Let’s Celebrate International Women’s Day 365 Times a Year
By Michael Alicea · March 08, 2022
Today, we celebrate International Women’s Day, a global day for championing the social, economic, cultural, and political achievements of women. Imagine a gender equal world. A world free of bias, stereotypes and discrimination. We should all strive to achieve this. Let’s celebrate women’s achievements today, and continue to move the needle in gender equality.
What Does Gender Equality Look Like Today?
The gender effects of the COVID-19 crisis highlight the uneven progress toward gender equality. In fact, we’re in a gender-regressive scenario where we see more women staying at home with children rather than working corporate jobs.
The pandemic continues to affect everyone’s livelihood around the world, and we are seeing the economic fallout. A study done in 2020 by McKinsey states that “women’s jobs are 1.8 times more vulnerable to this crisis than men’s jobs. Women make up 39 percent of global employment but account for 54 percent of overall job losses. One reason for this greater effect on women is that the virus is significantly increasing the burden of unpaid care, which is disproportionately carried by women.”
Women in Cybersecurity
The term Great Resignation is all too familiar to those in every industry. According to the Aspen Digital Tech Policy hub’s latest report, women make up 51 percent of the population, but comprise only 24 percent of the cybersecurity workforce.
How can we continue the steady uptick in the number of women filling cybersecurity jobs? To start, technology companies need to do more to highlight, engage and develop the STEM+ skills for women and children. Secondly, companies need to understand the needs of women in the workforce and create sustainable opportunities for growth and a healthy work environment for all. Where equal opportunities, pay parity and inclusion is the norm. If we meet that need, we will exponentially drive innovation and make our companies stronger and more competitive.
So, on this day let’s acknowledge that we have more to do every day of the year.
Trellix Makes Moves Towards Gender Equality
I’m excited to share our partnership with Gotara, a global career growth platform for women in STEM+. Gotara's STAR Programs covers mentoring, upskilling, and are designed to advance the careers of an estimated 30 million women worldwide.
Our vision is to deliver living security to our customers through technology that learns and adapts in real-time. And our employees benefit from living career development tools with the collaboration with Gotara. I strongly believe our employees deserve more from their workplace, especially during the Great Resignation. My team and I are committed in investing in our people to ensure we are a home for diverse talent and advanced innovation.
Resources and Ways to Celebrate & GiveRegister for the IWD Community Access IWD resources for children Learn how organizations support women Download the IWD Lean In resources Watch the IWD videos Create IWD social media cards Access IWD LinkedIn Learning resources Five Nonprofits Driving A Revolution In STEM Education
Sep 28, 2022
Trellix Empowers Next Generation of Cybersecurity Talent at Xpand Live
Sep 28, 2022
Trellix Accelerates Channel Success Through Unified Partner Program and Expanded Security Innovation Alliance
Sep 28, 2022
Trellix Expands XDR Platform to Transform Security Operations
Sep 26, 2022
60% of Cybersecurity Professionals Feel They Are Losing Ground Against Cybercriminals
Sep 21, 2022
Trellix Launches Advanced Research Center, Finds Estimated 350K Open-Source Projects at Risk to Supply Chain Vulnerability
By Britt Norwood · August 30, 2022
Our team understands the critical role organizations like AWS play in efforts to drive premium threat detection no matter a customer’s security architecture. We continuously look for partners with a similar desire to grow and innovate to relieve pain points for SecOps teams.
This blog is the third and final of a multi-part series focused on vulnerability discovery in a widely used access control system and describes our research journey from target acquisition all the way through exploitation, beginning with the vendor and product selection and a deep dive into the hardware hacking techniques.
Get the latest
We’re no strangers to cybersecurity. But we are a new company.
Stay up to date as we evolve.