Home Featured Chronicle

My Story About Diversity In Cybersecurity. By Melissa Wooten

As part of ITSPmagazine’s “Share Your Own Story” initiative, Melissa Wooten, Director of Security Services at RiskSense, Inc., shares her story about the intersection of diversity, technology, life, and the challenges and obstacles she had to overcome along her journey into cybersecurity.

Why Do We Have a National Cybersecurity Awareness Month?

By Sean Martin, host of At The Edge

In the first of three episodes, Sean Martin is joined by Marco Ciappelli, and these co-founders have the distinct pleasure of chatting with Daniel Elliot on the show. Daniel is the director of small business education at the NCSA and gives an overview of National Cyber Security Awareness Month, as well as the value of sharing cybersecurity responsibility — from the consumer to the large enterprise and from the boardroom to the break room.

Should we just roll the dice or plan our AI-embedded future?
 A conversation with Dr. Ayesha Khanna

By Marco Ciappelli, host of The Cyber Society

This is a conversation with Dr. Ayesha Khanna, right after her closing keynote at RSA Conference 2018 APJ during the The Hugh Thompson Show: Artificial Intelligence APJ Style. Even Sophia — Hanson Robotics’ latest and most advanced robot to date and a cultural icon — was part of that panel, but to be honest, at this stage I would rather talk about Artificial Intelligence with those of my kind. For the time being.

Are IoT Security Concerns Stupid? Not So Fast! Here's The Top 10 IoT Hall Of Shame for 2018

By Sean Martin, host of At The Edge

Arthur Hicken gives us an updated top 10 “IoT Hall of Shame” list of connected device vulnerabilities ranging from cameras to medical devices and from teddy bears to musical instruments (plus a few honorable mentions). Take a listen to find out what Arthur has uncovered during his research!

From Liberal Arts to InfoSec, How a Diverse Background Helps in Cybersecurity

By Selena Templeton, host of DiverseIT

Theresa Abbamondi, Director of Product Management for Arbor Cloud and Services, chats with ITSPmagazine's Selena Templeton about how having a diverse background — in this case, liberal arts — has helped her tremendously at Arbor Networks, the security division of NETSCOUT.

BSides Las Vegas Number Ten - Flip That Vinyl One More Time | A conversation with Jack Daniel

By Marco Ciappelli, host of The Cyber Society

As you can tell we were not in a hurry to publish the large amount of content created during our Las Vegas coverage. Instead, we decided to pace  ourselves and give you the time to appreciate all the conversations we had.

This one was recorded by me and Sean Martin after we went to see what was going on at BSides and ran into the conference’s Co-Founder Jack Daniel.

The Connection Between Cybersecurity and Business Process Management – How Many Processes Can You Automate? Why?

So just what do cybersecurity and business process management have to do with each other? In this 3-part series, Ryan Duguid, Sr VP of Technology Strategy at Nintex, chats with Sean Martin about connecting cybersecurity with business process management. In part 2, they cover the question: how many processes can you automate – and why?

Securing The Internet Is Our Shared Responsibility | NCSAM 2018

Give our dedicated focus on covering stories sitting at the intersection of IT security and society, it should come as no surprise that, at ITSPmagazine, we believe wholeheartedly in cybersecurity awareness. Therefore, as you might imagine, appreciate the awareness and education surrounding the month of October in what is called National Cyber Security Awareness Month, or NCSAM.

When It Comes To Fraud, Forget The Tech For A Moment And Follow The Money

By Sean Martin, host of At The Edge

Sean Martin chats with Laz and Andy Chandler about the world of fraud and business email compromise (BEC). Organizations that continue to drive their security program with compliance and fail to understand how the cybercriminals view their organization from head to toe will always be behind the eight ball.

Learning about Hire Ground at Bsides Las Vegas 2018 | A conversation with Kathleen Smith

By Marco Ciappelli, host of The Cyber Society

A conversation with Kathleen Smith | HIRE Ground Director

During Hackers Summer Camp, back In August, Sean Martin and I spoke with HIRE GROUND’s Director Kathleen Smith at BSIDES Las Vegas, to learn what makes this cybersecurity community event so special and so effective.



The Connection Between Cybersecurity and Business Process Management – The Value of Formal Asset and Identify Management

So just what do cybersecurity and business process management have to do with each other? In this 3-part series, Ryan Duguid, Sr VP of Technology Strategy at Nintex, chats with Sean Martin about connecting cybersecurity with business process management. In part 1, they explore the value of formal asset and identify management.

