Nintex: The Value Of Privacy And Safety In Business

ITSPmagazine editor-in-chief Sean Martin reports on the 2018 Nintex xchange conference in San Diego. As the stories from these sessions illustrate, when it comes to ensuring compliance and protecting data in the cloud, an automated workflow such as those offered by Nintex offers a viable solution to solve the challenge.

Their Story Chats at RSA Conference 2018 | Andy Smith from Centrify

A Their Story interview with John Dasher​​​​​​​

ITSPmagazine’s John Dasher chats with Andy Smith from Centrify during RSA Conference 2018 in San Francisco to discuss how to enable enterprises to leverage and secure user identity across their on-prem and cloud infrastructure, applying machine learning to spot and act upon unwanted and insecure activity.

Their Story Chats at RSA Conference 2018 | Kunal Anand from Prevoty

A Their Story interview with John Dasher​​​​​​​

ITSPmagazine’s John Dasher chats with Kunal Anand from Prevoty during RSA Conference 2018 in San Francisco to discuss what RASP (Runtime Application Self Protection) is and how a RASP solution can help organizations secure their applications and prioritize the processing of their vulnerability by simply attaching an agent to their app.

Their Story Chats at RSA Conference 2018 | Sage Wagner from RiskSense

A Their Story interview with John Dasher​​​​​​​

ITSPmagazine’s John Dasher chats with Sage Wagner from RiskSense during RSA Conference 2018 in San Francisco to discuss how to help organizations understand their attack surfaces and quantify their risks, allowing for rational prosecution of vulnerabilities and threats, as well as determining the effectiveness and prioritization of security investments.

Their Story Chats at RSA Conference 2018 | Jay Kim from DataLocker

A Their Story interview with John Dasher​​​​​​​

ITSPmagazine’s John Dasher chats with Jay Kim from DataLocker during RSA Conference 2018 in San Francisco to discuss how enterprises can take advantage of DataLocker’s “Simply Secure” innovative hardware-encrypted storage devices, device management, and their upcoming cloud encryption gateway.

Eoin Keary, CEO Of edgescan, Shares Some Highlights From Their Latest Vulnerability Statistics Report

Eoin Keary, CEO of edgescan, and Sean Martin from ITSPmagazine, catch up in Dublin, Ireland as Eoin shares some of the key findings captured during their latest vulnerability assessment and management research activities.

Divide and Conquer: One Process - Multiple Workflows

It feels normal and right to think that a business process should be modeled and designed from start to finish in a single place. Make it one workflow, and everyone knows what to do, you can monitor the workflow, and if you need to make changes, you know exactly where to look. Simple, right?

A Dialogue with Caroline Wong, VP of Cobalt Labs

Crowdsourcing puts a whole new perspective on how we do pen testing in the InfoSec industry. ITSPmagazine sat down with Caroline Wong, CISSP and VP of Security Strategy at Cobalt Labs, who explains the benefits of crowdsourced security, how diversity plays a part, and why structuring your metrics is key to determining the ROI of your pen test program.

A Cyber Army That Thinks, Learns, And Adapts

Regardless of industry, organizational security budgets continue to rise in the face of ever-escalating attacks. Terms like machine learning and artificial intelligence often cloud, rather than clarify, what one can expect from the technology supporting a given vendor’s solution. SlashNext aims to shake up the market by soundly delivering what security teams need – actionable alerts with extraordinarily low false positives.

A Dialogue With Dwayne Melancon, VP Product, iovation

ITSPmagazine recently caught up with VP of Product at iovation, Dwayne Melancon. Upon accepting the new position at the company, Melancon takes a moment to share his insights into the world of fraud and its impact on the community and society at large.

Champion for Justice – Robert Wood Tackles Healthcare Security

Robert Wood has managed to meld his love for being a champion for helping and protecting others with a successful career in security through his work at Nuna, a data-driven healthcare startup in San Francisco, CA. In this discussion, Robert offers some interesting perspectives and lessons learned regarding the complexities unique to protecting healthcare data.

We Could All Use It Nowadays. A CyberSecurity Angel On Our Shoulder.

Phishing threats have become highly sophisticated, combining social engineering aspects with targeted delivery, often resulting in financial, reputation, and brand damage to organizations. IRONSCALES offers multi-faceted solutions whereby employees can be trained and educated, attacks are surfaced through the use of machine learning-fueled analytics that empower security analysts to rapidly identify and remediate attacks before damage is inflicted, and the power of the crowd is employed to keep everyone safer.

A Dialogue with Jack Jones, Co-Founder and EVP Research and Development, RiskLens

In today’s increasingly hostile cybersecurity climate, with more CISOs finding they report directly to the CEO and the Board, the language of “risk” has reached epic levels of importance. Join us for a fascinating chat with RiskLens’ Jack Jones, Co-Founder and EVP Research and Development.

A Dialogue with Zoltán Györkő, CEO and Co-Founder, Balabit

Winners in the cybersecurity game will safeguard data without constraining business. Learn how Zoltán Györkő, CEO and co-Founder of Balabit, achieves success with real-time user analysis and authentication.