Ted Harrington recently ran The Boston Marathon – the oldest, most prestigious, arguably most important marathon in the world. According to Ted, it was by far one of the most fulfilling experiences of his entire life. Throughout the course of preparing for, attempting, and executing this feat, he noticed some striking parallels between running and entrepreneurship. This is his story.
People go to work to do their job. They have meetings to attend, calls to make, tasks to complete, quotas to reach, and much more. So they can’t be bothered with worrying about information security. However, their habits – good and bad, innocent or malicious – are putting their employer’s business at risk. All it takes is one poorly made decision, or maybe even the lack of a decision in many cases, to damage or even destroy a business.
Ahhh yes, our employees. We love them dearly, but sometimes they do things that put the company at risk of a data breach or other cyber attack. I reached out to the InfoSec community to help me capture some of the more common scenarios and troubling cases where employees could cause a company harm, both unknowingly and maliciously.
As part of a community service project for school, when asked to write an article to describe a teen's view of cybersecurity, Serena L-G. produced this fantastic article that every parent should read.
Amy Brachio knows the challenges of making partner at EY while raising two daughters and caring for ailing parents, but what made it bearable was the professional and personal support she received at every step. As a leader, her goal is to foster an environment that provides the same support for others.
While the US has been slow to legislate meaningful ID protection safeguards, an unexpected agency is taking a leadership position - The IRS.
In the fragmented world of cybersecurity, equipping small businesses for cyber threats and preparing the next generation of infosec professionals will require community-based workforce development.
How can businesses pour millions into cybersecurity and still miss the mark? CISSP and CISM Candy Alexander explores the blind spot leaving many businesses open to costly attack.
Many veterans have the soft skills to become effective cybersecurity professionals, but navigating the educational requirements and hard skill development can be daunting. CISO and former naval officer Gary Hayslip offers advice and resources for vets looking to transition into infosec.
How can education be used to produce the next generation of cybersecurity experts? The National Initiative for Cybersecurity Education (NICE) is bringing solutions and networking opportunities to Kansas City in its annual NICE Conference and Expo.
How do you increase your value as a cybersecurity expert and pass the CCSP? Certified Cloud Security Professional Michael Lyman lays out a powerful 7-step plan so you too can master Cloud Security
Learn how ITSPmagazine’s new column, The Academy, will bring together cutting-edge IT educators, top industry experts, and our best and brightest students as they analyze trends in cybersecurity and offer insights regarding the many questions driving the field today.