What's happening at the intersection of IT security and society?

This one is sponsored by:

 


Something to muse on?
🤔

“If you think technology can
solve your security problems, then you don’t understand the problems and you don’t understand the technology.”

– Bruce Schneier

Here is our latest newsletter | Read it responsibly, share it recklessly

IoT Security Explained | Because This IoT Connected Society Is Not Just Unicorns Pooping Rainbows

We are fascinated, intrigued, and mesmerized by it; we have always been. We want the latest gadget; we want to plug it in, see the lights turn on, and discover how great it is. The problem nowadays is that more and more of these new gadgets need an electric plug and an Internet connection – and while this raises the level of its awesomeness, it also complicates things A LOT.
by Marco Ciappelli

Making Our Lives – Our World – Healthier | Are We Doing Enough To Protect Health Records?

Health data is some of the most important, sensitive, and valuable information available. This information is critical in providing health services, of course, but is also valuable in other ways; for criminal and fraudulent purposes. The question is, are we doing enough as an industry to help protect this data from all aspects of the security CIA triad? Gerard Scheitlin, the Chief Risk Officer and chief of security, risk and assurance for Orion Health, explores this topic with us.
by Sean Martin, CISSP

A DiverseIT Podcast and Chronicle | Cybersecurity And Autism: The Values Are Obvious

Michael Fieldhouse, Director for Emerging Businesses and Cybersecurity at DXC Technology, and Marian Merritt, Lead for Industry Engagement at the National Initiative for Cybersecurity Education, chat with ITSPmagazine’s Selena Templeton for the Diverse IT podcast about hiring people with autism in the IT/cybersecurity workforce.
by Selena Templeton
 

Thank You For Your Service | How Military Veterans Transition To Civilian Cybersecurity

One of the toughest challenges facing military veterans is making the transition to civilian life. It’s difficult for many of them to see how their military training translates into a civilian career, and the process of job hunting can be daunting. There's hope though; and this program is one example of good things happening in the industry.
by Stephan Tallent


Playing a Better Hand Than Your Opponent | Ransomware Always Tips Its Hand

Ransomware creates turmoil every day – for individuals and for enterprises. But there is encouraging news. Ransomware, by its very nature, tips its hand with characteristics that make it predictable and recognizable. These distinct features enable advanced security tools to detect and defeat ransomware before files are frozen and ransoms demanded.
by Engin Kirda

 

EXPERT CYBERSECURITY WEBCAST SERIES FOR SMALL AND MEDIUM BUSINESSES
A Cybersecurity Webinar For SMBs | Prologue

LIVE: WEDNESDAY, DECEMBER 13, 2018
10:00 am - 11:00 am PST | 1:00 pm - 2:00 pm EST

Join us for this introductory webinar as we discuss:
• Why this topic is so important
• Who should care about this webinar series
• What attendees can expect from this webinar series
• A brief overview of the topics and calendar of events

SAVE YOUR SEAT | Learn More


Sponsored Content


ITSPmagazine Chronicles

As you know, a chronicle |ˈkränək(ə)l| is a factual written account of important or historical events in the order of their occurrence.

Well, sorry, that is not 'exactly' what this is. We like to think of it as a succinct mix of commentary and fact.

Most recent chronicles


ITSPmagazine Presents:

Webinar | Application Security in an Open Source World.jpg

Application Security In An Open Source World


••••••••••••••••••••••••
Did you miss it?
It's ok, watch it now.


Audio News, Podcasts Series and Columns From ITSPmagazine

Our Audio News and Podcasts Series are available on iTunes | Stitcher | Soundcloud | TuneIn

 

These are some of the most recent podcasts. You can find them all here

 


IoT Security Explained | Just Because Something Can Be Connected To The Internet, It Doesn’t Mean It Should

Fear, Uncertainty, and Doubt is no way to mitigate risk in the application security and procurement process says Garry Kolb


Sponsored Content


Privacy, Big Data, And The Right To Be Forgotten | The Moral Compass

Alex Horan from Onapsis shares ERP risk insights coming from continuous research his team does

Robert Feeney from Edgescan shares tips w/ Sean Martin to help researchers stand out

Tor Moström & Johan Wendt Explain Why It’s So Important To Teach Kids to Think Like Coders


CYBERSECURITY ADVICE FOR SMBs.jpg

Cybersecurity Advice for SMBs

Podcasts | Webinars | Articles | Videos


The Experts Corner

The Experts Corner is where great minds share their expert opinion on information security news and cybersecurity trends.

Most recent contributions


ITSP Webinars

From a partnership with BrightTALK, a brand new approach to bring our readers to the Intersection of IT Security & Society.

We are also planning and working on more webinars, podcast interviews, and a variety of conversations with the cybersecurity experts you want to hear from. We are even scheduling some live TV panels from Black Hat 2017.

Stay with us and enjoy some ITSP Radio & TV. Interested in producing a webinar with ITSPmagazine? Let us know!

 
 

Cybersecurity Conferences And Events

View All Upcoming Cybersecurity Conferences And Events