InfoSec Life

9 Ways I’ve Seen Companies Respond to a Breach

Breaches aren’t easy to deal with, especially if you are of the opinion that companies are people, too. Having seen, been part of, and lent a shoulder to many a breach, Javvad Malik, Security Advocate at AlienVault, offers nine of the common (but not best!) ways that companies respond to breaches.

5 Tips to Improve Your Cybersecurity Posture in 2019

The #CyberAvengers, a group of salty and experienced professionals, takes a brief look back at 2018 with its breaches of epic proportions. But rather than whine, moan and complain about the past — they suggest 5 things you can do in the next few weeks to have a safer cyber 2019.

It’s A Matter of Culture. Equality Means Equality. Period.

As the Information Networking Institute’s new director, Dr. Dena Haritos Tsamitis made a commitment to figuring out why there were only 2 out of 34 female students that year. After reviewing the research, she found that culture matters — so she created Women@INI to foster an equal playing field.

Cybersecurity Quick Tips From The #Cyberavengers: How To Set Up an Early Warning System

The #CyberAvengers, a group of salty and experienced professionals, offers a few quick tips that set up a cybersecurity early warning system, giving you a chance to make sure your “cyber fire” does not get out of control.

Darn It, Did You Really Miss The Gorilla?

From the men who stare at goats to the possibility of seeing the gorilla, research has found that leveraging methods from unrelated fields produce breakthroughs. Cybersecurity consultant Rachel Phillips explains why employers would be wise to consider the value of non-traditional skillsets when looking for their next security “genius.”

How Military Veterans Transition To Civilian Cybersecurity

One of the toughest challenges facing military veterans is making the transition to civilian life. It’s difficult for many of them to see how their military training translates into a civilian career, and the process of job hunting can be daunting. There's hope though; and this program is one example of good things happening in the industry.

A Dialogue with Tadd Wood

In this ITSPmagazine An InfoSec Life column, Tadd Wood shares his views on how data—and people—play a role in identifying risk and addressing cybersecurity issues.

I Ran The Boston Marathon. Here is What I Learned

Ted Harrington recently ran The Boston Marathon – the oldest, most prestigious, arguably most important marathon in the world. According to Ted, it was by far one of the most fulfilling experiences of his entire life. Throughout the course of preparing for, attempting, and executing this feat, he noticed some striking parallels between running and entrepreneurship. This is his story.

The Building Blocks Of CyberSecurity Are People

There’s an old joke in the community that there is no patch for the user – technology can be fixed, but human mistakes cannot be overcome. In this new An InfoSec Life article, Joseph Pindar shares his beliefs that peoples’ actions aren’t a problem that can be easily dismissed with a joke.

A Dialogue With Kate Adam, Head of Product Marketing at E8 Security

Cybersecurity offers the chance to protect loved ones from digital evil, and a career devoid of humdrum monotony. Kate Adam shares how she stumbled into this field, and why it’s been the most fulfilling accident of her professional life.

The Side Effects Of A Technology Craving Society - Part 2

When technology evolves faster than our ability to make sure there's a viable level of safety, how do we educate businesses and the layperson on best practices for IoT security? In this part 2 InfoSec Life article, Phil Agcaoili, CISO, shares his views on the need to raise InfoSec awareness in society while striving for (and embracing) diversity in cybersecurity. 

A Dialogue With Joe Gray, Enterprise Security Consultant

ITSPmagazine recently caught up withJoe Gray, Enterprise Security Consultant at Sword & Shield Enterprise Security. Joe shared his views on personal information sharing, privacy, and the value of community service for information security awareness throughout society.

A Dialogue With Shehzad Merchant, Gigamon's Chief Technology Officer

ITSPmagazine connects with Shehzad Merchant, Gigamon's Chief Technology Officer about his role as CTO for Gigamon, the value of culture in building out a cybersecurity program, and the importance he and his company place on collaboration and innovation beyond traditional R&D roles.

The Side Effects Of A Technology Craving Society - Part 1

We live in a technology-hungry society where consumers are accustomed to the convenience of technology without understanding the risks and vulnerabilities that come with it. In this part 1 of 2 InfoSec Life articles, Phil Agcaoili, CISO, discusses the five core issues of basic cyber hygiene.

My Impact on Society as a Female Data Scientist

Xuan Zhao, a female data scientist in the information security industry, explains how machine learning dramatically helps her work have a true impact on society, and vice versa.

How I Pay It Forward and Build a Better Workplace in Cybersecurity

Amy Brachio knows the challenges of making partner at EY while raising two daughters and caring for ailing parents, but what made it bearable was the professional and personal support she received at every step. As a leader, her goal is to foster an environment that provides the same support for others.

What Makes You a Cyber Security Professional – Nature or Training?

Your nature makes you a perfect candidate for a career in InfoSec, but it’s the nurturing found in community that will make you a success.

The Softer Side of Artificial Intelligence

Sometimes, it's all too easy to forget about the technology we surround ourselves with. In this ITSPmagazine article, artificial intelligence expert, Scott Scheferman, explores the realities of technology becoming ingrained in our everyday lives.

What’s It Like Running the Daily Race of Cybersecurity?

Mandy Huth shares a day in her life as Director of Cybersecurity in order to produce further understanding of the challenges InfoSec professionals face and how we might overcome them.

A Dialogue with Dinah Davis - Founder of Code Like a Girl

The founder of “Code Like A Girl” explains the overt sexism she experienced growing up, later in college and in the corporate world merely due to her gender, which made her only more determined to make strides for women who are interested in a tech-oriented career.