{"id":38916,"date":"2023-03-04T05:49:09","date_gmt":"2023-03-04T10:49:09","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=38916"},"modified":"2023-10-20T04:46:56","modified_gmt":"2023-10-20T08:46:56","slug":"women-shaped-cybersecurity","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/women-shaped-cybersecurity\/38916\/","title":{"rendered":"We should all know about these women who shaped cybersecurity"},"content":{"rendered":"<p>According to Cybercrime Magazine research, <a href=\"https:\/\/cybersecurityventures.com\/women-in-cybersecurity-report-2022\/\" target=\"_blank\" rel=\"noopener nofollow\">women held 25 percent of cybersecurity jobs globally in 2022<\/a>. Surely cyber and computing careers are for everyone. So why are many women tuning out?<\/p>\n<p>Today\u2019s working wisdom is that <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/diverse-it-teams\/36687\/\" target=\"_blank\" rel=\"noopener nofollow\">diversity benefits teams<\/a>, but there\u2019s slow progress in getting more women to join technology-led careers and keeping them on board.<\/p>\n<blockquote><p>Many assume male-majority teams have always been the norm in computing and security technologies. But looking back, women have been at the center of creating the computing technology we use today.<\/p>\n<\/blockquote>\n<h2>Human computers: The first data scientists<\/h2>\n<p>The word \u2018computer,\u2019 coined in 1613, was first used for humans who performed computation. Many of the best were women: <a href=\"https:\/\/en.wikipedia.org\/wiki\/Nicole-Reine_Lepaute\" target=\"_blank\" rel=\"noopener nofollow\">Nicole-Reine Etable de la Bri\u00e8re Lepaute\u00a0helped predict Halley\u2019s Comet\u2019s return<\/a> in 1758. A century later, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Maria_Mitchell\" target=\"_blank\" rel=\"noopener nofollow\">Maria Mitchell plotted the planet Venus\u2019s motion<\/a>, earning an astronomy professorship.<\/p>\n<p>When the\u00a0US Civil War ended in 1865, war widows needed to support themselves. Women were hired as human computers. <a href=\"https:\/\/www.nsa.gov\/portals\/75\/documents\/news-features\/declassified-documents\/crypto-almanac-50th\/Madame_X_Agnes_Meyer_Driscoll.pdf\" target=\"_blank\" rel=\"noopener nofollow\">Agnes Meyer Driscoll, known as \u2018Madame X,\u2019 led the decoding of Japanese ciphers and manuals<\/a> for the US during both world wars.<\/p>\n<h2>Women solved the ultimate Enigma<\/h2>\n<p>Britain\u2019s <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cryptanalysis_of_the_Enigma\" target=\"_blank\" rel=\"noopener nofollow\">Alan Turing is famed for cracking the Nazi\u2019s \u2018Enigma\u2019 code<\/a> during World War II, but it wasn\u2019t the work of a lone genius. Of <a href=\"https:\/\/medium.com\/the-internet-of-women\/the-uk-s-history-of-pioneering-women-in-cybersecurity-cf99520b97ba\" target=\"_blank\" rel=\"noopener nofollow\">Bletchley Park\u2019s codebreaking team, 75 percent were women<\/a>.<\/p>\n<p>Turing\u2019s colleague <a href=\"https:\/\/en.wikipedia.org\/wiki\/Joan_Clarke\" target=\"_blank\" rel=\"noopener nofollow\">Joan Clarke\u00a0worked out how to speed up decoding double-encrypted messages<\/a>, but unlike many of her male colleagues, her technique wasn\u2019t named after her. Clarke\u2019s job title didn\u2019t match her expertise \u2013 there was no \u2018senior female cryptanalyst\u2019 role, so she was given the job title \u2018linguist.\u2019<\/p>\n<blockquote><p>Turing said human computers are \u201csupposed to be following fixed rules; he has no authority to deviate from them in any detail.\u201d Women\u2019s subservience in society played to this ideal, but Turing\u2019s codebreakers succeeded because they used the same abilities security analysts use today: Logic, methodology and data analysis.<\/p>\n<\/blockquote>\n<h2>Painstaking calculation devalued as \u2018kilo-girls\u2019<\/h2>\n<p>The dominance of women as human computers cloaked an inconvenient truth. Their work was on average better, and they were cheaper than male counterparts. The <a href=\"https:\/\/en.wikipedia.org\/wiki\/Harvard_Computers\" target=\"_blank\" rel=\"noopener nofollow\">Harvard Computers, mockingly called \u201cPickering\u2019s harem,\u201d supported Edward Pickering at Harvard Observatory in the 1880s<\/a>, doing work men and scholars found tedious, unpaid or at a fraction of what men earned.<\/p>\n<p>The term \u2018kilo-girl\u2019 came about in the 1940s to describe complex calculations seen as \u2018women\u2019s work.