Each month throughout the year, we’ll be spotlighting a SWE Affinity Group. We are excited to highlight SWE’s Technical Career Path Affinity Group! Source Views: 2
Year: 2025
2023 WE Local U.S. Recap: Uniting Women in Engineering at Three Inspiring Conferences
Explore the achievements and takeaways from our 2023 WE Local conferences in Detroit, Hartford, and Seattle. Source Views: 0
2023 WE Local Barcelona Recap: A Global Event for Women in Engineering
Discover the highlights and international impact of the 2023 WE Local Barcelona conference, including cultural exchanges and professional development opportunities. Source Views: 0
2023 WE Local Bengaluru Recap: Empowering Women Engineers in India and Beyond
Read the highlights from our 2023 WE Local Bengaluru conference that attracted participants from across India, plus from eight additional countries! Source Views: 1
A Safe Space for Tech Employees: Encouraging Engineers to Speak Up
In the tech sector, employees often feel intimidated to speak up. Use these 6 strategies to encourage contributions from your engineering team. Source Views: 1
SWE Diverse Podcast Ep 220: Navigating Change with Teren Branson of Fortune Brands Innovations
In this episode, Teren Branson of Fortune Brands Innovations shares how to navigate change and resist the urge to “do it all” as a woman leader...
Rediscovering the SWE Members in Small Businesses Affinity Group
Each month throughout the year, we spotlight a SWE Affinity Group. This month, we are excited to highlight the SWE Members in Small Businesses AG. Source...
When AI moves beyond human oversight: The cybersecurity risks of self-sustaining systems – Source: www.csoonline.com
Source: www.csoonline.com – Author: What happens when AI cybersecurity systems start to rewrite themselves as they adapt over time? Keeping an eye on what they’re doing...
Will politicization of security clearances make US cybersecurity firms radioactive? – Source: www.csoonline.com
Source: www.csoonline.com – Author: Following Trump’s executive order to strip SentinelOne of its security clearances, many wonder if CISOs will soon put American security firms in...
Mit der Firmenübernahme steigt das Angriffsrisiko – Source: www.csoonline.com
Source: www.csoonline.com – Author: News-Analyse 17. Apr. 20254 Minuten CSO und CISOMergers and AcquisitionsSicherheitspraktiken Der Zeitraum zwischen Akquise und vollständiger Integration eines Unternehmens ist sicherheitstechnisch besonders...
CVE-Finanzierung weiterhin gesichert – Source: www.csoonline.com
Source: www.csoonline.com – Author: News 17. Apr. 20255 Minuten Öffentliche VerwaltungSicherheitThreat and Vulnerability Management Nach 25 Jahren sollte die Finanzierung der Datenbank eingestellt werden. Jetzt hat...
Hackers target Apple users in an ‘extremely sophisticated attack’ – Source: www.csoonline.com
Source: www.csoonline.com – Author: The bugs, found in Apple’s CoreAudio and RPAC components, enabled code execution and memory corruption attacks. Apple is urging immediate patching of...
Neue ResolverRAT-Malware zielt auf Gesundheitsbranche – Source: www.csoonline.com
Source: www.csoonline.com – Author: Sicherheitsforscher warnen vor einer neuen Malware, die bei Angriffen auf Healthcare- und Pharmaunternehmen eingesetzt wird. Der neue Remote Access Trojaner ResolverRAT nutzt...
The Future of SSL Certificate Management: Adapting to Shortened Renewal Periods – Source: securityboulevard.com
Source: securityboulevard.com – Author: Michael Wright The industry is evolving yet again. With the CA/Browser Forum’s recent decision to reduce the maximum SSL/TLS certificate lifecycle to...
How to Ensure Security in Cloud Compliance – Source: securityboulevard.com
Source: securityboulevard.com – Author: Amy Cohn Why is Cloud Security of Paramount Importance? It’s a well-acknowledged fact, isn’t it, that our reliance on cloud services has...
Securing Cloud Data: A Relief for CFOs – Source: securityboulevard.com
Source: securityboulevard.com – Author: Amy Cohn Are Interactions in Your Digital Environment Truly Secure? Cybersecurity has grown beyond the protection of human accounts alone. Increasingly, the...
Cut CAPTCHA Fatigue & Boost Conversions with Device Check – Source: securityboulevard.com
Source: securityboulevard.com – Author: Christine Falokun The constant battle between cybersecurity and automated threats has led to the widespread use of CAPTCHA challenges. Although widely used...
NIST’s adversarial ML guidance: 6 action items for your security team – Source: securityboulevard.com
Source: securityboulevard.com – Author: Robert L. Mitchell The National Institute of Standards and Technology’s latest guidance, on how to secure artificial intelligence (AI) applications against manipulation...
BSidesLV24 – Common Ground – Security for AI Basics – Not by ChatGPT – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Home » Security Bloggers Network » BSidesLV24 – Common Ground – Security for AI Basics – Not by ChatGPT Author/Presenter:...
CSP FY: A Magecart Attack That Dodges Policy—and Makes a Joke While Doing It – Source: securityboulevard.com
Source: securityboulevard.com – Author: Scott Fiesel by Source Defense When attackers are clever enough to name their cookie “csp_f_y,” you know they’re not just exfiltrating data—they’re...
Colortokens Named a Visionary by EMA in the Vendor Vision 2025 Report! – Source: securityboulevard.com
Source: securityboulevard.com – Author: Mudra Goyal We’re thrilled to announce that ColorTokens has been named a Visionary in the Enterprise Management Associates’ (EMA) Vendor Vision for...
Randall Munroe’s XKCD ‘The Roads Both Taken’ – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Friday, April 18, 2025 Security Boulevard The Home of the Security Bloggers Network Community Chats Webinars Library Home Cybersecurity News...
Time to Migrate from On-Prem to Cloud? What You Need to Know – Source: securityboulevard.com
Source: securityboulevard.com – Author: Andy Suderman Migrating from on-premises infrastructure to the cloud is an important step for any business seeking to modernize operations, improve scalability,...
‘No AI Agents are Allowed.’ EU Bans Use of AI Assistants in Virtual Meetings – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Fiona Jackson Image: Guillaume Périgois/Unsplash The EU is banning the use of AI-powered virtual assistants during online meetings. Such assistants are often...
Apple Patches Two Zero-Days Used in ‘Extremely Sophisticated’ Attacks – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Aminu Abdullahi Published April 17, 2025 Find out the specifics of these iOS and macOS vulnerabilities, as well as which Apple devices...
Network Security at the Edge for AI-ready Enterprise – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: StudioA by TechnologyAdvice Modern enterprises are adopting AI applications, particularly generative AI (GenAI), at a rapid rate. This adds new network security...
NTLM Hash Exploit Targets Poland and Romania Days After Patch – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A vulnerability allowing attackers to leak NTLM authentication hashes with minimal user interaction has been actively exploited just days after Microsoft released...
Senators Urge Cyber-Threat Sharing Law Extension Before Deadline – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A push to extend a key cybersecurity law that enables information sharing between the private sector and government has gained bipartisan momentum...
Identity Attacks Now Comprise a Third of Intrusions – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Threat actors ramped up credential theft over the past year, using AI-generated phishing emails and infostealer malware to improve their results, according...
Microsoft Thwarts $4bn in Fraud Attempts – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Microsoft has blocked billions of dollars’ worth of fraud and scams over the course of the past year as threat actors increase...





















