SORT BY Relevancy
His first bestseller, Applied Cryptography, explained how the arcane science of secret codes actually works, and was described by Wired as "the book the National Security Agency wanted never to be published." His book on computer and network security, Secrets and Lies, was called by Fortune "[a] jewel box of little surprises you can actually use." Beyond Fear tackles the problems of security from the small to the large: personal safety, crime, corporate security, national security. His book, Schneier on Security, offers insight into everything from the risk of identity theft (vastly overrated) to the long-range security threat of unchecked presidential power and the surprisingly simple way to tamper-proof elections.
Regularly quoted in the media -- and subject of an Internet meme -- he has testified on security before the United States Congress on several occasions and has written articles and op eds for many major publications, including The New York Times, The Guardian, Forbes, Wired, Nature, The Bulletin of the Atomic Scientists, The Sydney Morning Herald, The Boston Globe, The San Francisco Chronicle, and The Washington Post.
Schneier also publishes a free monthly newsletter, Crypto-Gram, with over 150,000 readers. In its ten years of regular publication, Crypto-Gram has become one of the most widely read forums for free-wheeling discussions, pointed critiques, and serious debate about security. As head curmudgeon at the table, Schneier explains, debunks, and draws lessons f
Our guest today is Peter Gregory. He is a security manager, computer security specialist, and author of over 20 books, including CISSP for Dummies. He has experience in the information technology sector, which spans over thirty-years and began in the 1970s.
He has worked in:
· local government
· wireless telecommunications, and
· financial management Our topic today is about writing books in the security sector
Welcome to Security Radio. Your host James Hall with our No. 3 episode - a discussion about mobile phone security.
This evening we have with us the Chief Security Officer of FIXMO a provider of Mobile Risk Management services. Dan has been an information security professional for more than 15 years, and has worked for notable organizations such as XM Radio, Secure Computing, McAfee, Nominum, and Accuvant. He has extensive experience running security programs within the government segment; his most notable role was as Director of Network Security at the Transportation and Security Administration, which was the largest managed service contract within the federal government. Dan joined Fixmo in 2012 to drive security and technology innovation within Fixmo's suite of Mobile Risk Management solutions. In his role at Fixmo, he is directly responsible for global security and information assurance initiatives – researching trends, discovering security vulnerabilities and exploits, building strategic partnerships; and attaining industry certifications - as well as product innovation. Dan holds an M.S. in Information Assurance/Computer Forensics from Capitol College and a D.Sc in Information Assurance from Capitol College with a dissertation focus on enterprise smartphone security.
Security Radio thanks you for listening.
As a precursor to Lacoon Mobile Security's upcoming presentation at Blackhat 2014, we interivew Daniel Brodie, a Sr. Security Researcher at Lacoon to discuss some of the vulnerabilities that exist in Virtual Desktop Infrastructure (VDI) frameworks, as well as provide some insights into the implications of using VDI in your enterprise.
Daniel explains how while VDI solutions are certainly a beneficial tool to protect enterprises against device theft, they don’t provide protection against targeted threats such as mobile Remote Access Trojans (mRATs) and Man-in-the-Middle. In fact, as he shows in the research, threats against the underlying VDI platform are fairly easy to carry out by using widely-distributed free tools.
The podcast goes over the main topics that he’ll present at Blackhat, including the methods of research, potential threats and best practices that enterprises should follow.
In this podcast Caleb talks with Diana Kelley and Doug Wilson, two experts in the field of application security to discuss how software testing is rapidly maturing to risk based application security approach. We will introduce a new framework for application security that covers Test, Assure and Protect (TAP). Let's face it, you cannot scan and remediate everything, but if you aren't scanning the right assets you're putting your corporate assets at risk, so let's talk about a practical approach to managing application security.