\u2019 We measure computing power in gigabytes or terabytes, but they measured <a href=\"https:\/\/www.theatlantic.com\/technology\/archive\/2013\/10\/computing-power-used-to-be-measured-in-kilo-girls\/280633\/\" target=\"_blank\" rel=\"noopener nofollow\">kilo-girl hours \u2013 one kilo-girl was a thousand hours of painstaking calculations<\/a>. The kilo-girls work was far from trivial: In the 1950s, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Gladys_West\" target=\"_blank\" rel=\"noopener nofollow\">Gladys West\u2019s calculations for the US Naval Weapons Laboratory led to GPS\u2019s development<\/a>.<\/p>\n<h2>Computing becomes a man\u2019s world<\/h2>\n<p>By the 1960s, human computing had given way to machines. <a href=\"https:\/\/mitpress.mit.edu\/books\/programmed-inequality\" target=\"_blank\" rel=\"noopener nofollow\">In the 1940s programmers were mostly women, but by the end of the 1960s women made up 30 to 50 percent<\/a>. Women were still paid less and few were promoted to leadership.<\/p>\n<p>The perception computing is for men and boys started at home. A 1984 report showed 1 in 5 girls used a computer at home, compared with 1 in 2 boys. <a href=\"https:\/\/text.npr.org\/357629765\" target=\"_blank\" rel=\"noopener nofollow\">Female computer science graduates peaked in 1984 at 37 percent, before steadily declining<\/a>. Academic Wendy Hall says by the 1990s, <a href=\"https:\/\/www.theguardian.com\/lifeandstyle\/2017\/aug\/08\/why-are-there-so-few-women-in-tech-the-truth-behind-the-google-memo\" target=\"_blank\" rel=\"noopener nofollow\">men led professional computing and computers \u201cwere sold as toys for boys.\u201d<\/a><\/p>\n<h2>Ten women from computer history to know<\/h2>\n<h3>Ada Lovelace invents the first algorithm<\/h3>\n<p>Publishing the first algorithm in 1843, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Ada_Lovelace\" target=\"_blank\" rel=\"noopener nofollow\">Ada Lovelace<\/a> is said to be the world\u2019s first computer programmer. She realized <a href=\"https:\/\/en.wikipedia.org\/wiki\/Analytical_Engine\" target=\"_blank\" rel=\"noopener nofollow\">Charles Babbage\u2019s Analytical Engine<\/a> could do more than calculation: Combining mathematics and analysis. <a href=\"https:\/\/findingada.com\/\" target=\"_blank\" rel=\"noopener nofollow\">Ada Lovelace Day<\/a> celebrates women\u2019s achievements in science, technology, engineering and maths (STEM) and encourages young women to follow her path.<\/p>\n<h3>Hedy Lamarr averts the Cuban Missile Crisis<\/h3>\n<p>1940s Hollywood actress <a href=\"https:\/\/en.wikipedia.org\/wiki\/Hedy_Lamarr\" target=\"_blank\" rel=\"noopener nofollow\">Hedy Lamarr<\/a>\u00a0co-invented a frequency-hopping method to control torpedoes remotely without the risk of signal tracking or jamming. Naval ships were using the technology by the 1962 <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cuban_Missile_Crisis\" target=\"_blank\" rel=\"noopener nofollow\">Cuban Missile Crisis<\/a>. It later became part of Bluetooth and Wi-Fi.<\/p>\n<h3>Grace Hopper invents new ways to code<\/h3>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Grace_Hopper\" target=\"_blank\" rel=\"noopener nofollow\">Grace Hopper<\/a>\u00a0created the first\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Compiler\" target=\"_blank\" rel=\"noopener nofollow\">compiler<\/a>\u00a0for a\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Programming_language\" target=\"_blank\" rel=\"noopener nofollow\">programming language<\/a>. She programmed and wrote a comprehensive manual for an electro-mechanical computer based on Babbage and Lovelace\u2019s Analytical Engine, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Harvard_Mark_I\" target=\"_blank\" rel=\"noopener nofollow\">Harvard Mark I<\/a>. She wasn\u2019t credited for this but is <a href=\"https:\/\/www.computerworld.com\/article\/2515435\/moth-in-the-machine--debugging-the-origins-of--bug-.html\" target=\"_blank\" rel=\"noopener nofollow\">widely miscredited for coining the term \u2018bug\u2019<\/a> when a moth caused her computer to malfunction. She later developed computer programming language <a href=\"https:\/\/en.wikipedia.org\/wiki\/COBOL\" target=\"_blank\" rel=\"noopener nofollow\">COBOL<\/a>\u00a0(common business-oriented language) and invented new symbolic ways to write code.<\/p>\n<h3>Margaret Hamilton took us to the moon<\/h3>\n<p>The 1969 moon landing wouldn\u2019t have happened without <a href=\"https:\/\/en.wikipedia.org\/wiki\/Margaret_Hamilton_(scientist)\" target=\"_blank\" rel=\"noopener nofollow\">Margaret Hamilton<\/a>, who programmed Apollo\u2019s flight software.It needed more \u2018human computing:\u2019 After Hamilton\u2019s programming, seamstresses hardwired the code by threading copper wire through magnetic rings.