Honor Code: The Women Behind Today’s Digital Revolution
Over the next few weeks, we’ll feature a series of interviews with women working in web application development, IT, software development, coding, and cybersecurity. Feroot is proud to support women in these technical fields. As bad actors flood the internet, careers in coding and cybersecurity offer women the opportunity to truly create a safe digital landscape for all.
More women wanted in cybersecurity and software development
While women make up 51% of the US population, only 25% of cybersecurity workforces are women, according to estimates from Women in CyberSecurity (WiCyS). Women IT workers face similar gender gap challenges. A 2019 study on “Gender Trends in Computer Fatheringby researchers at Cornell University, found that women accounted for only 27% of published computer science research. Similarly, only about 20% of computer science graduates are women. Much of this gap stems from negative connotations about women in computer science fields, according to the American Association of University Women. Researchers also suggest that the US education system places less emphasis on girls learning computer science than boys. Moreover, in an industry dominated by men, women lack role models.
Women Can Fill the Cybersecurity Void
With the cybersecurity skills gap being an ongoing and growing challenge, tapping into the untapped potential of women could solve the problem. By focusing on recruiting, retaining, and advancing women in cybersecurity, organizations can not only close the gap, but also expand the cultural diversity of their employees. Tactics including cybersecurity and coding training opportunities, mentorship programs and internships for women.
Check out these badass women!
While you wait to read our interviews, we encourage you to check out these articles about talented and tough women working in cybersecurity and software development.
Learn more about client-side security
To learn more about client-side security, check out our new e-book: The Ultimate Guide to Client-Side Security.
*** This is a syndicated blog from the Security Bloggers Network of Feracin written by Mary. Read the original post at: https://www.feroot.com/blog/https-www-feroot-com-blog-code-of-honor-the-women-of-software-development-and-cybersecurity/