• About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    FIIG cyberattack

    FIIG Securities Fined AU$2.5 Million Following Prolonged Cybersecurity Failures

    ENISA International Strategy

    ENISA Updates Its International Strategy to Strengthen EU’s Cybersecurity Cooperation

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    Senegal cyberattack

    Senegal Confirms Cyberattack on Agency Managing National ID and Biometric Data

    SmarterTools Breached by Own SmarterMail Vulnerabilities

    SmarterTools Breached by Own SmarterMail Vulnerabilities

    European Commission Mobile Cyberattack Thwarted by Quick Action

    European Commission Hit by Mobile Infrastructure Data Breach

    UAE Cyber Security Council

    UAE Cyber Security Council Warns Stolen Logins Fuel Majority of Financial Cyberattacks

    TikTok Addictive Design Under EU Regulatory Scrutiny

    Why TikTok’s Addictive Design Is Now a Regulatory Problem

    UNC3886

    Singapore Launches Largest-Ever Cyber Defense Operation After UNC3886 Targets All Major Telcos

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Moltbook, AI Agent, Database Leak, API Keys Leak, API Keys,

    AI-Coded Moltbook Platform Exposes 1.5 Mn API Keys Through Database Misconfiguration

    FDA Cybersecurity Guidance

    US FDA Reissues Cybersecurity Guidance to Reflect QMSR Transition and ISO 13485 Alignment

    Incognito Market

    What the Incognito Market Sentencing Reveals About Dark Web Drug Trafficking

    Spain Ban Social Media Platforms

    Spain Ban Social Media Platforms for Kids as Global Trend Grows

    social media ban for children France

    France Approves Social Media Ban for Children Under 15 Amid Global Trend

    ai cybersecurity webinar February 2026

    Lt Gen (Dr) Rajesh Pant to Lead Webinar on AI-Driven Cyber Threats — Register Free Now

    Japanese cybersecurity

    Britain and Japan Join Forces on Cybersecurity and Strategic Minerals

    online piracy

    U.S. and Bulgaria Shut Down Three Major Piracy Websites in EU Crackdown

    Data Privacy Week 2026-Interview

    Ad Fraud Is Exploding — Dhiraj Gupta of mFilterIt Explains How Brands Can Respond

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    Coupang CEO Resigns

    Coupang CEO Resigns After Massive Data Breach Exposes Millions of Users

    Black Friday

    Black Friday Cybersecurity Survival Guide: Protect Yourself from Scams & Attacks

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    FIIG cyberattack

    FIIG Securities Fined AU$2.5 Million Following Prolonged Cybersecurity Failures

    ENISA International Strategy

    ENISA Updates Its International Strategy to Strengthen EU’s Cybersecurity Cooperation

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    Senegal cyberattack

    Senegal Confirms Cyberattack on Agency Managing National ID and Biometric Data

    SmarterTools Breached by Own SmarterMail Vulnerabilities

    SmarterTools Breached by Own SmarterMail Vulnerabilities

    European Commission Mobile Cyberattack Thwarted by Quick Action

    European Commission Hit by Mobile Infrastructure Data Breach

    UAE Cyber Security Council

    UAE Cyber Security Council Warns Stolen Logins Fuel Majority of Financial Cyberattacks

    TikTok Addictive Design Under EU Regulatory Scrutiny

    Why TikTok’s Addictive Design Is Now a Regulatory Problem

    UNC3886

    Singapore Launches Largest-Ever Cyber Defense Operation After UNC3886 Targets All Major Telcos

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Moltbook, AI Agent, Database Leak, API Keys Leak, API Keys,

    AI-Coded Moltbook Platform Exposes 1.5 Mn API Keys Through Database Misconfiguration

    FDA Cybersecurity Guidance

    US FDA Reissues Cybersecurity Guidance to Reflect QMSR Transition and ISO 13485 Alignment

    Incognito Market

    What the Incognito Market Sentencing Reveals About Dark Web Drug Trafficking

    Spain Ban Social Media Platforms

    Spain Ban Social Media Platforms for Kids as Global Trend Grows

    social media ban for children France

    France Approves Social Media Ban for Children Under 15 Amid Global Trend

    ai cybersecurity webinar February 2026

    Lt Gen (Dr) Rajesh Pant to Lead Webinar on AI-Driven Cyber Threats — Register Free Now

