The digital world has become a scary place, one in which few small- and medium-sized businesses (SMBs) feel that they are adequately protected. Jeremy Wittkop, CTO of InteliSecure, outlines the steps necessary to achieve effective information security through identification and prioritization of key assets most important to a business.
Although information security analysts will be the fastest growing overall job category, the supply of analytics talent isn’t rising fast enough to meet this demand. Charles Eaton believes that good technologists can make great information security analysts, and that tweens and teens should become a focal point in this area.
RiskIQ surveyed 1,691 security leaders from multiple verticals in the U.S. and U.K. about the current digital threat landscape. The results show that relentless, Internet-scale threat campaigns are near-universal pain points – and CISOs are afraid that their security teams are ill-equipped to stop them.
Cybersecurity startups, relying on a seemingly endless stream of cash from VCs, are facing a harsh reality as organizations take a harder look at their cybersecurity ROI. When the funding stops, what does that mean for the industry and customers left holding the bag?
Identity theft is on the rise and the latest data breach from Equifax could bring an “avalanche” of cyber crime with losses of billions of dollars. These are times when the individual response of each one of us could urge our government to stop the growing crisis, and to change flawed credit application processes that lie at the core of it. The five steps described in this article are useful to those affected and whose privacy might be breached. A personal story highlights that identity theft is more common than people expect.
Want to learn why the $100 million attack on two U.S. Tech companies will accelerate the adoption of machine learning for information security? Then read this Experts Corner from InfoSec expert, Eyal Benishti.
Mr. Shrobe recently published an article stating that formal education is the only way out of our cybersecurity hellhole. In response, Keirsten Brager wrote some alternative viewpoints from the perspective of a practitioner and a student of the discipline.
2016 was an alarming year for tallying increases in data breaches and analyzing the sophistication of cybersecurity attacks and threats. In this Experts Corner, Chuck Brooks pulls together a collection of links highlighting some of the more alarming cybersecurity statistics.
ITSPmagazine had a chance to connect with Paige Schaffer from Generali Global Assistance. We wanted to find out what inspires her; why she does what she does, and how what she and her company are looking to make a positive impact on society.
If we continue to treat information security as the brakes on a vehicle, we will likewise continue to find we can’t speed the business up to its fullest capacity.
As 2016 comes to close, we are faced with many questions about what to expect in the coming year. Will malware ridden homes become the norm? Will mobile payments continue to mature and find their place in major organizations? Will we see physical injuries as a result of digital attacks? Mandeep Khera of Arxan shares his predictions with ITSPmagazine.
Technology entrepreneur Vishal Gupta explains how living by the principles of empathizing with the individuals whose data his firm is charged with protecting frames the way he approaches his InfoSec Life.
San Diego is a boomtown for transitioning service members and veterans entering cybersecurity. Ken Slaght shares opportunities and resources offered by the San Diego Cyber Center of Excellence.
Now that the holiday shopping season is here, it’s a good time to step back and think about how retailers are protecting shoppers’ valuable information. Don't be fooled, however, cybersecurity is an all-season activity.
There’s tremendous excitement about Machine Learning and its Artificial Intelligence applications for cybersecurity. There’s a lot of confusion and vendor technobabble, too, that must be sorted out.
From Big Data to Behavioral Analytics to Machine Learning, Artificial Intelligence presents a confusing landscape, in large part because the terms are vague and defined inconsistently (and vendors like it this way).
Jamison Utter looks to shift the cybersecurity model from one of being a cop to one of being a spy. Will this help companies be more successful in mitigating their cyber risk?
Putting together a cybersecurity workforce is similar to assembling a Super Hero Dream Team, explains Gene Fredriksen, CISO for PSCU, which services more than 800 credit unions. In this An InfoSec Life piece, Gene explains how he harks back to his love for superhero comic books in coming up with his cybersecurity dream team.
Breaking into a computer is like breaking into a house. However, breaking into a smartphone is like breaking into a brain. What does this mean? Expert Kevin Haley explains.
Cybersecurity is a fast-growing field that’s in need of more professionals. Although women remain a small percentage of this workforce, with the right education, abilities, and aptitudes, the path to success looks bright. A three-woman panel of experts at the Women in Cyber Technology event discuss recommended paths for females wishing to enter the field.