In this podcast Caleb Barlow speaks with Sandy Bird, CTO of IBM Security Systems, co-founder of Q1 Labs to discuss his recent appointment as an IBM Fellow, part of IBM’s elite "most exceptional" technical professionals. Sandy will explain what makes being an IBM Fellow so rewarding and will shed some light on the types of people that have been honored with this distinction. In addition, Sandy will discuss how his career and the security landscape have both evolved during his during a time that threats have constantly evolved for financial profit. He’ll also explain what it’s like to work in the security industry and why college students should consider a career working in cyber security.
Let's discuss the social security issue and find out if that will be enough for you to lay it all down for late in life. Join the show at 10:00 am. Call (818)301-5834.
Critical Infrastructure Cyber Security Framework
News of the World Phone Hacking Scandal
Windows XP End of Life
Michaels Data Breach
Additional late-breaking security news
SCHOOL SECURITY... AS THE YEAR BEGINS
THE NATIONAL ASSOCIATION OF SCHOOL RESOURCE OFFICERS
Mo Canady, Executive Director, about the recent NASRO conference and your safety readiness as the school year begins.
Join Host Live Chats
- Hagmann and Hagmann Report (499 chatters)
- Talk Real Solutions (43 chatters)
- Get Real LOL uncensored reality tv (26 chatters)
- MN.B.R.T. (25 chatters)
- Namaste Farms (23 chatters)
- The Lions are Out the Cage (21 chatters)
- JohnMcTernan (21 chatters)
- MHHS Eyes Wide Open (20 chatters)
- Curious Times (19 chatters)
- Healing Light Radio (17 chatters)
- African History Ntwk (15 chatters)
- StarChasr (15 chatters)
- HisWordHisWay (14 chatters)
- The Rad Reality Show (13 chatters)
- Dead Air Paranormal Radio (10 chatters)
- Andrea Shea King (9 chatters)
- TonyWolfPaw (8 chatters)
- The Seika Network (7 chatters)
- EnlightenmentEvolution Network (7 chatters)
- drkate (6 chatters)
- Erotic Talk Radio (6 chatters)
- SURN Host (6 chatters)
- Shifting Times Radio (6 chatters)
- Talking Terror Presents (5 chatters)
- Restoring Your Reality (5 chatters)
- Jay King Network (5 chatters)
- Royal Thieves Radio (4 chatters)
- Raw Sex (4 chatters)
- The Forbidden Fruit (4 chatters)
- The Steven James Experience (3 chatters)
- The View from Montana (3 chatters)
- NWO Truth Radio (3 chatters)
- Omega Man Channel 2 (3 chatters)
- Paranoidparanormal (3 chatters)
- Quagmire America (2 chatters)
- men empowered (2 chatters)
- Mystic Light and Shadows (2 chatters)
- Injustice System (2 chatters)
- Jamie Roxx (2 chatters)
- FFN On The Air (2 chatters)
- G Konsciousness Radio (2 chatters)
- Garrett Miller Radio (2 chatters)
- Growl Radio (2 chatters)
- Enough Iz Enough (2 chatters)
- The NTuned Show (2 chatters)
- Terrachat Net (1 chatters)
- The Crystal Show (1 chatters)
- NDB Media (1 chatters)
- Non Partisan Liberty For all (1 chatters)
- RXCX Anderson (1 chatters)
- Swaggercountdown (1 chatters)
- The Wacko Network (1 chatters)
- TheLegacyOfANation (1 chatters)
- untouchable1stfamradio (1 chatters)
- WDC DA MOVEMENT (1 chatters)
- Enterpraisement Media Group (1 chatters)
- Dollhouse Radio by India Morel (1 chatters)
- Ask the Theologian (1 chatters)
- Big Brother After Show (1 chatters)
- Crs Radio Caribbean Radio Show (1 chatters)
- God In The Midst (1 chatters)
- Fellowship of Deliverance (1 chatters)
- KLJN 107 7 (1 chatters)
- LadiesTellAll (1 chatters)
- Iconici Radio MMA (1 chatters)