ITSPmagazine editor-in-chief Sean Martin reports on the 2018 Nintex xchange conference in San Diego. As the stories from these sessions illustrate, when it comes to ensuring compliance and protecting data in the cloud, an automated workflow such as those offered by Nintex offers a viable solution to solve the challenge.
Their Story Chats at RSA Conference 2018 | Andy Smith from Centrify
A Their Story interview with John Dasher
ITSPmagazine’s John Dasher chats with Andy Smith from Centrify during RSA Conference 2018 in San Francisco to discuss how to enable enterprises to leverage and secure user identity across their on-prem and cloud infrastructure, applying machine learning to spot and act upon unwanted and insecure activity.
Their Story Chats at RSA Conference 2018 | Ferruh Mavituna from Netsparker
A Their Story interview with John Dasher
ITSPmagazine’s John Dasher chats with Ferruh Mavituna from Netsparker during RSA Conference 2018 in San Francisco to discuss how Netsparker is accelerating the enterprise’s ability to find and report web application vulnerabilities while confirming that they are not false positives.
Their Story Chats at RSA Conference 2018 | Kunal Anand from Prevoty
A Their Story interview with John Dasher
ITSPmagazine’s John Dasher chats with Kunal Anand from Prevoty during RSA Conference 2018 in San Francisco to discuss what RASP (Runtime Application Self Protection) is and how a RASP solution can help organizations secure their applications and prioritize the processing of their vulnerability by simply attaching an agent to their app.
Their Story Chats at RSA Conference 2018 | Sage Wagner from RiskSense
A Their Story interview with John Dasher
ITSPmagazine’s John Dasher chats with Sage Wagner from RiskSense during RSA Conference 2018 in San Francisco to discuss how to help organizations understand their attack surfaces and quantify their risks, allowing for rational prosecution of vulnerabilities and threats, as well as determining the effectiveness and prioritization of security investments.
Their Story Chats at RSA Conference 2018 | Mounir Hahad from Juniper Networks
A Their Story interview with John Dasher
ITSPmagazine’s John Dasher chats with Mounir Hahad from Juniper during RSA Conference 2018 in San Francisco to discuss bringing Juniper’s Threat Labs knowledge and vast networking experience to bear for enterprise security.
Their Story Chats at RSA Conference 2018 | Jay Kim from DataLocker
A Their Story interview with John Dasher
ITSPmagazine’s John Dasher chats with Jay Kim from DataLocker during RSA Conference 2018 in San Francisco to discuss how enterprises can take advantage of DataLocker’s “Simply Secure” innovative hardware-encrypted storage devices, device management, and their upcoming cloud encryption gateway.
Their Story Chats at RSA Conference 2018 | Anthony James from CipherCloud
A Their Story interview with John Dasher
ITSPmagazine’s John Dasher chats with Anthony James from CipherCloud during RSA Conference 2018 in San Francisco to discuss how enterprises can take full advantage of cloud resources and technology while maintaining visibility and robust security around their use.
Their Story Chats at RSA Conference 2018 | Mark Foust from Optimal IdM
A Their Story interview with John Dasher
ITSPmagazine’s John Dasher chats with Mark Foust from Optimal IdM during RSA Conference 2018 in San Francisco to discuss their unique and highly scalable identity management offering which resides in a private cloud to deliver tailor-fit identity services.
Their Story Chats at RSA Conference 2018 | Rod Schultz from Rubicon Labs
A Their Story interview with John Dasher
ITSPmagazine’s John Dasher chats with Rod Schultz from Rubicon Labs during RSA Conference 2018 in San Francisco to discuss how Rubicon can help enterprises easily encrypt the data for resource-constrained devices, taking advantage of IoT devices and the cloud in a secure way.
Their Story Chats at RSA Conference 2018 | Hed Kovetz from Silverfort
A Their Story interview with John Dasher
ITSPmagazine’s John Dasher chats with Hed Kovetz from Silverfort during RSA Conference 2018 in San Francisco to discuss how Silverfort provides consistent strong authentication across all enterprise users and resources.
Eoin Keary, CEO Of edgescan, Shares Some Highlights From Their Latest Vulnerability Statistics Report
Divide and Conquer: One Process - Multiple Workflows
A Dialogue with Caroline Wong, VP of Cobalt Labs
Crowdsourcing puts a whole new perspective on how we do pen testing in the InfoSec industry. ITSPmagazine sat down with Caroline Wong, CISSP and VP of Security Strategy at Cobalt Labs, who explains the benefits of crowdsourced security, how diversity plays a part, and why structuring your metrics is key to determining the ROI of your pen test program.
A Cyber Army That Thinks, Learns, And Adapts
Regardless of industry, organizational security budgets continue to rise in the face of ever-escalating attacks. Terms like machine learning and artificial intelligence often cloud, rather than clarify, what one can expect from the technology supporting a given vendor’s solution. SlashNext aims to shake up the market by soundly delivering what security teams need – actionable alerts with extraordinarily low false positives.
A Dialogue With Dwayne Melancon, VP Product, iovation
Champion for Justice – Robert Wood Tackles Healthcare Security
Robert Wood has managed to meld his love for being a champion for helping and protecting others with a successful career in security through his work at Nuna, a data-driven healthcare startup in San Francisco, CA. In this discussion, Robert offers some interesting perspectives and lessons learned regarding the complexities unique to protecting healthcare data.
We Could All Use It Nowadays. A CyberSecurity Angel On Our Shoulder.
Phishing threats have become highly sophisticated, combining social engineering aspects with targeted delivery, often resulting in financial, reputation, and brand damage to organizations. IRONSCALES offers multi-faceted solutions whereby employees can be trained and educated, attacks are surfaced through the use of machine learning-fueled analytics that empower security analysts to rapidly identify and remediate attacks before damage is inflicted, and the power of the crowd is employed to keep everyone safer.