We All Have A Role To Play In Risk Management. What's Your Role?

By Sean Martin, host of At The Edge

In today’s episode, Sean Martin is joined by 3 students that recently completed the Pepperdine Cyber Risk Certification Program course:
- Lea Claveran, from Pecabar Holdings
- Karen Mendoza from Nintendo of America
- Randy Jackson, from the NFL

No adults without kids Supervision, at r00tz AsylumThe future of cybersecurity is looking good.

By Marco Ciappelli, host of The Cyber Society

A podcast recorded at r00tz Asylum | DefCon 26
with John Johnson, Nico Sell, Sean Martin, instructors, parents and kids.

What if some kids' dream is to be a hacker when they grow up?

How would you feel about that?
Are you smiling or freaking out?

Are you imagining a bunch of faceless hooded figures crouched over computers in dark rooms doing all sorts of illegal cyber activities while green fluorescent binary codes drip down like blood over laughing skulls painted on the walls behind them?

If this is the case, then you should freak out; I would too, but just like you, by imagining that I would be wrong.

Making CAPTCHAs Easy, Secure and Available for People with Disabilities

By Selena Templeton, host of DiverseIT

Kevin Gosschalk, co-founder and CEO of FunCaptcha, chats with ITSPmagazine's Selena Templeton and Sean Martin about leveraging gamification techniques for CAPTCHAs that are secure, can't be penetrated by bots, give the user best experience possible – and that people with accessibility requirements can still get through.

How the CyberSecurity industry created the weakest link | A very short story

By Marco Ciappelli, host of The Cyber Society
A conversation with myself.

For years this industry has been selling pills that are supposed to "make the users un-hackable and made a lot of money selling those.

When the pill didn't work as advertised, the finger was re-pointed towards the users because they should have taken the pill AND make some lifestyle change. They are the reason why the medicine is not working, they are the weakest link.

As An Industry We’ve Created A Disease That Afflicts The Users. It's Called Security Fatigue.

By Sean Martin, host of At The Edge

Sean Martin and co-host Selena Templeton chat with Chad Loder and Jason Hoenich from Habitu8 about insanity in the world of cybersecurity. Why do we keep trying to do the same thing over and over and yet expect a different result? Chad and Jason talk us through some of these things that are making all of us - the practitioners, defenders, and users - tired. And even a bit insane.

I Always Feel Like Somebody’s Watching Me! And I Have No Privacy.

By Sean Martin, host of At The Edge

Callum Corr, data analytics specialist at ZL Technologies, chats with ITSPmagazine’s Selena Templeton and Sean Martin about the recent Google/FBI case in which the FBI made an unprecedented request that Google turn over the data of ALL its smartphone users who were in the general area of the crime they were investigating, as well as Google’s surreptitiously storing of user location data even when you’ve turned that option off in your phone’s settings.

The User Is The Weakest Link In CyberSecurity! Or, Is It?

By Marco Ciappelli, host of The Cyber Society
A conversation with Shira Rubinoff, Sean Martin, and Marco Ciappelli
Recorded at Black Hat USA 2018

How many time have we heard the tale of the lazy, careless and ignorant technology user?

“Humans are the reason why cybersecurity solutions do not work! We need to make solutions that protect the users without the users being involved in the process. Because as usual they will F it up!” Really?

Nice try, sales and marketing team.

Deflate your ego, cybersecurity team.

Samantha Mosley: A 15-Year-Old Girl's Perspective On DEF CON

By Selena Templeton, host of DiverseIT

Live from DEF CON 26, ITSPmagazine’s Selena Templeton sits down with Samantha Mosley, a 15-year-old girl whose company she is interning with sent her to this conference. With her father Russell Mosley by her side, Samantha shares how a technology class in elementary school kicked off her interest, how she built her first app about George Washington in 4th grade, and what provoked her to do data analysis from local crime statistics.

GenCyber Girls Camp: A Free Summer Program About Cybersecurity

Selena Templeton and Sean Martin chat with a few folks from an all-girls cybersecurity summer camp called GenCyber Girls Camp. It’s a free program for middle and high school girls in which they learn core principles of cybersecurity, robotics, programming, cyber ethics, online safety and defense.