What's happening at the intersection of IT security and society?
Our Newsletters are sponsored by:
What are you protecting?
Your system or data?
“Hardware is easy to protect: lock it in a room, chain it to a desk, or buy a spare. Information poses more of a problem. It can exist in more than one place; be transported halfway across the planet in seconds, and be stolen without your knowledge.”
― Bruce Schneier, Protect Your Macintosh, 1994
From our latest newsletter
Read the recent articles and listen to our podcasts responsibly, then, if you wish, share them all recklessly.
Thank Goodness For The InfoSec Community!
A Community Bands Together To Help Others Make Their Break Into InfoSec
Sometimes change can be difficult to deal with. With this difficulty comes the potential for some to simply stay put and not pursue their dreams. That's not the case for Bruce Sparks. Rather than sitting back, Bruce chose to pursue his dream and reached out the InfoSec community to get some advice. The community responded.
When Doing What You're Born To Do Is A Challenge
Why Do You Want To Get Into Information Technology? You’re A Girl
Charity Pulliam and Kristi Pulliam chat with ITSPmagazine’s Selena Templeton on Diverse IT about the challenges of getting into the male-dominated IT field and how it takes just one person to believe in you to help you achieve your dreams.
by Selena Templeton, host of DiverseIT
The Risks That Come With Crypto Mining
Cryptocurrency Mining Is Booming, And So Is Its Malware
The cryptocurrency boom is underway. The talk of the town isn’t only about Bitcoin, the most popular form of digital cash. The value of some altcoins, including Monero (XMR), is steadily reaching new heights as well, adding more fuel to the furnace of the overall hysteria.
by David Balaban
Who's Your Scammer?
Let’s Take A Look At Some Recent Cryptocurrency Scams
Although Bitcoin price dropped substantially this month, cryptocurrencies still attract myriads of swindlers like honey attracts bees. As new waves of users rush into crypto, there will certainly be scammers waiting for them.
by David Balaban
What You Can't See Could Hurt You
The Cyber Attacks NOT Making Headlines Are The Scary Ones
The scariest attacks of 2017 don’t have a name. They are not featured in the headlines. They are the unreported and the under-reported. The cyber criminals are not undefeatable supernatural, evil entities.
by Jon Loew
Small and Medium Business Cyber Security Education
EXPERT CYBERSECURITY WEBCAST SERIES FOR SMBs
A Cybersecurity Webinar For SMBs | Episode III
This Episode Is Sponsored by:
We thank Symantec for sponsoring
the first three episodes of our
SMBs CyberSecurity Education Series
Theme: History of Connectivity and Security
EXPERT CYBERSECURITY WEBCAST SERIES FOR SMALL AND MEDIUM BUSINESSES
Watch Episode III
History Of Cybersecurity And Hacking
Hacking is not a new concept—it’s been around for as long as humans can remember. With each new technology introduced into society, people and businesses find ways to push it to the edge; getting more done, sometimes in new and exciting ways. Yet, at the same time, cybercriminals and other malicious actors are also pushing these same technologies to their own edge. Most business don’t think of the technologies they use in this way. Most only think of the business benefit they will get from their investment. The issue, of course, is that while they are looking at this innocently from their own perspective, cybercriminals are looking for ways to make a buck of their own. History repeats itself, however, and we can—and should—learn from the past. Join us for this webcast as we look back in time to apply the tried-and-true learnings and best practices to today’s business environment.
Diana Kelley, Cybersecurity Field CTO, Microsoft
Chris Roberts, Chief Security Architect, Acalvio Technologies
Gabriel Lawrence, GM Cybersecurity Protection, Toyota
Sean Martin, CISSP, Co-Founder and Editor-in-Chief, ITSPmagazine
Marco Ciappelli, Co-Founder, ITSPmagazine
For all of the small- and medium-sized business cybersecurity webcasts presented as part of this series, please visit itspmagazine.com/cybersecurity-for-small-medium-business
As you know, a chronicle |ˈkränək(ə)l| is a factual written account of important or historical events in the order of their occurrence.
Well, sorry, that is not 'exactly' what this is. We like to think of it as a succinct mix of commentary and fact.
Most recent chronicles
The Experts Corner
The Experts Corner is where great minds share their expert opinion on information security news and cybersecurity trends.
Most recent contributions
From a partnership with BrightTALK, a brand new approach to bring our readers to the Intersection of IT Security & Society.
We are also planning and working on more webinars, podcast interviews, and a variety of conversations with the cybersecurity experts you want to hear from. We are even scheduling some live TV panels from Black Hat 2017.
Stay with us and enjoy some ITSP Radio & TV. Interested in producing a webinar with ITSPmagazine? Let us know!