    Japanese cybersecurity

    Britain and Japan Join Forces on Cybersecurity and Strategic Minerals

    online piracy

    U.S. and Bulgaria Shut Down Three Major Piracy Websites in EU Crackdown

    Data Privacy Week 2026-Interview

    Ad Fraud Is Exploding — Dhiraj Gupta of mFilterIt Explains How Brands Can Respond

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    Coupang CEO Resigns

    Coupang CEO Resigns After Massive Data Breach Exposes Millions of Users

    Black Friday

    Black Friday Cybersecurity Survival Guide: Protect Yourself from Scams & Attacks

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Features

Breaking Codes and Glass Ceilings: The Legacy of Women in Cybersecurity

This tribute not only honors their legacy but also bridges the past with the present, showcasing the continuum of women's contributions to cybersecurity.

Augustin Kurian by Augustin Kurian
March 15, 2024
in Features, Firewall Daily
0
Code Girls
628
SHARES
3.5k
VIEWS
Share on LinkedInShare on Twitter

In a recent homage to Women’s History Month, the US Cyber Command cast a spotlight on Judy Parsons and the unsung heroines of World War II, known as the “Code Girls.” Their story, deeply interwoven with the theme of International Women’s Day 2024, #InspireInclusion, serves as a reminder of the pivotal role women have historically played in keeping the world safer.

This tribute not only honors their legacy but also bridges the past with the present, showcasing the continuum of women’s contributions to cybersecurity.

During the throes of World War II, a group of remarkable women, including Judy Parsons, were instrumental in the Allied forces’ intelligence efforts, breaking ciphers and providing crucial information that led to the sinking of 95 German U-boats.

Women in Cybersecurity

These women, meticulously selected from the Seven Sister colleges for their exceptional skills in mathematics, languages, and sciences, were America’s original ethical hackers. Yet, for decades, their contributions remained veiled in secrecy, their stories untold, and their achievements unrecognized.

The Code Girls: A Closer Look

The story of the Code Girls begins in 1941, when mysterious letters arrived in the mailboxes of select students at the Seven Sister colleges. These letters, which would change the course of their lives, invited them to meetings where they were asked if they enjoyed crossword puzzles or had wedding plans.

Unbeknownst to these women, they were being recruited for a top-secret mission that would leverage their unmatched skills in a bid to serve their country in an unprecedented way.

report-ad-banner

These women were about to become part of a covert operation, breaking the codes and ciphers of the Axis powers. Working in secrecy, they embarked on a challenge that was as intellectually demanding as it was crucial to the Allied war effort. Their achievements, including the breaking of codes that led to significant naval victories, were monumental. Yet, the recognition of their contributions was delayed for decades, their stories untold, and their achievements unrecognized until recent years.

The comparison of the Code Girls to their counterparts at Bletchley Park, including Alan Turing, and the acknowledgment of their similar achievements in breaking complex codes, serves to elevate their status in the annals of history. Despite facing bureaucratic rivalries and administrative sexism, these women persevered, showcasing their prodigious intellect and dedication to their work.

Liza Mundy’s book, “Code Girls: The Untold Story of the American Women Code Breakers of World War II,” provides a detailed account of their efforts and the challenges they faced. The book’s revelations about the volume of intercepted and decoded messages, and the strategic impact of their work, offer a glimpse into the critical role these women played in the war effort.

The notion of the Code Girls as America’s first ethical hackers and the modern-day equivalents of the intellectual women of the 18th century, the bluestockings, is a compelling comparison. It highlights the continuity of women’s contributions to intellectual and security fields, despite societal expectations that often sought to limit their roles.

The reflections of Ann Caracristi on the nature of the work and the fulfillment it brought underscore the personal impact of this service on the women involved. Their transition back to civilian life, with many unable to continue in high-level positions, points to the broader societal challenges faced by women at the time.

