SORT BY Relevancy
His first bestseller, Applied Cryptography, explained how the arcane science of secret codes actually works, and was described by Wired as "the book the National Security Agency wanted never to be published." His book on computer and network security, Secrets and Lies, was called by Fortune "[a] jewel box of little surprises you can actually use." Beyond Fear tackles the problems of security from the small to the large: personal safety, crime, corporate security, national security. His book, Schneier on Security, offers insight into everything from the risk of identity theft (vastly overrated) to the long-range security threat of unchecked presidential power and the surprisingly simple way to tamper-proof elections.
Regularly quoted in the media -- and subject of an Internet meme -- he has testified on security before the United States Congress on several occasions and has written articles and op eds for many major publications, including The New York Times, The Guardian, Forbes, Wired, Nature, The Bulletin of the Atomic Scientists, The Sydney Morning Herald, The Boston Globe, The San Francisco Chronicle, and The Washington Post.
Schneier also publishes a free monthly newsletter, Crypto-Gram, with over 150,000 readers. In its ten years of regular publication, Crypto-Gram has become one of the most widely read forums for free-wheeling discussions, pointed critiques, and serious debate about security. As head curmudgeon at the table, Schneier explains, debunks, and draws lessons f
Our guest today is Peter Gregory. He is a security manager, computer security specialist, and author of over 20 books, including CISSP for Dummies. He has experience in the information technology sector, which spans over thirty-years and began in the 1970s.
He has worked in:
· local government
· wireless telecommunications, and
· financial management Our topic today is about writing books in the security sector
Welcome to Security Radio. Your host James Hall with our No. 3 episode - a discussion about mobile phone security.
This evening we have with us the Chief Security Officer of FIXMO a provider of Mobile Risk Management services. Dan has been an information security professional for more than 15 years, and has worked for notable organizations such as XM Radio, Secure Computing, McAfee, Nominum, and Accuvant. He has extensive experience running security programs within the government segment; his most notable role was as Director of Network Security at the Transportation and Security Administration, which was the largest managed service contract within the federal government. Dan joined Fixmo in 2012 to drive security and technology innovation within Fixmo's suite of Mobile Risk Management solutions. In his role at Fixmo, he is directly responsible for global security and information assurance initiatives – researching trends, discovering security vulnerabilities and exploits, building strategic partnerships; and attaining industry certifications - as well as product innovation. Dan holds an M.S. in Information Assurance/Computer Forensics from Capitol College and a D.Sc in Information Assurance from Capitol College with a dissertation focus on enterprise smartphone security.
Security Radio thanks you for listening.
Are you going to the Black Hat Security Conference starting on July 27th in Vegas? Here's a preview of what our team will be doing and the sessions that can help you build your schedule. In this podcast Caleb gives each of the IBM speakers a chance to give a quick commercial of their session so listen to this in the car or on the airplane on the way to Black Hat and you can map out your week.
Also check out our new blog at http://securityintelligence.com/
In this podcast we review the newly published Gartner Magic Quadrant for Application Security Testing (AST) with our subject matter expert Diana R. Kelley (Application Security Strategist, IBM Security Systems). The live discussion will cover the value for customer using this new combined SAST and DAST MQ report, how and when security as a service can be used in your enterprise, insights on IBM's support for iOS application testing as well as what's next within the application security world. Don't miss it, join us!
You can download your own copy of the Gartner Magic Quadrant using this link: http://www-01.ibm.com/software/rational/info/dast/
Podcast topics include: static testing, dynamic testing, web application scanning, manual penetrtion testing, code review, bytecode analysis, iOS and Android application security, application security testing as a service, SaaS, Veracode, WhiteHat, HP, securing the SDLC, SQLi, XSS, security intelligence, integrated security, web application firewalls, database access management, SIEM.
2013 is well on its way to be another record year for cyber intrusions, keeping security as a topic in every corporation’s boardroom and in every government agency.
How many vulnerabilities did your security team find scanning today, last month, or this year? And how many were high risk? In the first six months of 2013, the IBM X-Force Research and Development team analyzed 4,100 new security vulnerabilities and 900 million new web pages and images.
The IBM X-Force team just released their Trend and Risk Report which summarizes their findings on emerging threats and the 2013 attack landscape. If you are a CIO, CEO, CISO or a line of business executive this must read report outlines the new attack opportunities in areas like:
• Social media: how social media is a valuable tool for business, but is also being used by attackers for reconnaissance and launching attacks
• Mobile device malware: how the explosive growth of Android devices is attracting malware authors
• Poisoning the watering hole: how attackers are compromising a central strategic target and launching zero day exploits
• Distraction and diversion: how attackers are amplifying Distributed-Denial-of-Service (DDoS) attacks as a distraction to allow them to breach other systems
• Old techniques, new success: how today’s security complexity can enable old gaps to be exploited
The electric grid is one of man's oldest and largest machines, and while it's beginning to show it's age in some ways, it's also being modernized with sensors and advanced communications technologies at a rapid pace. In the wake of Stuxnet and more recently the powerful Shamoon attacks on energy companies in the Middle East, governments around the world seem to be waking up in unison to the scale of cyber threats facing their electric sectors, and the other critical national infrastructure systems that depend on it. This conversation will discuss the current state of security at a typical electric utility, some of the of new and emerging rules in place to govern security processes at utilities and beyond, and as Smart Meters have come to symbolize the Smart Grid moderation effort for many, some thoughts on consumer privacy and how it's being protected.
In this podcast Caleb will be joined by Andy Bochman. As the Energy Security Leader at IBM, Andy works all aspects of cyber security, privacy and compliance facing US and international utilities. He's the founder and editor of the influential Smart Grid Security and DOD Energy blogs, and a frequent speaker, writer and adviser on topics at the intersection of grid modernization, privacy and cyber security.
in IT Security
New threats, new applications, and new technologies are combining to create the opportunity for a new approach to IT security. What "old school" IT security practices will be passed on to the next generation and what new ones will emerge?
On Friday, May 22nd, Christopher Beier from Fiserv, the leading global provider of information management and electronic commerce systems for the financial services industry, will join Steve as guest co-host to talk about the concept of Security 2.0, some
Join Host Live Chats
- The Wacko Network (10 chatters)
- Seed2Cure (9 chatters)
- Kardec Radio (8 chatters)
- IDECLAIR (8 chatters)
- The Cosmic Citizen (5 chatters)
- House To Life (5 chatters)
- PAPSITE RADIO (4 chatters)
- Psychic Radio Network (4 chatters)
- AkashaBird (3 chatters)
- Back To Us (3 chatters)
- UCLA Football (3 chatters)
- WARriorsInGODsArmy (3 chatters)
- WormholeRiders (2 chatters)
- The Grown Zone (2 chatters)
- CONNECT1 (2 chatters)
- NDB Media (2 chatters)
- Sports on Tap (2 chatters)
- Stacey White (1 chatters)
- Sheree Speaks (1 chatters)
- Side Kick Pro (1 chatters)
- Omega Ministry Group (1 chatters)
- Rev Jay 0011 (1 chatters)
- Diane Grimble Ministries LIVE (1 chatters)
- HitMan Ministries (1 chatters)
- INDIE REVIEW RADIO (1 chatters)
- Bucco Talk0 (1 chatters)
- Cohen Sports Talk Radio (1 chatters)
- AngelsTeachRadio (1 chatters)
- The Robert Wesley Branch Show (1 chatters)
- The Supernatural Spirit (1 chatters)
- The Don Smith Show (1 chatters)