<\/p>\n<h3>Elizabeth \u201cJake\u201d Feinler organized the internet<\/h3>\n<p>At Stanford University in 1969,\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Elizabeth_J._Feinler\" target=\"_blank\" rel=\"noopener nofollow\">Elizabeth \u201cJake\u201d Feinler<\/a> created the first internet directory, <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/50-years-internet\/31957\/\" target=\"_blank\" rel=\"noopener nofollow\">ARPANET<\/a>, alongside mostly female staff. By the early 1970s, they\u2019d put together the first\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/WHOIS\" target=\"_blank\" rel=\"noopener nofollow\">WHOIS<\/a>\u00a0directory of web domain ownership. Feinler suggested categorizing domains by where the computer was, like .edu domains for educational institutions.<\/p>\n<h3>Women who built new audiences for technology<\/h3>\n<p>Organizing, building relationships and human factors \u2013 often thought of as female traits \u2013 are critical in computing projects\u2019 success and creating demand for new services. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Joan_Ball\" target=\"_blank\" rel=\"noopener nofollow\">Joan Ball<\/a> set up the first computer-aided dating service in 1964. In 1988, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Stacy_Horn\" target=\"_blank\" rel=\"noopener nofollow\">Stacy Horn<\/a> started a community in New York, the East Coast Hang Out (ECHO,) where users could chat online. Game designer\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Brenda_Laurel\" target=\"_blank\" rel=\"noopener nofollow\">Brenda Laurel<\/a>\u2018s research showed girls wanted to play more interactive character computer games. In the 1990s, her company <a href=\"https:\/\/en.wikipedia.org\/wiki\/Rockett%27s_New_School\" target=\"_blank\" rel=\"noopener nofollow\">Purple Moon developed a best-selling game series inspired by that research<\/a>.<\/p>\n<p>In the 1970s,\u00a0<a href=\"https:\/\/en.wikipedia.org\/w\/index.php?title=Joan_Margaret_Winters&amp;action=edit&amp;redlink=1\" target=\"_blank\" rel=\"noopener nofollow\">Joan Margaret Winters<\/a>\u00a0researched how software should consider\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Human_Factors_in_Engineering_and_Design\" target=\"_blank\" rel=\"noopener nofollow\">human factors<\/a> for IBM\u2019s SHARE project. When you see the iconic trash symbol on your Apple Mac, thank <a href=\"https:\/\/en.wikipedia.org\/wiki\/Susan_Kare\" target=\"_blank\" rel=\"noopener nofollow\">Susan Kare<\/a>. She worked with Steve Jobs\u00a0to design its original icons.<\/p>\n<h2>Today\u2019s influencers for women in cybersecurity<\/h2>\n<p>When young people see people who look like them succeed in a career, they\u2019re more likely to choose it. For women considering going into cybersecurity, there\u2019s no shortage of inspiration.<\/p>\n<p><a href=\"https:\/\/twitter.com\/laparisa\" target=\"_blank\" rel=\"noopener nofollow\">Parisa Tabriz<\/a>, the self-styled \u201cSecurity Princess\u201d (official title: Director of Engineering,) runs Google\u2019s security testing labs. <a href=\"https:\/\/twitter.com\/evacide\" target=\"_blank\" rel=\"noopener nofollow\">Eva Galperin<\/a>, Director of Cybersecurity at Electronic Freedom Foundation (EFF,) fights for digital privacy, security and civil liberties.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/_xqEldPA_xA?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p><em>Eva Galperin helps women secure their devices against stalkers and spying ex-partners.<\/em><\/p>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Rebecca_Bace\" target=\"_blank\" rel=\"noopener nofollow\">Rebecca Bace<\/a>\u2018s threat intrusion detection work at the US National Security Agency contributed to famous hacker <a href=\"https:\/\/en.wikipedia.org\/wiki\/Kevin_Mitnick\" target=\"_blank\" rel=\"noopener nofollow\">Kevin Mitnick<\/a>\u2018s arrest. The cybersecurity community nicknamed her \u2018Den Mother\u2019 for her vital mentorship and advice and posthumously <a href=\"https:\/\/en.wikipedia.org\/wiki\/National_Cyber_Security_Hall_of_Fame#Hall_of_Fame_Class_of_2019\" target=\"_blank\" rel=\"noopener nofollow\">inducted her into the 2019 Cyber Security Hall of Fame.