Although information security analysts will be the fastest growing overall job category, the supply of analytics talent isn’t rising fast enough to meet this demand. Charles Eaton believes that good technologists can make great information security analysts, and that tweens and teens should become a focal point in this area.
Insurance expert Bill Kelly of Argo Pro provides his insights on the WannaCry ransomware cyber attack and how companies of all sizes can work with insurance providers to find appropriate coverage in order to best protect themselves ahead of the next big cyber attack.
When a company suffers a malware attack, the effects are widespread. Just how far, you ask? To help answer this question, expert Brian Laing explores this topic both far and wide.
Modern enterprise is a perpetual tug-of-war between security and convenience. And the latter is winning. What’s an administrator to do?
ITSPmagazine had a chance to connect with Paige Schaffer from Generali Global Assistance. We wanted to find out what inspires her; why she does what she does, and how what she and her company are looking to make a positive impact on society.
In our constant crusade to stop cybercrime and fight the good fight against our invisible enemy, we (the good guys) seem to have lost sight of one of the most important things we are trying to protect.
Do you by chance use the same password for your email that you use for other websites, particularly banking or shopping accounts? That is one of the simplest mistakes we can make in having our identity stolen, and chances are a fair number of you reading this would answer yes.
How do you destroy 500 million trust relationships at once? Break in to Yahoo! Today the company claimed that a breach from as far back as 2014 – the result of a "state-sponsored actor" – led to the loss of "account information [that] may have included names, email addresses, telephone numbers, dates of birth, hashed passwords and, in some cases, encrypted or unencrypted security questions and answers."