Lean In for Yourself

Small family farming is a labor intensive way to go broke.
When I was young I spent some weeks each summer with my grandparents.
As farmers and cattle ranchers, my grandparents scratched out an existence.
My grandpa was up before dawn feeding cattle and out working fields of corn, milo, sorghum, soybeans, and wheat until after sunset.
There were too few boom years, and too many bust years.
One thing that helped keep them afloat was that my grandmother was an elementary school teacher in their rural community.
When we ran errands together we frequently encountered her former students and it was clear from the things they said that they loved and respected her.
At one point she decided to get her master's degree.
He didn't like the idea that she would have more formal education than he did.
I've been thinking about this bit of my family history lately, prompted by reading Sheryl Sandberg's book, Lean In: Women, Work, and the Will to Lead. My granddad may have perceived that his pride was spared by preventing my grandmother from pursuing her master's, but I've been thinking about the emotional, financial, and communal costs.
As I said, my reflections on this were prompted by Sandberg's book, which I read because I'm a people manager and Sandberg is an incredibly accomplished leader and I want to pick up the lessons of great leaders wherever I can.
I want to support them in their careers and Sandberg is arguably one of the most successful business leaders of all time, perhaps I could learn something that would help me help them.
This is the first in a series of posts where I'm reflecting on Sandberg's book in an effort to synthesize my own understanding of the issue and to glean general management insights.
I'll end this post with Taylor Swift's tribute to her grandmother, Marjorie.
This is a Security Bloggers Network syndicated blog from trustedsignal - blog authored by davehull.


This Cyber News was published on securityboulevard.com. Publication date: Sun, 18 Feb 2024 05:43:04 +0000


