When I saw this one (Women of Influence in Security - CSO Magazine - January 2006), I somehow recalled an old discussion that sparked on one of the mailing lists upon seeing some similar past nomination: but can they write exploits? And, further, is there more women CSOs or women who code good overflows?
Yeah, I finally found that old post from 2003, enjoy: http://www.immunitysec.com/pipermail/dailydave/2003-September.txt
No comments:
Post a Comment