<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Women in Cyber</title>
    <link>https://women-on-cyber.com</link>
    <description>Empowering women in cybersecurity through community, events, and resources</description>
    <language>en</language>
    <lastBuildDate>2026-04-26T04:21:28.578Z</lastBuildDate>
    <atom:link href="https://women-on-cyber.com/rss.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Supply Chain Attacks: Lessons from SolarWinds to the Latest Breaches</title>
      <link>https://women-on-cyber.com/resources</link>
      <description>Deep-dive analysis of supply chain attack vectors that have compromised thousands of organizations. Security researchers reveal detection techniques, vendor risk assessment frameworks, and zero-trust implementation strategies. Includes actionable recommendations for security teams defending against this growing threat.</description>
      <category>news</category>
      <pubDate>Sun, 26 Apr 2026 04:21:28 GMT</pubDate>
      <guid>https://women-on-cyber.com/resources#Supply-Chain-Attacks:-Lessons-from-SolarWinds-to-the-Latest-Breaches</guid>
    </item>
    <item>
      <title>Building Your Personal Brand as a Cybersecurity Expert</title>
      <link>https://women-on-cyber.com/resources</link>
      <description>LinkedIn strategies, conference speaking, technical blogging, and community engagement that accelerate career growth. Real examples from women who've built powerful personal brands, attracted recruiters, and landed dream roles. Overcome visibility challenges and become a recognized voice in the security community.</description>
      <category>career</category>
      <pubDate>Sun, 26 Apr 2026 04:21:28 GMT</pubDate>
      <guid>https://women-on-cyber.com/resources#Building-Your-Personal-Brand-as-a-Cybersecurity-Expert</guid>
    </item>
    <item>
      <title>Breaking the Glass Ceiling: Women Leading Cybersecurity Teams in 2026</title>
      <link>https://women-on-cyber.com/resources</link>
      <description>Discover proven strategies from female CISOs and security directors who've successfully navigated leadership challenges. Learn actionable tactics for building diverse teams, influencing C-suite decisions, and creating inclusive security cultures that drive business value. Includes exclusive interviews with top women leaders from Fortune 500 companies.</description>
      <category>career</category>
      <pubDate>Sun, 26 Apr 2026 04:21:28 GMT</pubDate>
      <guid>https://women-on-cyber.com/resources#Breaking-the-Glass-Ceiling:-Women-Leading-Cybersecurity-Teams-in-2026</guid>
    </item>
    <item>
      <title>Zero to CISSP: Your Complete Certification Roadmap for 2026</title>
      <link>https://women-on-cyber.com/resources</link>
      <description>Master the CISSP certification with this comprehensive study guide designed specifically for busy professionals. Covers all 8 domains with real-world examples, memory techniques, practice questions, and time management strategies. Learn from women who've passed on their first attempt while balancing full-time careers and family commitments.</description>
      <category>tutorials</category>
      <pubDate>Sun, 26 Apr 2026 04:21:28 GMT</pubDate>
      <guid>https://women-on-cyber.com/resources#Zero-to-CISSP:-Your-Complete-Certification-Roadmap-for-2026</guid>
    </item>
    <item>
      <title>AI-Powered Cyber Attacks: What Every Security Professional Must Know</title>
      <link>https://women-on-cyber.com/resources</link>
      <description>Breaking down the latest wave of AI-enhanced phishing, deepfake social engineering, and automated vulnerability exploitation. Experts reveal how threat actors are weaponizing ChatGPT and other LLMs, plus defensive strategies being deployed by leading security teams globally. Essential reading for staying ahead of evolving threats.</description>
      <category>news</category>
      <pubDate>Sun, 26 Apr 2026 04:21:28 GMT</pubDate>
      <guid>https://women-on-cyber.com/resources#AI-Powered-Cyber-Attacks:-What-Every-Security-Professional-Must-Know</guid>
    </item>
    <item>
      <title>Hands-On: Building Your First Security Operations Center (SOC) Lab</title>
      <link>https://women-on-cyber.com/resources</link>
      <description>Transform your home setup into a fully functional SOC environment. Step-by-step instructions for installing and configuring Security Onion, Splunk, and SIEM tools using free resources. Practice real incident detection and response scenarios that mirror enterprise environments—perfect for aspiring SOC analysts.</description>
      <category>tutorials</category>
      <pubDate>Sun, 26 Apr 2026 04:21:28 GMT</pubDate>
      <guid>https://women-on-cyber.com/resources#Hands-On:-Building-Your-First-Security-Operations-Center-(SOC)-Lab</guid>
    </item>
    <item>
      <title>Cloud Security Architecture: AWS, Azure &amp; GCP Compared</title>
      <link>https://women-on-cyber.com/resources</link>
      <description>Navigate the complexities of multi-cloud security with this comprehensive comparison. Examine identity management, encryption, compliance controls, and native security tools across all three major platforms. Includes architecture diagrams, best practices, and common pitfalls to avoid when securing cloud workloads.</description>
      <category>tutorials</category>
      <pubDate>Sun, 26 Apr 2026 04:21:28 GMT</pubDate>
      <guid>https://women-on-cyber.com/resources#Cloud-Security-Architecture:-AWS,-Azure-&-GCP-Compared</guid>
    </item>
    <item>
      <title>Imposter Syndrome in Cybersecurity: Overcoming Self-Doubt and Thriving</title>
      <link>https://women-on-cyber.com/resources</link>
      <description>85% of women in tech experience imposter syndrome—learn why it's especially prevalent in cybersecurity and how to break free. Psychologists and senior security professionals share evidence-based techniques for building confidence, celebrating wins, and recognizing your expertise. Transform self-doubt into career momentum.</description>
      <category>career</category>
      <pubDate>Sun, 26 Apr 2026 04:21:28 GMT</pubDate>
      <guid>https://women-on-cyber.com/resources#Imposter-Syndrome-in-Cybersecurity:-Overcoming-Self-Doubt-and-Thriving</guid>
    </item>
    <item>
      <title>Salary Negotiation Masterclass: Earning What You Deserve in Cybersecurity</title>
      <link>https://women-on-cyber.com/resources</link>
      <description>Data-driven insights reveal the gender pay gap in cybersecurity and how to close it. Learn proven negotiation frameworks, market rate benchmarks for 50+ security roles, and psychological tactics that work. Includes scripts, email templates, and advice from women who've successfully negotiated 30%+ raises.</description>
      <category>career</category>
      <pubDate>Sun, 26 Apr 2026 04:21:28 GMT</pubDate>
      <guid>https://women-on-cyber.com/resources#Salary-Negotiation-Masterclass:-Earning-What-You-Deserve-in-Cybersecurity</guid>
    </item>
    <item>
      <title>Penetration Testing Like a Pro: Web Application Security Deep Dive</title>
      <link>https://women-on-cyber.com/resources</link>
      <description>Go beyond basic OWASP Top 10 with advanced exploitation techniques for modern web apps. Covers API security testing, JWT attacks, GraphQL vulnerabilities, and real-world bug bounty case studies. Learn the methodology top penetration testers use to find critical vulnerabilities and write comprehensive reports.</description>
      <category>tutorials</category>
      <pubDate>Sun, 26 Apr 2026 04:21:28 GMT</pubDate>
      <guid>https://women-on-cyber.com/resources#Penetration-Testing-Like-a-Pro:-Web-Application-Security-Deep-Dive</guid>
    </item>
  </channel>
</rss>