What's happening at the intersection of IT security and society?

Our Newsletters are sponsored by:

 
 

 

Change is a good thing;
when done right. 


“The world as we have created it is a process of our thinking.
It cannot be changed without changing our thinking.”
 
― Albert Einstein

 

From our latest newsletter

Read the recent articles and listen to our podcasts responsibly, then, if you wish, share them all recklessly.

________________________________________________________________________________________________
 

Why It’s Not Just the Job of Women/Minorities to Be Educators of Equality
White Men In Leadership Positions Should Be The Ones Fighting For Equality

White Men as Full Diversity Partners co-founder Bill Proudman chats with ITSPmagazine’s Selena Templeton for the Diverse IT podcast about his unique approach to engaging white male business leaders in diversity and inclusion efforts.
by Selena Templeton, host of DiverseIT

What's The Latest In Application Security?
Eoin Keary, CEO Of Edgescan, Shares Some Highlights From Their Latest Vulnerability Statistics Report

Eoin Keary, CEO of edgescan, and Sean Martin from ITSPmagazine, catch up in Dublin, Ireland as Eoin shares some of the key findings captured during their latest vulnerability assessment and management research activities.
by Sean Martin, host of At The Edge and An InfoSec Life

What's The Deal With The Goats And Gorillas?
Darn It, Did You Really Miss The Gorilla?

From the men who stare at goats to the possibility of seeing the gorilla, research has found that leveraging methods from unrelated fields produce breakthroughs. Cybersecurity consultant Rachel Phillips explains why employers would be wise to consider the value of non-traditional skillsets when looking for their next security “genius.”
by Rachel Phillips

There's An App For That. Really?
Mobile Apps, Your Data, And Your Digital Shadow

Mobile Apps are used every day without a second thought. But convenience comes at a cost. You may want to think twice before you download.
by Gary Weisenborn

Love And Kisses For All?
Happy Valentines Day! Here Is A Bouquet Of Online Dating Romance Scams. XOXO

As more adults flock to online dating sites to meet "the one" they must also exercise caution. A new generation of scammers are setting their traps, creating fake profiles to extort cash and mine personal data from victims.
by Scott Waddell

Show Me The Money
Nearly Half Of SMBs Plan To Invest In Cybersecurity In 2018

As part of Kabbage’s ongoing effort to help small businesses to be successful, Kabbage recently surveyed more than 800 customers and nearly half (47 percent) plan to invest in cybersecurity products and services in 2018.
by Constantina Kokenes


NWSL #1 banner .jpg

ITSPmagazine is proud to be an official RSA Conference media partner for the 2018 event in San Francisco 

This is our second time to partner with RSA Conference to help connect information security and privacy with society, the way we live our lives, and the way we do our jobs.

 

Small and Medium Business Cyber Security Education

EXPERT CYBERSECURITY WEBCAST SERIES FOR SMBs

A Cybersecurity Webinar For SMBs | Episode III

This Episode Is Sponsored by:

 
 


We thank Symantec for sponsoring
the first three episodes of our
SMBs CyberSecurity Education Series



EXPERT CYBERSECURITY WEBCAST SERIES FOR SMALL AND MEDIUM BUSINESSES

Watch Episode III

History Of Cybersecurity And Hacking
 

Hacking is not a new concept—it’s been around for as long as humans can remember. With each new technology introduced into society, people and businesses find ways to push it to the edge; getting more done, sometimes in new and exciting ways. Yet, at the same time, cybercriminals and other malicious actors are also pushing these same technologies to their own edge. Most business don’t think of the technologies they use in this way. Most only think of the business benefit they will get from their investment. The issue, of course, is that while they are looking at this innocently from their own perspective, cybercriminals are looking for ways to make a buck of their own. History repeats itself, however, and we can—and should—learn from the past. Join us for this webcast as we look back in time to apply the tried-and-true learnings and best practices to today’s business environment.

EDUCATORS
Diana Kelley, Cybersecurity Field CTO, Microsoft
Chris Roberts, Chief Security Architect, Acalvio Technologies
Gabriel Lawrence, GM Cybersecurity Protection, Toyota

MODERATORS
Sean Martin, CISSP, Co-Founder and Editor-in-Chief, ITSPmagazine
Marco Ciappelli, Co-Founder, ITSPmagazine
 

For all of the small- and medium-sized business cybersecurity webcasts presented as part of this series, please visit itspmagazine.com/cybersecurity-for-small-medium-business


Sponsored Content


ITSPmagazine Chronicles

As you know, a chronicle |ˈkränək(ə)l| is a factual written account of important or historical events in the order of their occurrence.

Well, sorry, that is not 'exactly' what this is. We like to think of it as a succinct mix of commentary and fact.

Most recent chronicles


Sponsored Content


CYBERSECURITY ADVICE FOR SMBs.jpg

Cybersecurity Advice for SMBs

Podcasts | Webinars | Articles | Videos


The Experts Corner

The Experts Corner is where great minds share their expert opinion on information security news and cybersecurity trends.

Most recent contributions


ITSP Webinars

From a partnership with BrightTALK, a brand new approach to bring our readers to the Intersection of IT Security & Society.

We are also planning and working on more webinars, podcast interviews, and a variety of conversations with the cybersecurity experts you want to hear from. We are even scheduling some live TV panels from Black Hat 2017.

Stay with us and enjoy some ITSP Radio & TV. Interested in producing a webinar with ITSPmagazine? Let us know!

 
 

Sponsored Content

Webinar | Application Security in an Open Source World.jpg

Application Security In An Open Source World


••••••••••••••••••••••••
Did you miss it?
It's ok, watch it now.


Cybersecurity Conferences And Events

View All Upcoming Cybersecurity Conferences And Events