What's happening at the intersection of IT security and society?
Our Newsletters are sponsored by:
We All Need A Little Space
“We need to give each other the space to grow, to be ourselves, to exercise our diversity. We need to give each other space so that we may both give and receive such beautiful things as ideas, openness, dignity, joy, healing, and inclusion.”
― Max de Pree
From our latest newsletter
Read the recent articles and listen to our podcasts responsibly, then, if you wish, share them all recklessly.
Are We Automatically Opting In To Share Our Health Data?
Do You Know What A State-Run ‘HIE’ Is? Me Neither, But Gerard Knows
In this part 1 of our 2-part podcast, Gerard Scheitlin from Orion Health looks at the state-run health information exchanges (HIEs) and how patient data is collected, accessed, and shared, giving us some insight into how population health and precision medicine are provided through their leveraging of these systems. The big question is, are we as patients automatically opting in to share our personal health information with the state (and federal) government?
by Sean Martin, host of At The Edge
A Different Kind Of Code To Consider
Space And Silence: Why Codes Of Conduct Matter
When it comes to inclusive environments, why do we need a Code of Conduct? Not because we are bad people, but because we are bad at people skills. Training Specialist Stella explains why CoCs are valuable, where they go wrong, and the small steps we can all take to make things easier for each other.
A DiverseIT contribution by Stella
Medical Devices, Backdoors, and Botnets
Medical Device Diversity Is A Critical Factor For Healthcare IT
When it comes to medical devices deployed in clinical environments, diversity is a key factor. The reality is that not only are the medical devices manufactured by many different companies, but the underlying operating systems and software applications running on these devices are also incredibly diverse.
Experts Corner | by Jonathan Langer
Where Is Your Money Going?
Nearly Half Of SMBs Plan To Invest In Cybersecurity In 2018
As part of Kabbage’s ongoing effort to help small businesses to be successful, Kabbage recently surveyed more than 800 customers and nearly half (47 percent) plan to invest in cybersecurity products and services in 2018
Experts Corner | by Constantina Kokenes
When Doing What You're Born To Do Is A Challenge
Why Do You Want To Get Into Information Technology? You’re A Girl
Charity Pulliam and Kristi Pulliam chat with ITSPmagazine’s Selena Templeton on Diverse IT about the challenges of getting into the male-dominated IT field and how it takes just one person to believe in you to help you achieve your dreams.
by Selena Templeton, host of DiverseIT
What You Can't See Could Hurt You
The Cyber Attacks NOT Making Headlines Are The Scary Ones
The scariest attacks of 2017 don’t have a name. They are not featured in the headlines. They are the unreported and the under-reported. The cyber criminals are not undefeatable supernatural, evil entities.
Experts Corner | by Jon Loew
Small and Medium Business Cyber Security Education
EXPERT CYBERSECURITY WEBCAST SERIES FOR SMBs
A Cybersecurity Webinar For SMBs | Episode III
This Episode Is Sponsored by:
We thank Symantec for sponsoring
the first three episodes of our
SMBs CyberSecurity Education Series
Theme: History of Connectivity and Security
EXPERT CYBERSECURITY WEBCAST SERIES FOR SMALL AND MEDIUM BUSINESSES
Watch Episode III
History Of Cybersecurity And Hacking
Hacking is not a new concept—it’s been around for as long as humans can remember. With each new technology introduced into society, people and businesses find ways to push it to the edge; getting more done, sometimes in new and exciting ways. Yet, at the same time, cybercriminals and other malicious actors are also pushing these same technologies to their own edge. Most business don’t think of the technologies they use in this way. Most only think of the business benefit they will get from their investment. The issue, of course, is that while they are looking at this innocently from their own perspective, cybercriminals are looking for ways to make a buck of their own. History repeats itself, however, and we can—and should—learn from the past. Join us for this webcast as we look back in time to apply the tried-and-true learnings and best practices to today’s business environment.
Diana Kelley, Cybersecurity Field CTO, Microsoft
Chris Roberts, Chief Security Architect, Acalvio Technologies
Gabriel Lawrence, GM Cybersecurity Protection, Toyota
Sean Martin, CISSP, Co-Founder and Editor-in-Chief, ITSPmagazine
Marco Ciappelli, Co-Founder, ITSPmagazine
For all of the small- and medium-sized business cybersecurity webcasts presented as part of this series, please visit itspmagazine.com/cybersecurity-for-small-medium-business
As you know, a chronicle |ˈkränək(ə)l| is a factual written account of important or historical events in the order of their occurrence.
Well, sorry, that is not 'exactly' what this is. We like to think of it as a succinct mix of commentary and fact.
Most recent chronicles
The Experts Corner
The Experts Corner is where great minds share their expert opinion on information security news and cybersecurity trends.
Most recent contributions
From a partnership with BrightTALK, a brand new approach to bring our readers to the Intersection of IT Security & Society.
We are also planning and working on more webinars, podcast interviews, and a variety of conversations with the cybersecurity experts you want to hear from. We are even scheduling some live TV panels from Black Hat 2017.
Stay with us and enjoy some ITSP Radio & TV. Interested in producing a webinar with ITSPmagazine? Let us know!