The Need For Trust And Authentication In Email: A History

In Part 3 of this "Their Story" podcast, Valimail's Alexander Garcia-Tobar chats with ITSPmagazine's John Dasher about some of the challenges organizations face as they make a move toward a world of email authentication along with some tips for how they can make forward progress against those challenges.

Their Story Chats At Black Hat Conference 2018 | Jonathan Sander From STEALTHbits

A Their Story interview with John Dasher​​​​​​​

ITSPmagazine’s John Dasher chats with Jonathan Sander of STEALTHbits about unstructured data, protecting credentials, ransomware, machine learning (and Sylvester Stallone) — plus how STEALTHbits can help protect an organization’s sensitive data from insider threats and automate security and compliance tasks.

Their Story: A Dialogue with Dena Haritos Tsamitis From Carnegie Mellon University

A Their Story interview with Selena Templeton

ITSPmagazine's Selena Templeton sat down with Dena Haritos Tsamitis of Carnegie Mellon University to capture CMU’s story (which was among the first institutions in the world to create a degree program for cybersecurity). They also chat about the Information Networking Institute (INI) and Women@INI (WINI), Cylab (CMU's security and privacy research institute), MySecureCyberspace, diversity and inclusion, and imposter syndrome.

Their Story Chats At Black Hat Conference 2018 | Dana Tamir From Silverfort

A Their Story interview with John Dasher​​​​​​​

ITSPmagazine’s John Dasher chats with Dana Tamir of Silverfort at Black Hat 2018 about multi-factor authentication, how it’s changed with the shift to the cloud, hybrid environments and disappearing perimeters, and how Silverfort enables strong MFA across the entire network without modifications to endpoints and servers.

Their Story Chats At Black Hat Conference 2018 | Nick Bilogorskiy From Juniper Networks

A Their Story interview with John Dasher​​​​​​​

ITSPmagazine’s John Dasher chats with Nick Bilogorskiy from Juniper Networks at Black Hat 2018 about malware, ransomware, new cryptocurrency attacks (“crypto jacking”) and how Juniper can help protect you by keeping your network clean and clear.

Their Story Chats At Black Hat Conference 2018 | Keenan Skelly From Circadence

A Their Story interview with John Dasher​​​​​​​

ITSPmagazine's John Dasher had a chance to sit down with Keenan Skelly, VP Global Partnerships & Security Evangelist at Circadence, at this year's Black Hat to capture Circadence’s story and chat about gamification and security, AI, cyber ranges, and women in cyber.

Their Story Chats at Black Hat Conference 2018 | Brian Reed from NowSecure

A Their Story interview with John Dasher​​​​​​​

ITSPmagazine’s John Dasher chats with Brian Reed of NowSecure about their latest research that shows that using a top 50 mobile app from your favorite App Store probably has one or more critical vulnerabilities with a Common Vulnerability Scoring System (CVSS) score of 8 or higher. And we’re talking production apps from Fortune 500 companies here folks.

Their Story Chats at RSA Conference 2018 | Mordecai Rosen from CA Technologies

ITSPmagazine editor-in-chief Sean Martin sits down with Mordecai Rosen from CA Technologies to capture the latest story from him about what can be referred to as the "app economy." The app economy is driving the next generation of business transformation via digital means, but with these great opportunities comes an increased threat surface.

Nintex: The Value Of Privacy And Safety In Business

ITSPmagazine editor-in-chief Sean Martin reports on the 2018 Nintex xchange conference in San Diego. As the stories from these sessions illustrate, when it comes to ensuring compliance and protecting data in the cloud, an automated workflow such as those offered by Nintex offers a viable solution to solve the challenge.

Their Story Chats at RSA Conference 2018 | Andy Smith from Centrify

A Their Story interview with John Dasher​​​​​​​

ITSPmagazine’s John Dasher chats with Andy Smith from Centrify during RSA Conference 2018 in San Francisco to discuss how to enable enterprises to leverage and secure user identity across their on-prem and cloud infrastructure, applying machine learning to spot and act upon unwanted and insecure activity.

Their Story Chats at RSA Conference 2018 | Kunal Anand from Prevoty

A Their Story interview with John Dasher​​​​​​​

ITSPmagazine’s John Dasher chats with Kunal Anand from Prevoty during RSA Conference 2018 in San Francisco to discuss what RASP (Runtime Application Self Protection) is and how a RASP solution can help organizations secure their applications and prioritize the processing of their vulnerability by simply attaching an agent to their app.

Their Story Chats at RSA Conference 2018 | Sage Wagner from RiskSense

A Their Story interview with John Dasher​​​​​​​

ITSPmagazine’s John Dasher chats with Sage Wagner from RiskSense during RSA Conference 2018 in San Francisco to discuss how to help organizations understand their attack surfaces and quantify their risks, allowing for rational prosecution of vulnerabilities and threats, as well as determining the effectiveness and prioritization of security investments.

Their Story Chats at RSA Conference 2018 | Jay Kim from DataLocker

A Their Story interview with John Dasher​​​​​​​

ITSPmagazine’s John Dasher chats with Jay Kim from DataLocker during RSA Conference 2018 in San Francisco to discuss how enterprises can take advantage of DataLocker’s “Simply Secure” innovative hardware-encrypted storage devices, device management, and their upcoming cloud encryption gateway.