Copy
ITSPmagazine | At the Intersection of IT Security & Society™
View this email in your browser
The latest podcasts, stories, talk shows, novelties, rarities,
and oddities from ITSPmagazine.


Tuesday, September 25th, 2018


This edition is brought to you by our sponsor
*If you are considering an ITSPmagazine sponsorship we invite you to visit our Media Kit.

New Season and New Edition of our newsletter!
The latest podcasts, stories, novelties, rarities, and oddities from ITSPmagazine.

Enjoy and share, if you will.

By the way, did you know that now ITSPmagazine is on Patreon?
As you know, our mission is to raise awareness for cybersecurity by making it understandable, accessible, and part of everyone’s everyday life.
If you wish to become an ITSPmagazine Patron here is the link to learn more:
https://patreon.com/itspmagazine

Together we can make a difference!

The Circus is Coming!
This was ITSPmagazine's 2nd Official Unusual Gathering Talk Show
Recorded in Las Vegas during Black Hat 2018
(see below for links to video and podcast)

Notable Quotes

“We hack something to make it better, or to change the intended function of something. MacGyver is the ultimate hacker.”
— Ted Harrington | IoT Defcon Village

“I associate the word hacker with tinkerer, someone who tinkers with something.”
— Russell Mosley | Blue Team Defcon Village

“I don’t tell my mom I’m a hacker, but my friends think that hacking is very cool.”
— Ariel Herbert-Voss | AI Defcon Village

“There is no evolution without hacking. Galileo was a hacker.”
— Marco Ciappelli | Co-Founder ITSPmagazine

“Nowadays the word hacker requires a qualifier.”
— Sean Martin | Co-Founder ITSPmagazine
 
Watch and listen to this episode of ITSPmagazine’s Unusual Gathering to hear DEF CON Villagers discuss the future of cybersecurity conferences and the role that hackers have in bringing safety to our digital and connected world.

Watch the Talk Show  |  Listen to the Podcast  |  Read the Recap
More Unusual Gatherings Talk Shows
 
ITSPmagazine's coverage, podcasts, webcasts, articles, and all the content we BsidesLV, and Hacking Diversity were made possible by the generosity of our sponsors. We are ever so grateful for your support.
 
 

 

And, now ... here are the latest ITSPmagazine Experts Corners.
Be sure to visit and browse the collection of more than 400 contributions.

All divided by categories!

There are a few common misconceptions that prevent small- and medium-sized businesses (SMBs) from pursuing a strong security posture. It is important for both the businesses and the security industry to understand the reality of the situation. Megan Roddie, security analyst with Recon InfoSec, explains how to avoid the most common mistakes of SMB security.

______________________________
 
 
______________________________
 

Sponsored Content

Anti-Phishing Requires A Three-Pronged Strategy: technical controls, end-user controls and process automation.

This white paper explores how modern phishing techniques, such as business email compromise (BEC), ransomware, spear-phishing and advanced persistent threats (APTs) are meticulously designed to defeat traditional email security approaches and how IRONSCALES’ advanced threat protection platform is uniquely built to addresses the contemporary techniques of phishers.

Download the White Paper

Some of the most popular DDoS mitigation tools are also the least effective. Many enterprise organizations have been lulled into a false sense of security, literally, and are ill-prepared to defend against modern DDoS attacks, primarily because they don’t fully understand the extent of the risk. Tom Bienkowski of NETSCOUT Arbor explains those risks and suggests defenses.


Sponsored Content
Nintex’s new State of Intelligent Process Automation Study identifies how company decision makers and line of business employees view their enterprise digital transformation progress, successes, and adoption challenges.

Though positive progress on digital transformation goals shows promise, the research reveals a distinct barrier to overall digital transformation success: poor top-down communication.

Learn more by reading the report


Lots Of Ways To Earn Continuing Professional Education Credits!

Earning CPE Credits With ITSPmagazine. Now That’s Cool
 

 
Start Earning Your CPEs With ITSPmagazine
As we grow ITSPmagazine,
we are offering very affordable advertising and sponsorship opportunities.

If you like what we do, we invite you to visit our Media Kit Page.

Also, after many requests, we finally joined Patreon!
As you know, our mission is to raise awareness for cybersecurity by making it understandable, accessible, and part of everyone’s everyday life.
If you wish to become an ITSPmagazine Patron here is the link to learn more:
https://patreon.com/itspmagazine


Together we can make a difference.

Help us spread cybersecurity awareness and education.

Thanks for sharing our newsletter with family, friends, neighbors, peers, and colleagues!
Share
Tweet
Share
+1
Forward

Interested in advertising with ITSPmagazine to reach our growing audience? Great!
Let's Go Places Together!
Inquire about ITSPmagazine sponsorship opportunities

Keep in touch with us

An

imsmartin consulting
publication
Copyright © 2018 ITSPmagazine, an IMSMARTIN publication, All rights reserved.


Want to change how you receive these emails?
You can update your preferences or unsubscribe from this list