
WE23 Registration Is Now Open!
Join us in person in Los Angeles or virtually from Oct. 26 – 28, 2023, for WE23 — the top destination for women in engineering and...
Phishing attacks leveraging HTML code inside SVG files – Source: securelist.com
Source: securelist.com – Author: Roman Dedenok With each passing year, phishing attacks feature more and more elaborate techniques designed to trick users and evade security measures....
Ensuring a Safe Environment with Least Privilege – Source: securityboulevard.com
Source: securityboulevard.com – Author: Amy Cohn Why Is Least Privilege Fundamental to Creating Safe Environments? Data is the new gold. If data volumes surge, so do...
Protected NHIs: Key to Cyber Resilience – Source: securityboulevard.com
Source: securityboulevard.com – Author: Amy Cohn Why is Management of Protected NHIs Essential? Protected Non-Human Identities (NHIs) have become a crucial factor for organizations looking to...
BSidesLV24 – Common Ground – Free Your Mind: Battling Our Biases – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Home » Security Bloggers Network » BSidesLV24 – Common Ground – Free Your Mind: Battling Our Biases Author/Presenter: dade Our...
AI-Powered Cybersecurity Content Strategy: Dominating B2B Search Rankings in 2025 – Source: securityboulevard.com
Source: securityboulevard.com – Author: Deepak Gupta – Tech Entrepreneur, Cybersecurity Author The search landscape is undergoing a profound transformation driven by artificial intelligence. This detailed research...
The Significance of Cybersecurity within AI Governance – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team In everyday life, AI integration rapidly changes traditional consumers’ shopping experiences, changes work scenarios at work spots, and health provision....
The Evolution of SOC: Harnessing Data, AI and Automation – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team The modern Security Operations Center (SOC) faces an ever-growing tide of data, fueled by the explosion of connected devices, cloud...
Events Giant Legends International Hacked – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Live events giant Legends International has started notifying some employees and customers that their personal information was compromised as a...
SWE Diverse Podcast: Ep. 218: Transgender Voices in Engineering with Bree Fram
In honor of Pride Month, we spoke to Bree Fram (she/her) about her experiences in the engineering and military fields. She came out publicly as transgender...
SWE LGBTQ+ and Allies Affinity Group
Each month throughout the year, we’ll be spotlighting a SWE Affinity Group. We are excited to highlight LGBTQ+ and Allies Affinity Group. Source Views: 2
SWE Diverse Podcast: Ep 217: Celebrating International Women in Engineering Day with Neeraja Ganesh
TEDx speaker Neeraja Ganesh shares about leadership, mindset, and empowerment to advance the careers of women engineers. Source Views: 1
My Experience in SWE’s FY23 Collegiate Leadership Institute
CLI helps collegiate SWE members develop skills to succeed professionally. Learn about Grace’s experience in the program, plus how to get involved in our upcoming CLI...
SWE Celebrates Pride Month: Podcasts and Partnership
Established in the U.S. in 1970 to mark the anniversary of the Stonewall Riots, Pride Month has spread to all corners of the globe, making June...
The Gender and Racial Pay Gap in Engineering
Explore the data on pay gaps in the STEM workforce between men and women from different racial and ethnic groups. Source Views: 1
Empowering Engineering Organizations: Join the SWE A4E Program for Positive Change
Gain actionable insights on how to increase gender equality in your engineering and technology workforce and receive recognition on your commitment. Source Views: 3
Servant Leadership in STEM: How to Serve the Greater Good
Have you ever wondered how some engineering leaders steer their teams smoothly through challenging situations and emerge as winners? Here’s how to practice servant leadership to...
Multi-channel Secure Communication – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team 1.1 Emerging Cybersecurity Technologies As we move into 2025, AI and machine learning are expected to play an even larger...
Secrets Management that Delivers Real Value – Source: securityboulevard.com
Source: securityboulevard.com – Author: Amy Cohn Why is Value-Driven Secrets Management Essential in Today’s Cybersecurity Landscape? Where the importance of data has skyrocketed, making its protection...
BSidesLV24 – Common Ground – Quantum Computing: When Will It Break Public Key Cryptography? – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Home » Security Bloggers Network » BSidesLV24 – Common Ground – Quantum Computing: When Will It Break Public Key Cryptography?...
Stay Reassured with Advanced NHIDR – Source: securityboulevard.com
Source: securityboulevard.com – Author: Amy Cohn Can Advanced NHIDR Keep Your Cloud Environment Secure? Enriched with advanced technologies, potential threats also grow in complexity. One such...
Maximizing Data Protection in Healthcare – Source: securityboulevard.com
Source: securityboulevard.com – Author: Amy Cohn Understanding the Vitality of Non-Human Identities in Healthcare Data Protection What if you could significantly diminish security risks in your...
Securing Secrets: A Path to a Relaxed Audit – Source: securityboulevard.com
Source: securityboulevard.com – Author: Amy Cohn Why Is Secrets Security Essential in Today’s Digital Landscape? Is secrets security, also known as Non-Human Identities (NHIs) management, really...
Staying Ahead with Proactive Secrets Rotation – Source: securityboulevard.com
Source: securityboulevard.com – Author: Amy Cohn Why Should Organizations Prioritize Proactive Secrets Rotation? Where digital connectivity is ever-increasing, how can organizations stay one step ahead? One...

























