Home Spotlight

Privilege Abuse. Who Is Doing What In Your Network?

Privileged accounts give users the ability to compromise an organization’s network, systems and data, but discovering such incidents can take months or years. Michael Fimin outlines the Top 5 threats that result from poor privilege account management and explains 3 ways organizations can mitigate risk of privilege abuse.

How to Manage Security Risks and Be Happy

With hackers using ransomware and other attack methods to compromise high-value privileged user credentials, organizations need to take a serious look at how they approach their cyber defense. Here’s where to start.

The Reports of FTP Death are Greatly Exaggerated

Reports of the death of File Transfer Protocol (FTP) have circulated ever since Debian Project announced it was sunsetting the popular and long-lived protocol on November 1 later this year. Don't believe it.

Seriously?! Can You Not Do That? Chapter IV - Insecure Use of Public Wi-Fi

At one time or another, we’ve all connected to the Internet via public Wi-Fi – at a coffee shop, in a hotel, on a plane. The convenience is irresistible, but few people are aware that public Wi-Fi is one of the biggest risks to personal and business security because these networks are so easy to attack for hackers. Cybersecurity experts answer these questions: Are any public WiFi networks safe? What harm can be done on these public networks? And how can you protect yourself against this risk?

My Impact on Society as a Female Data Scientist

Xuan Zhao, a female data scientist in the information security industry, explains how machine learning dramatically helps her work have a true impact on society, and vice versa.

We Have No Choice. We MUST Make 2017 the Year of Cybersecurity

It’s 2017 and we can no longer afford to ignore good cybersecurity practices. In this ITSPmagazine exclusive, we connected with top cybersecurity experts to get their recommendations on protecting business and users from malicious attacks.

Buckle Up! 2017 Is Gonna Get Bumpy. 10 CyberSecurity Predictions

As 2016 comes to close, we are faced with many questions about what to expect in the coming year. Will malware ridden homes become the norm? Will mobile payments continue to mature and find their place in major organizations? Will we see physical injuries as a result of digital attacks? Mandeep Khera of Arxan shares his predictions with ITSPmagazine.

Cybersecurity Is About Privacy, Empathy, and the Real World

Technology entrepreneur Vishal Gupta explains how living by the principles of empathizing with the individuals whose data his firm is charged with protecting frames the way he approaches his InfoSec Life.

Dear Santa, Please Keep My Customer Data Safe This Year

With hacking rampant, and the holiday shopping season upon us, no company wants to become the next headline. Lucas Long from InfoTrust shares 3 ways to keep customer data safe.

The Actual Benefits of Artificial Intelligence & Machine Learning

If you believe the vendor hype, Artificial Intelligence is the greatest thing to ever happen to cybersecurity. Guess what? The vendors may be correct, but it’s not easy to determine what is useful technology and what is fluffy marketing.

It’s a Marketing Mess! Artificial Intelligence vs Machine Learning

From Big Data to Behavioral Analytics to Machine Learning, Artificial Intelligence presents a confusing landscape, in large part because the terms are vague and defined inconsistently (and vendors like it this way).