What's happening at the intersection of IT security and society?

This one is sponsored by:

 


Food for thought

One machine can do the work of fifty ordinary men. 
No machine can do the work of one extraordinary man.

Elbert Hubbard

 

 


From the ITSP Newsroom, here are the latest articles and podcasts
Read and listen responsibly, share recklessly


Helping Each Other In Our InfoSec Lives
Behind The Curtain: The Downside Of An InfoSec Life | #1

Rick McElroy recounts the stories that no one is telling.
Recently, my editor-in-chief forwarded me an email asking if I’d like to interview Rick McElroy, a security strategist at Carbon Black, for ITSPmagazine’s podcast and column “An InfoSec Life.” Rick had written a blog post for us called "Cybersecurity Ain’t Easy. Let’s Talk About It!" in which he discussed his own experience with defender fatigue – an industry-wide phenomenon that not a lot of people are talking about.
by Selena Templeton, host of DiverseIT
 

SMBs Aren't A Ransomware Target? Think Again
Adam Kujawa Shares Why Ransomware Against SMBs Is So Lucrative For Cybercriminals

In this episode of At The Edge with Sean Martin, Sean connects with Adam Kujawa, director of malware intelligence at Malwarebytes. The two spend most of their time talking about the risks and challenges small and medium sized business face as they try to securely run their company.
by Sean Martin, host of At The Edge and An InfoSec Life


Who's To Blame For Cyberbullying?
Bullying Has Turned Into Cyberbullying, But Please Do Not Blame Technology. It Is Still Very Much A Human Problem

Maybe a few years from now I will rewrite this piece, and I will reach a different conclusion; who knows, if technology keeps moving at this pace, in a relatively short amount of time Artificial Intelligence Entities will be advanced enough to be indistinguishable from humans. Bots will write like people (hopefully better), be able to have a conversation with humans and nobody will be able to tell the difference.  They will think, dream, have feelings, and - hopefully not - they will also behave just like regular people.
by Marco Ciappelli, host of The Cyber Society
 

What Do You Think?
Busting The 7 Myths About Cybersecurity Careers

There are many issues confounding and complicating raising the next generation of technologists. Seven myths exist about technology careers discourage potential teenage technologists and their parents. As a leader of a philanthropic organization dedicated to creating on-ramps to tech careers, Charles Eaton considers busting those myths not only a duty, but a pleasure. Charles tackles these seven myths one-by-one here in his latest ITSPmagazine Experts Corner.
by Charles Eaton
 

Shadow IT Goes Mobile
It’s Better To Bring Messaging Apps Out Of The Shadows

Organizations are implementing stricter mandates for what kind of platforms and mobile features employees can use on both personal and corporate-owned devices, prompting a dramatic increase in the rise of "shadow IT" like unauthorized messaging apps. By bringing messaging apps out of the shadows and into the mainstream, organizations can reduce the risk of both outside and inside threats to the enterprise.
by Dr. Galina Datskovsky
 

EXPERT CYBERSECURITY WEBCAST SERIES FOR SMALL AND MEDIUM BUSINESSES
A Cybersecurity Webinar For SMBs | Prologue

LIVE: WEDNESDAY, DECEMBER 13, 2018
10:00 am - 11:00 am PST | 1:00 pm - 2:00 pm EST

Join us for this introductory webinar as we discuss:
• Why this topic is so important
• Who should care about this webinar series
• What attendees can expect from this webinar series
• A brief overview of the topics and calendar of events

SAVE YOUR SPOT | Learn More


Sponsored Content



ITSPmagazine Chronicles

As you know, a chronicle |ˈkränək(ə)l| is a factual written account of important or historical events in the order of their occurrence.

Well, sorry, that is not 'exactly' what this is. We like to think of it as a succinct mix of commentary and fact.

Most recent chronicles


ITSPmagazine Presents:

Webinar | Application Security in an Open Source World.jpg

Application Security In An Open Source World


••••••••••••••••••••••••
Did you miss it?
It's ok, watch it now.


Sponsored Content


CYBERSECURITY ADVICE FOR SMBs.jpg

Cybersecurity Advice for SMBs

Podcasts | Webinars | Articles | Videos


The Experts Corner

The Experts Corner is where great minds share their expert opinion on information security news and cybersecurity trends.

Most recent contributions


ITSP Webinars

From a partnership with BrightTALK, a brand new approach to bring our readers to the Intersection of IT Security & Society.

We are also planning and working on more webinars, podcast interviews, and a variety of conversations with the cybersecurity experts you want to hear from. We are even scheduling some live TV panels from Black Hat 2017.

Stay with us and enjoy some ITSP Radio & TV. Interested in producing a webinar with ITSPmagazine? Let us know!

 
 

Cybersecurity Conferences And Events

View All Upcoming Cybersecurity Conferences And Events