{"id":93815,"date":"2021-06-25T11:00:30","date_gmt":"2021-06-25T18:00:30","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=93815"},"modified":"2023-05-15T23:01:14","modified_gmt":"2023-05-16T06:01:14","slug":"encouraging-women-to-embrace-their-cybersecurity-superpowers","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/","title":{"rendered":"Encouraging women to embrace their cybersecurity superpowers"},"content":{"rendered":"

The cybersecurity challenges of today require a diversity of skills, perspectives, and experiences, yet women remain underrepresented in this field. On International Women\u2019s Day, some Microsoft Security women leaders penned a powerful blog<\/a> highlighting the underrepresentation of women in cybersecurity (women make up just 24 percent of the cybersecurity workforce, according to the 2019 (ISC)\u00b2 report, Cybersecurity Workforce Study: Women in Cybersecurity1<\/sup>), and the critical need for diverse perspectives in solving 21st Century cybersecurity challenges. While recent studies2 <\/sup>indicate an increase in the percentage of women in cybersecurity, they remain the minority of the workforce.<\/p>\n

Women in cybersecurity<\/h2>\n

How do girls identify their superpowers in cybersecurity while women continue to make gains?<\/em> To explore this key question, Microsoft Security<\/a> in partnership with Girl Security<\/a>, a nonpartisan, nonprofit organization preparing girls, women, and gender minorities for careers in national security, co-hosted an event on April 27, 2021, alongside thirty or more girls and women in high school and university from across the United States and globally.<\/p>\n

Joining the Girl Security participants was an extraordinary panel of women in cybersecurity from Microsoft Security, including Amy Hogan-Burney<\/a>, General Manager of the Digital Crimes Unit, Associate General Counsel, Microsoft; Vasu Jakkal<\/a>, Corporate Vice President, Microsoft Security, Compliance, and Identity; Ann Johnson<\/a>, Corporate Vice President of Security, Compliance, and Identity, Business Development; Edna Conway<\/a>, Vice President, Chief Security and Risk Officer, Azure Microsoft Corporation; and Valecia Maclin<\/a>, General Manager Engineering, Customer Security and Trust, Microsoft Corporation.<\/p>\n

Girl Security and Microsoft Security are forging a new fellowship around a shared commitment to make cybersecurity more accessible to all, especially girls and women who remain underrepresented in the cybersecurity workforce. This first co-hosted event offered an exciting opportunity for participants to ask firsthand questions and participate in intimate breakout sessions with a diverse group of leading experts. Importantly, participants were able to hear women experts share personal narratives that described their unique\u2014and often non-linear\u2014pathways into cybersecurity.<\/p>\n

Security requires all<\/h2>\n

Vasu Jakkal<\/strong>, who leads Microsoft Security, Compliance, and Identity strategy, kicked off the event with a simple but powerful message: \u201cSecurity is for all, and security requires all.\u201d Over the one-hour program, the group explored a wide-ranging series of topics that included career-oriented questions, such as the importance of certifications to recruiters and pathways into cybersecurity, as well as topics on advances in the field, such as emerging cybersecurity threats, the impact of quantum cryptography and artificial intelligence on the digital landscape, and the intersection of policy and security.<\/p>\n

When asked how someone with a humanities background might consider a pathway in cybersecurity, Valecia Maclin<\/strong> poignantly noted that cybersecurity is a complex field with many components, including law, policy, technical competencies, and more. She emphasized the need for professionals who can bridge the gaps between those areas, but also work within them. In addition, she added that beginning one\u2019s career in one area of cybersecurity does not preclude a transition into other areas of cybersecurity. In response to a question posed to all panelists, Maclin noted that her cybersecurity \u201csheros\u201d included the long unsung African American women codebreakers who provided crucial intelligence to the United States during WWII.<\/p>\n

The many pathways of a cybersecurity career<\/h2>\n

The narrative that pathways into cybersecurity are nonlinear is a crucial message for girls and women who may not perceive their own technical competencies or seek to pursue more technical careers, but whose strengths and interests may lie in the field\u2019s myriad tracts. Girl Security works with girls, women, and gender minorities across the United States and globally to convey the message that girls already have the competencies they need to excel in security\u2019s many pathways. Additionally, Girl Security is exploring the best analytical approaches to better understanding girls\u2019 interests in cybersecurity. Combining an equity-informed approach to existing STEM models assessing girls\u2019 interests and pathways can offer important insights into needed interventions.<\/p>\n

