breach

Our Best Cyber-Defense For The Future: Teenage Technologists

Although information security analysts will be the fastest growing overall job category, the supply of analytics talent isn’t rising fast enough to meet this demand. Charles Eaton believes that good technologists can make great information security analysts, and that tweens and teens should become a focal point in this area.

Current Cyber Coverage Cannot Stand the Next WannaCry

Insurance expert Bill Kelly of Argo Pro provides his insights on the WannaCry ransomware cyber attack and how companies of all sizes can work with insurance providers to find appropriate coverage in order to best protect themselves ahead of the next big cyber attack.

The Far-Reaching Effects of a Malware Attack

When a company suffers a malware attack, the effects are widespread. Just how far, you ask? To help answer this question, expert Brian Laing explores this topic both far and wide.

The Perpetual Tug-of-War Between Security and Convenience. What to Do?

Modern enterprise is a perpetual tug-of-war between security and convenience. And the latter is winning. What’s an administrator to do?

A Dialogue with Paige Schaffer - Generali Global Assistance

ITSPmagazine had a chance to connect with Paige Schaffer from Generali Global Assistance. We wanted to find out what inspires her; why she does what she does, and how what she and her company are looking to make a positive impact on society.

I Am Not a Number, I Am a Free Man. The Devaluation of Personal Identity

In our constant crusade to stop cybercrime and fight the good fight against our invisible enemy, we (the good guys) seem to have lost sight of one of the most important things we are trying to protect.

Once More Unto The Breach, Dear Friends, Once More

Do you by chance use the same password for your email that you use for other websites, particularly banking or shopping accounts? That is one of the simplest mistakes we can make in having our identity stolen, and chances are a fair number of you reading this would answer yes.

So, What Went Seriously Wrong with Yahoo?

How do you destroy 500 million trust relationships at once? Break in to Yahoo! Today the company claimed that a breach from as far back as 2014 – the result of a "state-sponsored actor" – led to the loss of "account information [that] may have included names, email addresses, telephone numbers, dates of birth, hashed passwords and, in some cases, encrypted or unencrypted security questions and answers."