Cyber News related to Lean In for Yourself

4 Tips for Safe and Secure Holiday Shopping - The holiday season is the most wonderful time of the year for experienced and novice cybercriminals alike looking to make a quick payday. Although threat actors are relying on classic scams to trick unsuspecting consumers this season, you can take ...
1 year ago Feeds.fortinet.com
OpenAIS ChatGPT is a Polymorphic Malware: How to Protect Yourself - Internet security is an important concern in the modern digital age. With the emergence of new threats such as ransomware, Trojans, and sophisticated variants of Polymorphic Malware, it is essential that users take the necessary steps to protect ...
2 years ago Hackread.com
Lean In for Yourself - Small family farming is a labor intensive way to go broke. When I was young I spent some weeks each summer with my grandparents. As farmers and cattle ranchers, my grandparents scratched out an existence. My grandpa was up before dawn feeding cattle ...
1 year ago Securityboulevard.com
How Hackers Could Know Your Password – Even If It's Stolen Already - A data breach can feel like a personal violation, with your personal data, such as passwords, credit card details, or even conversations and photographs being stolen and shared online. While it can be difficult to protect yourself from a security ...
2 years ago Nakedsecurity.sophos.com
Microsoft OneNote Attachments are Now being Used by Hackers to Spread Malware - According to researchers, hackers are now using Microsoft OneNote attachments as a way to spread malicious software. This is the latest tactic in a long line of malicious actors attempting to infiltrate computers and networks with malicious code. ...
2 years ago Bleepingcomputer.com
What Is Roaming Mantis Malware and How to Protect Yourself From a DNS Changer - Roaming Mantis is a malware that has been spreading around at an alarming rate. It is a type of malware that changes the DNS setting of a device to reroute traffic from the user and collects data from the target. The malware is capable of operating ...
2 years ago Hackread.com
Riot Games Hacked: What You Need to Know - Riot Games, the company responsible for the popular video game League of Legends, has been hacked. This attack is the latest example of cyber-crime hitting the gaming industry, putting user data and information at risk. In this article, we’ll ...
2 years ago Securityaffairs.com
Mailchimp Data Breach: Companies Affected & How to Protect Yourself - On December 3rd, 2020, a data breach was reported targeting users of MailChimp, one of the most popular email marketing platforms. It is estimated that over 900 million user emails have been exposed in this breach, making it one of the largest in ...
2 years ago Securityaffairs.com
What is Quishing? How to protect your devices - Since the Covid pandemic, QR codes have become a common part of everyday life. Now we are familiar with how to use them, businesses are deploying QR everywhere. You can encode virtually anything in in one of those squares, from website addresses to ...
1 year ago Pandasecurity.com
CVE-2023-51440 - A vulnerability has been identified in SIMATIC CP 343-1 (6GK7343-1EX30-0XE0) (All versions), SIMATIC CP 343-1 Lean (6GK7343-1CX10-0XE0) (All versions), SIPLUS NET CP 343-1 (6AG1343-1EX30-7XE0) (All versions), SIPLUS NET CP 343-1 Lean ...
4 months ago
Top 3 Cybersecurity Trends for SME Business Leaders in 2024 - In this article, I'll condense our collaboration's insights into three key trends for 2024, backed up by data and research from all areas of cybersecurity practice. These emerging patterns pertain to organizations of all shapes and sizes - but, make ...
1 year ago Cybersecuritynews.com
CVE-2024-32739 - CVE-2024-32735 - Missing Authentication for Critical Function (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)An unauthenticated remote attacker can access the PDNU REST APIs. For example, the attacker can fetch sensitive information (i.e., login ...
10 months ago Tenable.com
CVE-2024-32738 - CVE-2024-32735 - Missing Authentication for Critical Function (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)An unauthenticated remote attacker can access the PDNU REST APIs. For example, the attacker can fetch sensitive information (i.e., login ...
10 months ago Tenable.com
CVE-2024-32737 - CVE-2024-32735 - Missing Authentication for Critical Function (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)An unauthenticated remote attacker can access the PDNU REST APIs. For example, the attacker can fetch sensitive information (i.e., login ...
10 months ago Tenable.com
CVE-2024-32736 - CVE-2024-32735 - Missing Authentication for Critical Function (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)An unauthenticated remote attacker can access the PDNU REST APIs. For example, the attacker can fetch sensitive information (i.e., login ...
10 months ago Tenable.com
CVE-2024-32735 - CVE-2024-32735 - Missing Authentication for Critical Function (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)An unauthenticated remote attacker can access the PDNU REST APIs. For example, the attacker can fetch sensitive information (i.e., login ...
10 months ago Tenable.com
How to Protect Yourself from Job Scams: Essential Tips - The internet is a powerful tool in our career search, but it also provides cyber criminals with information and tactics they can use to exploit and deceive people looking for work. Job scams are sadly prevalent on the web, and if you’re job ...
2 years ago Tripwire.com
What is Spyware? How It Works and How to Protect Yourself Against It - Spyware is a type of malicious software that is designed to collect sensitive data from victims without their knowledge or consent. It is typically installed on computers without the user’s knowledge or consent, and collects sensitive information ...
2 years ago Heimdalsecurity.com
What is SEO Poisoning Attack? - Search engine optimization (SEO) poisoning is a type of cyber attack that infiltrates search results. It consists of malicious search engine results created by an attacker attempting to redirect someone to malicious or vulnerable webpages. It is a ...
2 years ago Heimdalsecurity.com
How to Arm Yourself With CloudFlare Security Solutions - Securing your website or digital asset is a critical part of running a successful business or website. With the rise of the digital era, the need to protect yourself from cyber-attacks is essential. That's why CloudFlare, the leading cloud solution ...
2 years ago Blog.cloudflare.com
9 online scams to watch out for this holiday season - By being aware of these common online scams and taking precautions, you can protect yourself and your family from becoming victims this holiday season. The holiday season is upon us, and that means it's time to start shopping for gifts. It's not just ...
1 year ago Blog.avast.com
Top 10 Cybersecurity Interview Questions and Answers - Interviewing for a job in information security can be daunting. According to security experts, memorizing hundreds of terms isn't the ticket to a successful interview for a cybersecurity job. The best candidates have a sense of what they want to ...
8 months ago Techtarget.com
Security Affairs Newsletter Round 403 – Everything You Need to Know - Are you looking for the latest news on cybersecurity? The Security Affairs Newsletter, Round 403, by Pierluigi Paganini provides the essential information you need to stay up-to-date with the latest cyber security threats. In this newsletter, you ...
2 years ago Securityaffairs.com
Tech Support Scammers Are Still At It: What To Look Out For - Tech scams are unfortunately still an issue in 2021, with technological advancements leading cybercriminals to find more creative ways to gain access to your data or charge you for services you don't need. As such, it's important to be aware of the ...
2 years ago Welivesecurity.com
NJRat Campaign Unleashes Cyber Attack from Earth Bogle – The Hacker News - In a recent cyber attack, a well-known malware named NJRat is being unleashed from the Earth Bogle campaign, as reported by The Hacker News. An NJRat is a malicious code that can be used to gain system infiltration and access to web servers. It is ...
2 years ago Thehackernews.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)