As the field continues to forge new, crucial approaches to supporting girls\u2019 interests in cybersecurity, reaffirming that there is no one \u201cright\u201d path into cybersecurity offers timely reassurance to girls and women amid a more challenging pandemic economy. One high school participant noted that she was graduating high school and pursuing community college. Another participant, who was transferring from community college into UC Berkeley, jumped in to reassure her that community colleges offer many pathways into the field. Jakkal, in response to observing the participants\u2019 positive support, highlighted the importance of building peer and lateral networks at the onset and throughout one\u2019s career.<\/p>\n

Edna Conway<\/strong>, who began her career in law, emphasized the value of career twists and turns. Detours, she noted, can provide invaluable experience. She added that the most important aspect of any career is bringing one\u2019s whole self to the job and appreciating the process. She explained, \u201cUnderstand what gives you energy and follow that.\u201d Ann Johnson<\/strong>, who leads Microsoft\u2019s security and compliance road map across industries worldwide, agreed: \u201cBring who you are to what you do.” Conway also noted that women tend to have an inclination toward critical thinking and problem solving, making them particularly qualified for cybersecurity challenges. And in the event of a professional roadblock? Johnson reassured participants: \u201cAs for help, don’t take no for an answer. You’re going to stumble and that\u2019s ok.\u201d<\/p>\n

Amy Hogan-Burney<\/strong>, who holds a law degree and began her career as an attorney with the U.S. Department of Justice and Federal Bureau of Investigation, now leads Microsoft\u2019s Digital Crimes Unit<\/a>, a global team of attorneys, investigators, engineers, and analysts working to fight cybercrime. She encouraged participants to trust their instincts, noting, \u201cIt is easy to make things hard and hard to make things easy, so trust yourself and trust your capabilities and ask questions.\u201d<\/p>\n

Girl Security participants offered meaningful feedback following the event about the importance of visible women role models in cybersecurity, the value of \u201cface-to-face\u201d (albeit virtual) interaction with women leaders, and the need for additional programming that highlights the field\u2019s diverse pathways. As one participant noted, \u201cI never realized how broad the field is. It\u2019s exciting to think my interests could lead to a career!\u201d<\/p>\n

What\u2019s next<\/h2>\n

As part of this exciting new partnership, Girl Security and Microsoft Security will continue to host programming and cybersecurity education. On June 28, 2021, at 4 PM CST, Girl Security and Sara Manning Dawson<\/a>, Chief Technology Officer, Enterprise Security at Microsoft, will conduct a session on disinformation, cybersecurity, and national security alongside budding cybersecurity leader Kyla Guru for Girl Con<\/a>\u2014an international tech conference (for high school students, by high school students) aiming to empower the next generation of female leaders. In addition, Girl Security and Microsoft Security will join forces for a new leadership program on cybersecurity for the Girl Scouts Greater Chicago, Northwest Indiana, and more. Sign up to be the first to learn about new Girl Security and Microsoft Security events<\/a>.<\/p>\n

To learn more about Microsoft Security solutions,\u00a0visit our\u00a0website<\/a>. Bookmark the\u00a0Security blog<\/a>\u00a0to keep up with our expert coverage on security matters. Also, follow us at\u00a0@MSFTSecurity<\/a>\u00a0for the latest news and updates on cybersecurity.<\/p>\n

 <\/p>\n


\n

1<\/sup>Cybersecurity Workforce Study: Women in Cybersecurity<\/a>, (ISC)\u00b2 Cybersecurity Workforce Report, 2019.<\/p>\n

2<\/sup>(ISC)\u00b2 survey shows women increasingly embracing cybersecurity as a career path<\/a>, Security, BNP Media, July 21, 2020.<\/p>\n","protected":false},"excerpt":{"rendered":"

