As part of ITSPmagazine’s “Share Your Own Story” initiative, Melissa Wooten, Director of Security Services at RiskSense, Inc., shares her story about the intersection of diversity, technology, life, and the challenges and obstacles she had to overcome along her journey into cybersecurity.
In the first of three episodes, Sean Martin is joined by Marco Ciappelli, and these co-founders have the distinct pleasure of chatting with Daniel Elliot on the show. Daniel is the director of small business education at the NCSA and gives an overview of National Cyber Security Awareness Month, as well as the value of sharing cybersecurity responsibility — from the consumer to the large enterprise and from the boardroom to the break room.
This is a conversation with Dr. Ayesha Khanna, right after her closing keynote at RSA Conference 2018 APJ during the The Hugh Thompson Show: Artificial Intelligence APJ Style. Even Sophia — Hanson Robotics’ latest and most advanced robot to date and a cultural icon — was part of that panel, but to be honest, at this stage I would rather talk about Artificial Intelligence with those of my kind. For the time being.
Arthur Hicken gives us an updated top 10 “IoT Hall of Shame” list of connected device vulnerabilities ranging from cameras to medical devices and from teddy bears to musical instruments (plus a few honorable mentions). Take a listen to find out what Arthur has uncovered during his research!
Theresa Abbamondi, Director of Product Management for Arbor Cloud and Services, chats with ITSPmagazine's Selena Templeton about how having a diverse background — in this case, liberal arts — has helped her tremendously at Arbor Networks, the security division of NETSCOUT.
As you can tell we were not in a hurry to publish the large amount of content created during our Las Vegas coverage. Instead, we decided to pace ourselves and give you the time to appreciate all the conversations we had.
This one was recorded by me and Sean Martin after we went to see what was going on at BSides and ran into the conference’s Co-Founder Jack Daniel.
So just what do cybersecurity and business process management have to do with each other? In this 3-part series, Ryan Duguid, Sr VP of Technology Strategy at Nintex, chats with Sean Martin about connecting cybersecurity with business process management. In part 2, they cover the question: how many processes can you automate – and why?
Give our dedicated focus on covering stories sitting at the intersection of IT security and society, it should come as no surprise that, at ITSPmagazine, we believe wholeheartedly in cybersecurity awareness. Therefore, as you might imagine, appreciate the awareness and education surrounding the month of October in what is called National Cyber Security Awareness Month, or NCSAM.
Sean Martin chats with Laz and Andy Chandler about the world of fraud and business email compromise (BEC). Organizations that continue to drive their security program with compliance and fail to understand how the cybercriminals view their organization from head to toe will always be behind the eight ball.
A conversation with Kathleen Smith | HIRE Ground Director
During Hackers Summer Camp, back In August, Sean Martin and I spoke with HIRE GROUND’s Director Kathleen Smith at BSIDES Las Vegas, to learn what makes this cybersecurity community event so special and so effective.
So just what do cybersecurity and business process management have to do with each other? In this 3-part series, Ryan Duguid, Sr VP of Technology Strategy at Nintex, chats with Sean Martin about connecting cybersecurity with business process management. In part 1, they explore the value of formal asset and identify management.
A podcast recorded at r00tz Asylum | DefCon 26
with John Johnson, Nico Sell, Sean Martin, instructors, parents and kids.
What if some kids' dream is to be a hacker when they grow up?
How would you feel about that?
Are you smiling or freaking out?
Are you imagining a bunch of faceless hooded figures crouched over computers in dark rooms doing all sorts of illegal cyber activities while green fluorescent binary codes drip down like blood over laughing skulls painted on the walls behind them?
If this is the case, then you should freak out; I would too, but just like you, by imagining that I would be wrong.
Kevin Gosschalk, co-founder and CEO of FunCaptcha, chats with ITSPmagazine's Selena Templeton and Sean Martin about leveraging gamification techniques for CAPTCHAs that are secure, can't be penetrated by bots, give the user best experience possible – and that people with accessibility requirements can still get through.
By Marco Ciappelli, host of The Cyber Society
A conversation with myself.
For years this industry has been selling pills that are supposed to "make the users un-hackable and made a lot of money selling those.
When the pill didn't work as advertised, the finger was re-pointed towards the users because they should have taken the pill AND make some lifestyle change. They are the reason why the medicine is not working, they are the weakest link.
Sean Martin and co-host Selena Templeton chat with Chad Loder and Jason Hoenich from Habitu8 about insanity in the world of cybersecurity. Why do we keep trying to do the same thing over and over and yet expect a different result? Chad and Jason talk us through some of these things that are making all of us - the practitioners, defenders, and users - tired. And even a bit insane.
Callum Corr, data analytics specialist at ZL Technologies, chats with ITSPmagazine’s Selena Templeton and Sean Martin about the recent Google/FBI case in which the FBI made an unprecedented request that Google turn over the data of ALL its smartphone users who were in the general area of the crime they were investigating, as well as Google’s surreptitiously storing of user location data even when you’ve turned that option off in your phone’s settings.
How many time have we heard the tale of the lazy, careless and ignorant technology user?
“Humans are the reason why cybersecurity solutions do not work! We need to make solutions that protect the users without the users being involved in the process. Because as usual they will F it up!” Really?
Nice try, sales and marketing team.
Deflate your ego, cybersecurity team.
Live from DEF CON 26, ITSPmagazine’s Selena Templeton sits down with Samantha Mosley, a 15-year-old girl whose company she is interning with sent her to this conference. With her father Russell Mosley by her side, Samantha shares how a technology class in elementary school kicked off her interest, how she built her first app about George Washington in 4th grade, and what provoked her to do data analysis from local crime statistics.
Selena Templeton and Sean Martin chat with a few folks from an all-girls cybersecurity summer camp called GenCyber Girls Camp. It’s a free program for middle and high school girls in which they learn core principles of cybersecurity, robotics, programming, cyber ethics, online safety and defense.