<\/a><\/p>\n<p>Dr. Anne-Marie Imafidon MBE creates <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/stemettes-stem-training\/36178\/\" target=\"_blank\" rel=\"noopener nofollow\">skills training and certification to encourage young women to pursue cyber careers through her company Stemettes<\/a>. <a href=\"https:\/\/jane-frankland.com\/\" target=\"_blank\" rel=\"noopener nofollow\">Jane Frankland<\/a>, security entrepreneur and author of <a href=\"https:\/\/www.amazon.com\/InSecurity-Failure-Attract-Retain-Cybersecurity\/dp\/178133269X\" target=\"_blank\" rel=\"noopener nofollow\">InSecurity: Why a failure to attract and retain women in cybersecurity is making us all less safe<\/a>,\u00a0helps the C-Suite (senior management) attract and retain women in cybersecurity.<\/p>\n<h2>Attracting and retaining more women in IT careers<\/h2>\n<p><a href=\"https:\/\/www.wisecampaign.org.uk\/latest-workforce-statistics-released-april-2023\/\" target=\"_blank\" rel=\"noopener nofollow\">In the UK in 2022, just 19 percent of IT professionals were women<\/a>. But in many countries, such as those in Central Asia, women make up nearly half of the IT workforce. It\u2019s the <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/women-tech-holding-back\/33849\/\" target=\"_blank\" rel=\"noopener nofollow\">gender-equality paradox<\/a>: In countries with less gender equality, educated women seek careers with more income security, while in countries with better gender equality, women avoid careers said to discriminate against women.<\/p>\n<p>There are green shoots of progress. <a href=\"https:\/\/wit.kaspersky.com\/\" target=\"_blank\" rel=\"noopener\">Kaspersky\u2019s Women in tech report<\/a> surveyed women in four global regions. Encouragingly, 57 percent say gender equality is improving in their organization. Despite this, 44 percent think male colleagues progress faster.<\/p>\n<p>In the report, Dr. Ronda Zelezny-Green, Co-Founder and Director of Panoply Digital, says change is slow because \u201ctoo much activity around gender equality in IT focuses on one-off gimmicks and band-aid solutions that can be spotlighted in the press, instead of focusing on female employees and actions that will make a sustained difference in their professional lives.\u201d<\/p>\n<p>Dr. Zelezny-Green thinks we should entice more women into the industry by creating new products and services for women. <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/ai-emotionally-intelligent-recruitment\/37863\/\" target=\"_blank\" rel=\"noopener nofollow\">Widely-reported diversity problems with Artificial intelligence (AI)<\/a> could be seen as an opportunity: \u201cThere\u2019s huge potential in telling the stories of <a href=\"https:\/\/ars.electronica.art\/outofthebox\/en\/gender-shades\/\" target=\"_blank\" rel=\"noopener nofollow\">Timnit Gebreu and Joy Buolamwini<\/a>, black women leading the charge for more ethical and inclusive AI design. These stories make inroads in IT and tech roles where women are currently underrepresented.\u201d<\/p>\n<p>In a prosperous future, we won\u2019t need to ask \u201cWhere are the women in cyber?\u201d They\u2019re not hiding under the desk. They\u2019re making change, but in another industry. We\u2019re on the right path, but it\u2019s a long journey ahead. With more women, we can better create products that represent users and benefit from a gender-equal computing industry.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>More women would follow cyber careers if we remembered women&#8217;s long history of vital contributions to the industry, going back to the birth of computing.<\/p>\n","protected":false},"author":2521,"featured_media":38917,"template":"","coauthors":[3452],"class_list":{"0":"post-38916","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-cybersecurity-training-cybersecurity","7":"emagazine-category-opinions","8":"emagazine-category-talent-business","9":"emagazine-tag-careers","10":"emagazine-tag-education","11":"emagazine-tag-history","12":"emagazine-tag-women"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/women-shaped-cybersecurity\/38916\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/secure-futures-magazine\/women-shaped-cybersecurity\/24612\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/secure-futures-magazine\/women-shaped-cybersecurity\/22640\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/38916","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2521"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/38917"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=38916"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=38916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}