Microsoft

Spectre And Meltdown Vulnerabilities. Happy New Year!

Intel has confirmed findings by researchers (including from Google’s Project Zero) that the design of chips from Intel, AMD and ARM has – for more than a decade – permitted hackers to access memory on billions of business and consumer devices. So what, you ask? This is what.

Blockchain Technology For Better Cybersecurity?

Blockchain technology offers a more secure and reliable way of improving cybersecurity in organizations. This article discusses how blockchain-enhanced cybersecurity can help protect organizations from ransomware attacks like WannaCry and Petya.

The Connected Car: Safety, Security and Convenience

Connected car technology has been around at least since the mid-1990s, when GM’s OnStar system debuted in 1996. Today, most people think of the connected car as one that is connected to the Internet or some external service for information and entertainment, navigation, and, increasingly, safety. What does this connectivity do to the way we use these vehicles - what is its impact on our our security, our safety?

Your Blockchain Might Be Dead - and Alive - on Arrival

Government and business leaders in every corner are experimenting with blockchain solutions. But these projects face the risk of becoming dead-on-arrival if their designers fail to prepare for the looming threat of quantum computers.

8 Companies with Chief Diversity Officer Positions

The topic of diversity in the workplace has gotten more attention in the last few years, but what does that really mean in the tech industry? Many companies have put their money where their mouth is and created a Chief Diversity Officer position. Here are eight of them.

Dodging SHA-1’s Collision Course

Security researchers at the CWI institute in Amsterdam working together with a team from Google found a practical way to compromise the SHA-1 hash algorithm. The goal of this post on ITSPmagazine is to explain the impact of this finding and what can be done to mitigate the risk.

Join Us, as We Look Back at Diversity in Tech in 2016

The mission of our Equal Respect column for ITSPmagazine is to provide a platform for the lack of diversity in the tech, InfoSec or cybersecurity fields. We’ve published 30 articles written by 24 experts, and here is a quick recap of some of our most popular, humorous, touching and amazing stories.

This Is Why Men Should Fight Mightily to Defeat the Infosec Gender Gap

Entrepreneurs and businesses know, better than anyone, that survival is contingent upon adaptability. So why is there still a lack of diversity in this field? Avani Desai brings 15 years’ of experience in the IT field to offer her own suggestions as to how to close this gender gap.

In Neurodiversity There Is Beauty, Strength, And Skills You Don’t Have

Although the word “neurodiversity” has been around since the late 1990s, not a lot of people are familiar with it. Simply put, this term describes the vast scope of differences in how people’s brains work and how they learn. Rather than a disadvantage in the workplace, neurological differences can offer a wider, more varied range of talent.

Diversity. Walk the Talk

When major brands like Microsoft are hosting conference parties with scantily-clad female dancers while at the same time requiring all employees to undergo “Unconscious Bias Training,” how do diversity programs at companies truly change behavior and not simply rubber-stamp efforts?