The cybersecurity challenges of today require a diversity of skills, perspectives, and experiences, yet women remain underrepresented in this field. Girl Security and Microsoft Security are forging a new fellowship around a shared commitment to make cybersecurity more accessible to all, especially girls and women.<\/p>\n","protected":false},"author":106,"featured_media":93818,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3662],"topic":[3683],"products":[],"threat-intelligence":[],"tags":[3822],"coauthors":[2587],"class_list":["post-93815","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-news","topic-security-management","tag-microsoft-security-insights"],"yoast_head":"\nEncouraging women to embrace their cybersecurity superpowers | Microsoft Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Encouraging women to embrace their cybersecurity superpowers | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"The cybersecurity challenges of today require a diversity of skills, perspectives, and experiences, yet women remain underrepresented in this field. Girl Security and Microsoft Security are forging a new fellowship around a shared commitment to make cybersecurity more accessible to all, especially girls and women.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-25T18:00:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-16T06:01:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/06\/CLO20b_Aline_Preeti_office_001.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lauren Buitta\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/06\/CLO20b_Aline_Preeti_office_001.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lauren Buitta\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/lauren-buitta\/\",\"@type\":\"Person\",\"@name\":\"Lauren Buitta\"}],\"headline\":\"Encouraging women to embrace their cybersecurity superpowers\",\"datePublished\":\"2021-06-25T18:00:30+00:00\",\"dateModified\":\"2023-05-16T06:01:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/\"},\"wordCount\":1214,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/06\/CLO20b_Aline_Preeti_office_001.jpg\",\"keywords\":[\"Microsoft Security Insights\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/\",\"name\":\"Encouraging women to embrace their cybersecurity superpowers | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/06\/CLO20b_Aline_Preeti_office_001.jpg\",\"datePublished\":\"2021-06-25T18:00:30+00:00\",\"dateModified\":\"2023-05-16T06:01:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/06\/CLO20b_Aline_Preeti_office_001.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/06\/CLO20b_Aline_Preeti_office_001.jpg\",\"width\":1200,\"height\":800,\"caption\":\"Two female developers collabaorating in their enterprise office space.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encouraging women to embrace their cybersecurity superpowers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Encouraging women to embrace their cybersecurity superpowers | Microsoft Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/","og_locale":"en_US","og_type":"article","og_title":"Encouraging women to embrace their cybersecurity superpowers | Microsoft Security Blog","og_description":"The cybersecurity challenges of today require a diversity of skills, perspectives, and experiences, yet women remain underrepresented in this field. Girl Security and Microsoft Security are forging a new fellowship around a shared commitment to make cybersecurity more accessible to all, especially girls and women.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/","og_site_name":"Microsoft Security Blog","article_published_time":"2021-06-25T18:00:30+00:00","article_modified_time":"2023-05-16T06:01:14+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/06\/CLO20b_Aline_Preeti_office_001.jpg","type":"image\/jpeg"}],"author":"Lauren Buitta","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/06\/CLO20b_Aline_Preeti_office_001.jpg","twitter_misc":{"Written by":"Lauren Buitta","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/lauren-buitta\/","@type":"Person","@name":"Lauren Buitta"}],"headline":"Encouraging women to embrace their cybersecurity superpowers","datePublished":"2021-06-25T18:00:30+00:00","dateModified":"2023-05-16T06:01:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/"},"wordCount":1214,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/06\/CLO20b_Aline_Preeti_office_001.jpg","keywords":["Microsoft Security Insights"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/","name":"Encouraging women to embrace their cybersecurity superpowers | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/06\/CLO20b_Aline_Preeti_office_001.jpg","datePublished":"2021-06-25T18:00:30+00:00","dateModified":"2023-05-16T06:01:14+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/06\/CLO20b_Aline_Preeti_office_001.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/06\/CLO20b_Aline_Preeti_office_001.jpg","width":1200,"height":800,"caption":"Two female developers collabaorating in their enterprise office space."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/06\/25\/encouraging-women-to-embrace-their-cybersecurity-superpowers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Encouraging women to embrace their cybersecurity superpowers"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/93815"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/106"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=93815"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/93815\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/93818"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=93815"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=93815"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=93815"},{"taxonomy":"products","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/products?post=93815"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=93815"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/tags?post=93815"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=93815"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}