Bridging the Past and Present

The narrative of the Code Girls is not merely a historical recount but a testament to the intellectual and innovative prowess of women in the realm of cybersecurity. Despite facing bureaucratic hurdles and administrative sexism, these women persevered, deciphering complex codes and creating deceptive intel to mislead enemy forces.

Their work laid the foundational stones for modern cybersecurity practices and underscored the indispensable role of women in the field.

Fast forward to today, the landscape of cybersecurity continues to evolve, with women like Tayse Orlovas, Director of Security & Resilience at Kyndryl, and Anna Collard, SVP of Content Strategy and Evangelist at KnowBe4 Africa, at the forefront. Their journeys, akin to those of the Code Girls, are marked by innovation, resilience, and a profound passion for cybersecurity.

Tayse Orlovas, with three decades of experience in Information Technology, offers a unique perspective on the role of women in cybersecurity.

“As a woman in STEM, my journey has been about overcoming doubts and leveraging my strengths to make a meaningful impact in the field of Information/Cyber Security,” Orlovas shares. Her insights into the qualities that women bring to cybersecurity—passion, optimism, organization, empathy, and collaboration—echo the theme of #InspireInclusion. Orlovas emphasizes that these traits are not just beneficial but essential for success in cybersecurity, a field that thrives on diverse perspectives and innovative problem-solving.

Anna Collard’s journey from doodling cartoons to becoming a cybersecurity leader is equally inspiring. Collard’s transition into the tech world was marked by a blend of creativity and determination.

“I was driven by imposter syndrome to work as hard as I could and keep on studying in order to keep up with my mostly male engineering colleagues,” Collard recalls in one of her columns in The Cyber Express. Her innovative approach to cybersecurity education, combining her love for cartoons with her expertise in the field, highlights the diverse pathways into cybersecurity and the importance of creative thinking in developing effective security solutions.

Both Orlovas and Collard emphasize the importance of inclusion and diversity in driving innovation and effectiveness in cybersecurity. Their stories, along with those of the Code Girls, serve as a powerful reminder of the contributions women have made—and continue to make—in the field. As we celebrate International Women’s Day 2024 under the theme #InspireInclusion, it’s crucial to recognize and honor the achievements of women in cybersecurity, from the pioneers of the past to the leaders of today.

The legacy of the Code Girls, coupled with the contributions of women like Tayse Orlovas and Anna Collard, illustrates the transformative power of inclusion in cybersecurity. Their stories not only celebrate the past achievements of women in the field but also highlight the ongoing need for diversity and inclusion in shaping the future of cybersecurity.

As the cybersecurity landscape continues to evolve, the stories of these remarkable women serve as a beacon, inspiring future generations to pursue careers in tech and cybersecurity.

Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • More
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp

Related

Tags: Alan TuringAnn CaracristiBletchley ParkCode GirlsCybersecurity practicesEthical hackersInternational Women's DayJudy ParsonsLiza MundySeven Sister collegesThe Cyber ExpressUS Cyber Commandwomen in cybersecurity
Previous Post

Cyble Recognized Among Forbes’ America’s Best Startup Employers 2024

Next Post

Shattering the Glass Ceiling: 7 Strategies to Inspire Inclusion and Empower Women in Cybersecurity

Next Post
women in cybersecurity

Shattering the Glass Ceiling: 7 Strategies to Inspire Inclusion and Empower Women in Cybersecurity

Upcoming Webinar

Threat Landscape Reports 2025

❮ ❯
Cyble-Vision


Follow Us On Google News

Latest Cyber News

FIIG cyberattack
Firewall Daily

FIIG Securities Fined AU$2.5 Million Following Prolonged Cybersecurity Failures

February 10, 2026
ENISA International Strategy
Firewall Daily

ENISA Updates Its International Strategy to Strengthen EU’s Cybersecurity Cooperation

February 10, 2026
Discord teen-by-default settings
Business News

Discord Introduces Stronger Teen Safety Controls Worldwide

February 10, 2026
Senegal cyberattack
Cyber News

Senegal Confirms Cyberattack on Agency Managing National ID and Biometric Data

February 10, 2026

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information