SORT BY Relevancy
His first bestseller, Applied Cryptography, explained how the arcane science of secret codes actually works, and was described by Wired as "the book the National Security Agency wanted never to be published." His book on computer and network security, Secrets and Lies, was called by Fortune "[a] jewel box of little surprises you can actually use." Beyond Fear tackles the problems of security from the small to the large: personal safety, crime, corporate security, national security. His book, Schneier on Security, offers insight into everything from the risk of identity theft (vastly overrated) to the long-range security threat of unchecked presidential power and the surprisingly simple way to tamper-proof elections.
Regularly quoted in the media -- and subject of an Internet meme -- he has testified on security before the United States Congress on several occasions and has written articles and op eds for many major publications, including The New York Times, The Guardian, Forbes, Wired, Nature, The Bulletin of the Atomic Scientists, The Sydney Morning Herald, The Boston Globe, The San Francisco Chronicle, and The Washington Post.
Schneier also publishes a free monthly newsletter, Crypto-Gram, with over 150,000 readers. In its ten years of regular publication, Crypto-Gram has become one of the most widely read forums for free-wheeling discussions, pointed critiques, and serious debate about security. As head curmudgeon at the table, Schneier explains, debunks, and draws lessons f
Your privacy should be protected. But how can we be protected on an internet highway?
We'll review Microsoft's efforts to help keep your privacy protected, and start your awareness to still be on the internet highway and protect your privacy!
Last week the Guardian newspaper reported that American broadband and telecommunications company Verizon has been handing over records of all incoming and outgoing calls made by its customers - all 150 million of them - to the US National Security Agency since late April.
This was followed up by 'NSA whistleblower' Edward Snowden, a contractor working for the world's largest intelligence agency, going public with an internal powerpoint presentation that outlined the extent to which the NSA uses Google, Facebook, Apple and friends to spy on the whole world through a program called 'PRISM'. These companies, by the way, deny all charges and say that if it is being done, then it is being done without their knowledge or consent.
While President Obama reminds us that we cannot have "100% security and 100% privacy", some are calling for Snowden to be assassinated for treason and others praise him as "the greatest whistleblower ever". But what exactly is he blowing the whistle on? And where is this scandal leading us?
Join us this Sunday June 16th from 2-4pm EST (7-9pm CET), when we'll take a closer look at this prism for your mind.
Our guest today is Peter Gregory. He is a security manager, computer security specialist, and author of over 20 books, including CISSP for Dummies. He has experience in the information technology sector, which spans over thirty-years and began in the 1970s.
He has worked in:
· local government
· wireless telecommunications, and
· financial management Our topic today is about writing books in the security sector
Welcome to Security Radio. Your host James Hall with our No. 3 episode - a discussion about mobile phone security.
This evening we have with us the Chief Security Officer of FIXMO a provider of Mobile Risk Management services. Dan has been an information security professional for more than 15 years, and has worked for notable organizations such as XM Radio, Secure Computing, McAfee, Nominum, and Accuvant. He has extensive experience running security programs within the government segment; his most notable role was as Director of Network Security at the Transportation and Security Administration, which was the largest managed service contract within the federal government. Dan joined Fixmo in 2012 to drive security and technology innovation within Fixmo's suite of Mobile Risk Management solutions. In his role at Fixmo, he is directly responsible for global security and information assurance initiatives – researching trends, discovering security vulnerabilities and exploits, building strategic partnerships; and attaining industry certifications - as well as product innovation. Dan holds an M.S. in Information Assurance/Computer Forensics from Capitol College and a D.Sc in Information Assurance from Capitol College with a dissertation focus on enterprise smartphone security.
Security Radio thanks you for listening.
We'll review the the latest info on your Internet privacy and how you can protect it. We'll provide you with strategies, options and technical guidance on how you can make your Internet world a safer, better place for you and your family. It's Your Privacy Topic for Today Is: Your Computer Security Thanks to the internet, you can play games with an opponent across the ocean; review and rate videos, songs, clothes and software; you get expert advice in almost an instant; or even co
This program will highlight Privacy Resources available on the Internet. In today's new digital economy we must be completely prepared and knowledgeable in all aspects to protect our privacy from competitors and related associations/organizations. These resources will be your guides and subject tracers that will protect your privacy both online and offline. We will also be reviewing the latest happenings from my blog during the last week. We will be also discussing my latest freely available Awareness Watch Newsletter V11N9 September 2013 featuring eReference Resources as well as my freely available September 2013 Zillman Column titled Finding Experts By Using the Internet - Resources and Sites..
The internet opened our lives to the world and changed everything. At the onset attorney Darity Wesley was on the cutting edge. In 1983, long before Privacy was a national issue, she was dealing with privacy on many levels. As a seasoned veteran of the data world, she formed Privacy Solutions, Inc in 2001 to help businesses address this growing issue. She sold the consulting side of the company in 2010, the same year she founded the Lotus Law Center.
With her almost 30 years of business background and representing clients from the public record and real estate information industries to technology start ups and international publishing companies, she saw the need for a new kind of law based on collaboration, cooperation, and communication. Join us for a riveting interview on privacy issues today on Women Leading the Way Radio - Trend Setting Women!