What's happening at the intersection of IT security and society?
Our Newsletters are sponsored by:
"Never trust a computer you can’t throw out a window."
- Steve Wozniak
From our latest newsletter
Read the recent articles, watch the webcasts, and listen to our podcasts responsibly.
Then, if you wish, share them all recklessly.
Join us on the road to RSA Conference 2018
Quick, In-Depth Conversations About RSAC Topics and the People Discussing Them
Let's Chat About Social Engineering Penetration Testing With Rachel Tobac and Joe Gray
In today’s episode, ITSPmagazine's Sean Martin is joined by Rachel Tobac and Joe Gray and the topic of discussion today is Social Engineering. The trio look at what's involved in a social engineering campaign, how it works, and Joe and Rachel share how they got involved in what is essentially a human-centric method of vulnerability assessment and penetration testing. Of course, since this is part of our Chats on the Road to RSA Conference 2018 podcast series, we also get a preview of what Rachel and Joe will be co-presenting during their session at RSA Conference.
How One Woman Went From Teaching Herself to Code to Becoming a Full-Time Software Engineer
Turning Underrepresented Groups Into Software Engineers
Vivek Nair & Allie Glotfelty chat with ITSPmagazine’s Selena Templeton for Diverse IT about Hatch, Twilio's 6-month apprenticeship program for people with non-traditional technical backgrounds | by Selena Templeton, host of DiverseIT
Toot! Toot! 🚂 All Aboard?
GDPR Is Coming Fast – Are You Ready To Catch This Train?
When the European Union’s General Data Protection Regulations (GDPR) becomes enforceable, many firms in the US will still not prepared to meet the needs of the regulation come May 25, 2018 – but the penalties for non-compliance are significant for businesses | by Carl Leonard
Flashback 🚀 This Time Last Year we spoke with Scott Scheferman (Cylance) about ...
The Softer Side Of Artificial Intelligence
Sometimes, it's all too easy to forget about the technology we surround ourselves with - what are the realities of technology becoming ingrained in our everyday lives | by Scott Scheferman
Get Inspired By This 12-Year-Old Patent-Pending Inventor
Kids Are Not The Future, We Are Here Now –@Robotmakergirl
While other 6-year-olds were just playing with toys, Allie Weber was busy building her very first robot. ITSPmagazine’s Selena Templeton chats with this 12-year-old patent-pending inventor for DiverseIT. | by Selena Templeton, host of DiverseIT
We are proud to announce our renewed partnership with BrightTALK.
Together we will stream 6 Live Panels from San Francisco during RSA Conference 2018
These are the topics we will be discussing:
Emerging Threats & Cyber Defense
GDPR, Identity & Cybersecurity
AI and Machine Learning in Cybersecurity
Securing the Cloud in 2018
Beyond the Breach
Securing the Internet of Things
Want to see what a session looks like? Watch this one from last year.
NOTE: ITSPmagazine coverage, podcasts, webcasts, articles, and all our happenings during RSA Conference 2018 are made possible by the generosity of our sponsors. We are ever so grateful for your support.
Small and Medium Business Cyber Security Education
EXPERT CYBERSECURITY WEBCAST SERIES FOR SMBs
A Cybersecurity Webinar For SMBs | Episode III
This Episode Is Sponsored by:
We thank Symantec for sponsoring
the first three episodes of our
SMBs CyberSecurity Education Series
Theme: History of Connectivity and Security
EXPERT CYBERSECURITY WEBCAST SERIES FOR SMALL AND MEDIUM BUSINESSES
Watch Episode III
History Of Cybersecurity And Hacking
Hacking is not a new concept—it’s been around for as long as humans can remember. With each new technology introduced into society, people and businesses find ways to push it to the edge; getting more done, sometimes in new and exciting ways. Yet, at the same time, cybercriminals and other malicious actors are also pushing these same technologies to their own edge. Most business don’t think of the technologies they use in this way. Most only think of the business benefit they will get from their investment. The issue, of course, is that while they are looking at this innocently from their own perspective, cybercriminals are looking for ways to make a buck of their own. History repeats itself, however, and we can—and should—learn from the past. Join us for this webcast as we look back in time to apply the tried-and-true learnings and best practices to today’s business environment.
Diana Kelley, Cybersecurity Field CTO, Microsoft
Chris Roberts, Chief Security Architect, Acalvio Technologies
Gabriel Lawrence, GM Cybersecurity Protection, Toyota
Sean Martin, CISSP, Co-Founder and Editor-in-Chief, ITSPmagazine
Marco Ciappelli, Co-Founder, ITSPmagazine
For all of the small- and medium-sized business cybersecurity webcasts presented as part of this series, please visit itspmagazine.com/cybersecurity-for-small-medium-business
As you know, a chronicle |ˈkränək(ə)l| is a factual written account of important or historical events in the order of their occurrence.
Well, sorry, that is not 'exactly' what this is. We like to think of it as a succinct mix of commentary and fact.
Most recent chronicles
The Experts Corner
The Experts Corner is where great minds share their expert opinion on information security news and cybersecurity trends.
Most recent contributions
From a partnership with BrightTALK, a brand new approach to bring our readers to the Intersection of IT Security & Society.
We are also planning and working on more webinars, podcast interviews, and a variety of conversations with the cybersecurity experts you want to hear from. We are even scheduling some live TV panels from Black Hat 2017.
Stay with us and enjoy some ITSP Radio & TV. Interested in producing a webinar with ITSPmagazine? Let us know!