ITSPmagazine's Selena Templeton sat down with Dena Haritos Tsamitis of Carnegie Mellon University to capture CMU’s story (which was among the first institutions in the world to create a degree program for cybersecurity). They also chat about the Information Networking Institute (INI) and Women@INI (WINI), Cylab (CMU's security and privacy research institute), MySecureCyberspace, diversity and inclusion, and imposter syndrome.
ITSPmagazine’s John Dasher chats with Dana Tamir of Silverfort at Black Hat 2018 about multi-factor authentication, how it’s changed with the shift to the cloud, hybrid environments and disappearing perimeters, and how Silverfort enables strong MFA across the entire network without modifications to endpoints and servers.
ITSPmagazine's John Dasher had a chance to sit down with Keenan Skelly, VP Global Partnerships & Security Evangelist at Circadence, at this year's Black Hat to capture Circadence’s story and chat about gamification and security, AI, cyber ranges, and women in cyber.
ITSPmagazine’s John Dasher chats with Brian Reed of NowSecure about their latest research that shows that using a top 50 mobile app from your favorite App Store probably has one or more critical vulnerabilities with a Common Vulnerability Scoring System (CVSS) score of 8 or higher. And we’re talking production apps from Fortune 500 companies here folks.
It feels normal and right to think that a business process should be modeled and designed from start to finish in a single place. Make it one workflow, and everyone knows what to do, you can monitor the workflow, and if you need to make changes, you know exactly where to look. Simple, right?
Crowdsourcing puts a whole new perspective on how we do pen testing in the InfoSec industry. ITSPmagazine sat down with Caroline Wong, CISSP and VP of Security Strategy at Cobalt Labs, who explains the benefits of crowdsourced security, how diversity plays a part, and why structuring your metrics is key to determining the ROI of your pen test program.
Regardless of industry, organizational security budgets continue to rise in the face of ever-escalating attacks. Terms like machine learning and artificial intelligence often cloud, rather than clarify, what one can expect from the technology supporting a given vendor’s solution. SlashNext aims to shake up the market by soundly delivering what security teams need – actionable alerts with extraordinarily low false positives.
ITSPmagazine recently caught up with VP of Product at iovation, Dwayne Melancon. Upon accepting the new position at the company, Melancon takes a moment to share his insights into the world of fraud and its impact on the community and society at large.
Robert Wood has managed to meld his love for being a champion for helping and protecting others with a successful career in security through his work at Nuna, a data-driven healthcare startup in San Francisco, CA. In this discussion, Robert offers some interesting perspectives and lessons learned regarding the complexities unique to protecting healthcare data.
Phishing threats have become highly sophisticated, combining social engineering aspects with targeted delivery, often resulting in financial, reputation, and brand damage to organizations. IRONSCALES offers multi-faceted solutions whereby employees can be trained and educated, attacks are surfaced through the use of machine learning-fueled analytics that empower security analysts to rapidly identify and remediate attacks before damage is inflicted, and the power of the crowd is employed to keep everyone safer.
In today’s increasingly hostile cybersecurity climate, with more CISOs finding they report directly to the CEO and the Board, the language of “risk” has reached epic levels of importance. Join us for a fascinating chat with RiskLens’ Jack Jones, Co-Founder and EVP Research and Development.
Winners in the cybersecurity game will safeguard data without constraining business. Learn how Zoltán Györkő, CEO and co-Founder of Balabit, achieves success with real-time user analysis and authentication.
What's the connection between automating IT tasks and securing the world's identity directories? STEALTHbits CEO, Steve Cochran, describes the journey his company took to focus completely on information security.
How does a startup CEO with no cybersecurity experience end up a leader in runtime application security? Read about Prevoty co-founder and CEO Julien Bellanger’s journey in infosec in this exclusive ITSPmagazine interview.