What's happening at the intersection of IT security and society?

Our Newsletters are sponsored by:

 
 


What are you protecting?
Your system or data?


“Hardware is easy to protect: lock it in a room, chain it to a desk, or buy a spare. Information poses more of a problem. It can exist in more than one place; be transported halfway across the planet in seconds, and be stolen without your knowledge.”

― Bruce Schneier, Protect Your Macintosh, 1994

 

From our latest newsletter

Read the recent articles and listen to our podcasts responsibly, then, if you wish, share them all recklessly.

________________________________________________________________________________________________
 

Thank Goodness For The InfoSec Community!
A Community Bands Together To Help Others Make Their Break Into InfoSec

Sometimes change can be difficult to deal with. With this difficulty comes the potential for some to simply stay put and not pursue their dreams. That's not the case for Bruce Sparks. Rather than sitting back, Bruce chose to pursue his dream and reached out the InfoSec community to get some advice. The community responded.
 

When Doing What You're Born To Do Is A Challenge
Why Do You Want To Get Into Information Technology? You’re A Girl

Charity Pulliam and Kristi Pulliam chat with ITSPmagazine’s Selena Templeton on Diverse IT about the challenges of getting into the male-dominated IT field and how it takes just one person to believe in you to help you achieve your dreams.
by Selena Templeton, host of DiverseIT
 

The Risks That Come With Crypto Mining
Cryptocurrency Mining Is Booming, And So Is Its Malware

The cryptocurrency boom is underway. The talk of the town isn’t only about Bitcoin, the most popular form of digital cash. The value of some altcoins, including Monero (XMR), is steadily reaching new heights as well, adding more fuel to the furnace of the overall hysteria.
by David Balaban
 

Who's Your Scammer?
Let’s Take A Look At Some Recent Cryptocurrency Scams

Although Bitcoin price dropped substantially this month, cryptocurrencies still attract myriads of swindlers like honey attracts bees. As new waves of users rush into crypto, there will certainly be scammers waiting for them.
by David Balaban
 

What You Can't See Could Hurt You
The Cyber Attacks NOT Making Headlines Are The Scary Ones

The scariest attacks of 2017 don’t have a name. They are not featured in the headlines. They are the unreported and the under-reported. The cyber criminals are not undefeatable supernatural, evil entities.
by Jon Loew

 


NWSL #1 banner .jpg

ITSPmagazine is proud to be an official RSA Conference media partner for the 2018 event in San Francisco 

This is our second time to partner with RSA Conference to help connect information security and privacy with society, the way we live our lives, and the way we do our jobs.

 

Small and Medium Business Cyber Security Education

EXPERT CYBERSECURITY WEBCAST SERIES FOR SMBs

A Cybersecurity Webinar For SMBs | Episode III

This Episode Is Sponsored by:

 
 


We thank Symantec for sponsoring
the first three episodes of our
SMBs CyberSecurity Education Series



EXPERT CYBERSECURITY WEBCAST SERIES FOR SMALL AND MEDIUM BUSINESSES

Watch Episode III

History Of Cybersecurity And Hacking
 

Hacking is not a new concept—it’s been around for as long as humans can remember. With each new technology introduced into society, people and businesses find ways to push it to the edge; getting more done, sometimes in new and exciting ways. Yet, at the same time, cybercriminals and other malicious actors are also pushing these same technologies to their own edge. Most business don’t think of the technologies they use in this way. Most only think of the business benefit they will get from their investment. The issue, of course, is that while they are looking at this innocently from their own perspective, cybercriminals are looking for ways to make a buck of their own. History repeats itself, however, and we can—and should—learn from the past. Join us for this webcast as we look back in time to apply the tried-and-true learnings and best practices to today’s business environment.

EDUCATORS
Diana Kelley, Cybersecurity Field CTO, Microsoft
Chris Roberts, Chief Security Architect, Acalvio Technologies
Gabriel Lawrence, GM Cybersecurity Protection, Toyota

MODERATORS
Sean Martin, CISSP, Co-Founder and Editor-in-Chief, ITSPmagazine
Marco Ciappelli, Co-Founder, ITSPmagazine
 

For all of the small- and medium-sized business cybersecurity webcasts presented as part of this series, please visit itspmagazine.com/cybersecurity-for-small-medium-business


Sponsored Content

 

ITSPmagazine Chronicles

As you know, a chronicle |ˈkränək(ə)l| is a factual written account of important or historical events in the order of their occurrence.

Well, sorry, that is not 'exactly' what this is. We like to think of it as a succinct mix of commentary and fact.

Most recent chronicles


Sponsored Content


CYBERSECURITY ADVICE FOR SMBs.jpg

Cybersecurity Advice for SMBs

Podcasts | Webinars | Articles | Videos


The Experts Corner

The Experts Corner is where great minds share their expert opinion on information security news and cybersecurity trends.

Most recent contributions


ITSP Webinars

From a partnership with BrightTALK, a brand new approach to bring our readers to the Intersection of IT Security & Society.

We are also planning and working on more webinars, podcast interviews, and a variety of conversations with the cybersecurity experts you want to hear from. We are even scheduling some live TV panels from Black Hat 2017.

Stay with us and enjoy some ITSP Radio & TV. Interested in producing a webinar with ITSPmagazine? Let us know!

 
 

Sponsored Content

Webinar | Application Security in an Open Source World.jpg

Application Security In An Open Source World


••••••••••••••••••••••••
Did you miss it?
It's ok, watch it now.


Cybersecurity Conferences And Events

View All Upcoming Cybersecurity Conferences And Events