What's happening at the intersection of IT security and society?

Our Newsletters are sponsored by:



We All Need A Little Space

“We need to give each other the space to grow, to be ourselves, to exercise our diversity. We need to give each other space so that we may both give and receive such beautiful things as ideas, openness, dignity, joy, healing, and inclusion.”

― Max de Pree


From our latest newsletter

Read the recent articles and listen to our podcasts responsibly, then, if you wish, share them all recklessly.


Are We Automatically Opting In To Share Our Health Data?
Do You Know What A State-Run ‘HIE’ Is? Me Neither, But Gerard Knows

In this part 1 of our 2-part podcast, Gerard Scheitlin from Orion Health looks at the state-run health information exchanges (HIEs) and how patient data is collected, accessed, and shared, giving us some insight into how population health and precision medicine are provided through their leveraging of these systems. The big question is, are we as patients automatically opting in to share our personal health information with the state (and federal) government?
by Sean Martin, host of At The Edge

A Different Kind Of Code To Consider
Space And Silence: Why Codes Of Conduct Matter

When it comes to inclusive environments, why do we need a Code of Conduct? Not because we are bad people, but because we are bad at people skills. Training Specialist Stella explains why CoCs are valuable, where they go wrong, and the small steps we can all take to make things easier for each other.
A DiverseIT contribution by Stella

Medical Devices, Backdoors, and Botnets
Medical Device Diversity Is A Critical Factor For Healthcare IT

When it comes to medical devices deployed in clinical environments, diversity is a key factor. The reality is that not only are the medical devices manufactured by many different companies, but the underlying operating systems and software applications running on these devices are also incredibly diverse.
Experts Corner | by Jonathan Langer

Where Is Your Money Going?
Nearly Half Of SMBs Plan To Invest In Cybersecurity In 2018

As part of Kabbage’s ongoing effort to help small businesses to be successful, Kabbage recently surveyed more than 800 customers and nearly half (47 percent) plan to invest in cybersecurity products and services in 2018
Experts Corner | by Constantina Kokenes

When Doing What You're Born To Do Is A Challenge
Why Do You Want To Get Into Information Technology? You’re A Girl

Charity Pulliam and Kristi Pulliam chat with ITSPmagazine’s Selena Templeton on Diverse IT about the challenges of getting into the male-dominated IT field and how it takes just one person to believe in you to help you achieve your dreams.
by Selena Templeton, host of DiverseIT

What You Can't See Could Hurt You
The Cyber Attacks NOT Making Headlines Are The Scary Ones

The scariest attacks of 2017 don’t have a name. They are not featured in the headlines. They are the unreported and the under-reported. The cyber criminals are not undefeatable supernatural, evil entities.
Experts Corner | by Jon Loew

NWSL #1 banner .jpg

ITSPmagazine is proud to be an official RSA Conference media partner for the 2018 event in San Francisco 

This is our second time to partner with RSA Conference to help connect information security and privacy with society, the way we live our lives, and the way we do our jobs.


Small and Medium Business Cyber Security Education


A Cybersecurity Webinar For SMBs | Episode III

This Episode Is Sponsored by:


We thank Symantec for sponsoring
the first three episodes of our
SMBs CyberSecurity Education Series


Watch Episode III

History Of Cybersecurity And Hacking

Hacking is not a new concept—it’s been around for as long as humans can remember. With each new technology introduced into society, people and businesses find ways to push it to the edge; getting more done, sometimes in new and exciting ways. Yet, at the same time, cybercriminals and other malicious actors are also pushing these same technologies to their own edge. Most business don’t think of the technologies they use in this way. Most only think of the business benefit they will get from their investment. The issue, of course, is that while they are looking at this innocently from their own perspective, cybercriminals are looking for ways to make a buck of their own. History repeats itself, however, and we can—and should—learn from the past. Join us for this webcast as we look back in time to apply the tried-and-true learnings and best practices to today’s business environment.

Diana Kelley, Cybersecurity Field CTO, Microsoft
Chris Roberts, Chief Security Architect, Acalvio Technologies
Gabriel Lawrence, GM Cybersecurity Protection, Toyota

Sean Martin, CISSP, Co-Founder and Editor-in-Chief, ITSPmagazine
Marco Ciappelli, Co-Founder, ITSPmagazine

For all of the small- and medium-sized business cybersecurity webcasts presented as part of this series, please visit itspmagazine.com/cybersecurity-for-small-medium-business

Sponsored Content


ITSPmagazine Chronicles

As you know, a chronicle |ˈkränək(ə)l| is a factual written account of important or historical events in the order of their occurrence.

Well, sorry, that is not 'exactly' what this is. We like to think of it as a succinct mix of commentary and fact.

Most recent chronicles

Sponsored Content


Cybersecurity Advice for SMBs

Podcasts | Webinars | Articles | Videos

The Experts Corner

The Experts Corner is where great minds share their expert opinion on information security news and cybersecurity trends.

Most recent contributions

ITSP Webinars

From a partnership with BrightTALK, a brand new approach to bring our readers to the Intersection of IT Security & Society.

We are also planning and working on more webinars, podcast interviews, and a variety of conversations with the cybersecurity experts you want to hear from. We are even scheduling some live TV panels from Black Hat 2017.

Stay with us and enjoy some ITSP Radio & TV. Interested in producing a webinar with ITSPmagazine? Let us know!


Sponsored Content

Webinar | Application Security in an Open Source World.jpg

Application Security In An Open Source World

Did you miss it?
It's ok, watch it now.

Cybersecurity Conferences And Events

View All Upcoming Cybersecurity Conferences And Events