The latest podcasts, stories, talk shows, novelties, rarities,
and oddities from ITSPmagazine.
Tuesday, September 25th, 2018
This edition is brought to you by our sponsor
*If you are considering an ITSPmagazine sponsorship we invite you to visit our Media Kit.
New Season and New Edition of our newsletter!
The latest podcasts, stories, novelties, rarities, and oddities from ITSPmagazine.
Enjoy and share, if you will.
By the way, did you know that now ITSPmagazine is on Patreon?
As you know, our mission is to raise awareness for cybersecurity by making it understandable, accessible, and part of everyone’s everyday life. If you wish to become an ITSPmagazine Patron here is the link to learn more: https://patreon.com/itspmagazine Together we can make a difference!
The Circus is Coming!
This was ITSPmagazine's 2nd Official Unusual Gathering Talk Show
Recorded in Las Vegas during Black Hat 2018
(see below for links to video and podcast)
Notable Quotes
“We hack something to make it better, or to change the intended function of something. MacGyver is the ultimate hacker.”
— Ted Harrington | IoT Defcon Village
“I associate the word hacker with tinkerer, someone who tinkers with something.”
— Russell Mosley | Blue Team Defcon Village
“I don’t tell my mom I’m a hacker, but my friends think that hacking is very cool.”
— Ariel Herbert-Voss | AI Defcon Village
“There is no evolution without hacking. Galileo was a hacker.”
— Marco Ciappelli | Co-Founder ITSPmagazine
“Nowadays the word hacker requires a qualifier.”
— Sean Martin | Co-Founder ITSPmagazine
Watch and listen to this episode of ITSPmagazine’s Unusual Gathering to hear DEF CON Villagers discuss the future of cybersecurity conferences and the role that hackers have in bringing safety to our digital and connected world.
ITSPmagazine's coverage, podcasts, webcasts, articles, and all the content we BsidesLV, and Hacking Diversity were made possible by the generosity of our sponsors. We are ever so grateful for your support.
And, now ... here are the latest ITSPmagazine Experts Corners.
Be sure to visit and browse the collection of more than 400 contributions.
There are a few common misconceptions that prevent small- and medium-sized businesses (SMBs) from pursuing a strong security posture. It is important for both the businesses and the security industry to understand the reality of the situation. Megan Roddie, security analyst with Recon InfoSec, explains how to avoid the most common mistakes of SMB security.
Regularly measuring the effectiveness of cybersecurity efforts is challenging but essential to avoid security incidents. The ROI of security investments should be based on how much loss the organization could avoid due to the investment. In this article, Netwrix CEO Steve Dickson covers a combination of quantitative and qualitative methods to evaluate the return on security investments (ROSI).
Anti-Phishing Requires A Three-Pronged Strategy: technical controls, end-user controls and process automation.
This white paper explores how modern phishing techniques, such as business email compromise (BEC), ransomware, spear-phishing and advanced persistent threats (APTs) are meticulously designed to defeat traditional email security approaches and how IRONSCALES’ advanced threat protection platform is uniquely built to addresses the contemporary techniques of phishers.
Some of the most popular DDoS mitigation tools are also the least effective. Many enterprise organizations have been lulled into a false sense of security, literally, and are ill-prepared to defend against modern DDoS attacks, primarily because they don’t fully understand the extent of the risk. Tom Bienkowski of NETSCOUT Arbor explains those risks and suggests defenses.
Nintex’s new State of Intelligent Process Automation Study identifies how company decision makers and line of business employees view their enterprise digital transformation progress, successes, and adoption challenges.
Though positive progress on digital transformation goals shows promise, the research reveals a distinct barrier to overall digital transformation success: poor top-down communication.
As we grow ITSPmagazine,
we are offering very affordable advertising and sponsorship opportunities.
If you like what we do, we invite you to visit our Media Kit Page.
Also, after many requests, we finally joined Patreon!
As you know, our mission is to raise awareness for cybersecurity by making it understandable, accessible, and part of everyone’s everyday life. If you wish to become an ITSPmagazine Patron here is the link to learn more: https://patreon.com/itspmagazine
Together we can make a difference.
Help us spread cybersecurity awareness and education.
Thanks for sharing our newsletter with family, friends, neighbors, peers, and colleagues!