SORT BY Relevancy
Today we focus on Internet Security and Layton too. We also will talk about our App of the Week, Book of the Week, and Song of the Week. Caleb will be bringing our News this week as well.
Enjoy our mad talks of pop culture and random comments from that crazy kid, Layton!
His first bestseller, Applied Cryptography, explained how the arcane science of secret codes actually works, and was described by Wired as "the book the National Security Agency wanted never to be published." His book on computer and network security, Secrets and Lies, was called by Fortune "[a] jewel box of little surprises you can actually use." Beyond Fear tackles the problems of security from the small to the large: personal safety, crime, corporate security, national security. His book, Schneier on Security, offers insight into everything from the risk of identity theft (vastly overrated) to the long-range security threat of unchecked presidential power and the surprisingly simple way to tamper-proof elections.
Regularly quoted in the media -- and subject of an Internet meme -- he has testified on security before the United States Congress on several occasions and has written articles and op eds for many major publications, including The New York Times, The Guardian, Forbes, Wired, Nature, The Bulletin of the Atomic Scientists, The Sydney Morning Herald, The Boston Globe, The San Francisco Chronicle, and The Washington Post.
Schneier also publishes a free monthly newsletter, Crypto-Gram, with over 150,000 readers. In its ten years of regular publication, Crypto-Gram has become one of the most widely read forums for free-wheeling discussions, pointed critiques, and serious debate about security. As head curmudgeon at the table, Schneier explains, debunks, and draws lessons f
Our guest today is Peter Gregory. He is a security manager, computer security specialist, and author of over 20 books, including CISSP for Dummies. He has experience in the information technology sector, which spans over thirty-years and began in the 1970s.
He has worked in:
· local government
· wireless telecommunications, and
· financial management Our topic today is about writing books in the security sector
Welcome to Security Radio. Your host James Hall with our No. 3 episode - a discussion about mobile phone security.
This evening we have with us the Chief Security Officer of FIXMO a provider of Mobile Risk Management services. Dan has been an information security professional for more than 15 years, and has worked for notable organizations such as XM Radio, Secure Computing, McAfee, Nominum, and Accuvant. He has extensive experience running security programs within the government segment; his most notable role was as Director of Network Security at the Transportation and Security Administration, which was the largest managed service contract within the federal government. Dan joined Fixmo in 2012 to drive security and technology innovation within Fixmo's suite of Mobile Risk Management solutions. In his role at Fixmo, he is directly responsible for global security and information assurance initiatives – researching trends, discovering security vulnerabilities and exploits, building strategic partnerships; and attaining industry certifications - as well as product innovation. Dan holds an M.S. in Information Assurance/Computer Forensics from Capitol College and a D.Sc in Information Assurance from Capitol College with a dissertation focus on enterprise smartphone security.
Security Radio thanks you for listening.
Join us Monday morning at 10:00 am CST on the WomenOntheWall.org Radio show. Special guest Lisa Benson. Lisa Benson Radio on National Security had breaking news on Sunday that we will be sharing with our listeners. The attackers in the al Shabaab terrorist attack in KENYA CAME FROM MINNESOTA .......AND OTHER PARTS OF THE UNITED STATES. On the show we will be connecing the dots... Education and National Security! Don't miss it!!
Anti-tax groups seem to be losing their influence as Republican lawmakers’ constituents support legislation that would require Internet retailers to collect sales taxes.
Then, on Thursday, the White House told Congressional leaders that the nation’s intelligence agencies had determined, “with varying degrees of confidence,” that Mr. Assad’s government had used sarin, a chemical agent, on a small scale. President Obama said last summer that use of chemical weapons was a “red line” that, if crossed, could prompt the United States to intervene, but administration officials made clear that more conclusive evidence would be necessary before any action would be taken.
“We never asked, nor did we encourage, the United States to take military action in Syria,” Mr. Steinitz said at a conference in New York sponsored by The Jerusalem Post. “And we are not making any comparison or linkage with Iran, which is a completely different matter.”
The IBM X-Force Threat Research Team has raised the Internet Threat Level to Level 2 following a Microsoft Security Advisory detailed a zero day vulnerability that affects all version of Microsoft Internet Explorer. The problem lies in the way the IE code handles memory that has been released or not properly allocated. This could potentially corrupt memory and allow an attacker to execute arbitrary code at the same privilege level as the logged in user. In this podcast we talk directly with the IBM X-Force research team to discuss the vulnerability and recommended actions you can take to protect yourself and your organization.
Understanding the Vulnerability of Internet Security with Frank Wuco is our guest of The Core Business Show with Tim Jacquet. Frank Wuco - Intelligence and National Security Expert One of the most dangerous scenarios presented to our national security is an intelligence leak, or worse yet, the deliberate divulgence of highly compartmented and classified Special Access Programs (SAPs). Disclosures of such operations and intelligence can contain secrets about sensitive methods, locations, plans,