SORT BY Relevancy
His first bestseller, Applied Cryptography, explained how the arcane science of secret codes actually works, and was described by Wired as "the book the National Security Agency wanted never to be published." His book on computer and network security, Secrets and Lies, was called by Fortune "[a] jewel box of little surprises you can actually use." Beyond Fear tackles the problems of security from the small to the large: personal safety, crime, corporate security, national security. His book, Schneier on Security, offers insight into everything from the risk of identity theft (vastly overrated) to the long-range security threat of unchecked presidential power and the surprisingly simple way to tamper-proof elections.
Regularly quoted in the media -- and subject of an Internet meme -- he has testified on security before the United States Congress on several occasions and has written articles and op eds for many major publications, including The New York Times, The Guardian, Forbes, Wired, Nature, The Bulletin of the Atomic Scientists, The Sydney Morning Herald, The Boston Globe, The San Francisco Chronicle, and The Washington Post.
Schneier also publishes a free monthly newsletter, Crypto-Gram, with over 150,000 readers. In its ten years of regular publication, Crypto-Gram has become one of the most widely read forums for free-wheeling discussions, pointed critiques, and serious debate about security. As head curmudgeon at the table, Schneier explains, debunks, and draws lessons f
Our guest today is Peter Gregory. He is a security manager, computer security specialist, and author of over 20 books, including CISSP for Dummies. He has experience in the information technology sector, which spans over thirty-years and began in the 1970s.
He has worked in:
· local government
· wireless telecommunications, and
· financial management Our topic today is about writing books in the security sector
Welcome to Security Radio. Your host James Hall with our No. 3 episode - a discussion about mobile phone security.
This evening we have with us the Chief Security Officer of FIXMO a provider of Mobile Risk Management services. Dan has been an information security professional for more than 15 years, and has worked for notable organizations such as XM Radio, Secure Computing, McAfee, Nominum, and Accuvant. He has extensive experience running security programs within the government segment; his most notable role was as Director of Network Security at the Transportation and Security Administration, which was the largest managed service contract within the federal government. Dan joined Fixmo in 2012 to drive security and technology innovation within Fixmo's suite of Mobile Risk Management solutions. In his role at Fixmo, he is directly responsible for global security and information assurance initiatives – researching trends, discovering security vulnerabilities and exploits, building strategic partnerships; and attaining industry certifications - as well as product innovation. Dan holds an M.S. in Information Assurance/Computer Forensics from Capitol College and a D.Sc in Information Assurance from Capitol College with a dissertation focus on enterprise smartphone security.
Security Radio thanks you for listening.
As a precursor to Lacoon Mobile Security's upcoming presentation at Blackhat 2014, we interivew Daniel Brodie, a Sr. Security Researcher at Lacoon to discuss some of the vulnerabilities that exist in Virtual Desktop Infrastructure (VDI) frameworks, as well as provide some insights into the implications of using VDI in your enterprise.
Daniel explains how while VDI solutions are certainly a beneficial tool to protect enterprises against device theft, they don’t provide protection against targeted threats such as mobile Remote Access Trojans (mRATs) and Man-in-the-Middle. In fact, as he shows in the research, threats against the underlying VDI platform are fairly easy to carry out by using widely-distributed free tools.
The podcast goes over the main topics that he’ll present at Blackhat, including the methods of research, potential threats and best practices that enterprises should follow.
In this podcast Caleb talks with Diana Kelley and Doug Wilson, two experts in the field of application security to discuss how software testing is rapidly maturing to risk based application security approach. We will introduce a new framework for application security that covers Test, Assure and Protect (TAP). Let's face it, you cannot scan and remediate everything, but if you aren't scanning the right assets you're putting your corporate assets at risk, so let's talk about a practical approach to managing application security.
Some of the biggest market applications for Biometrics include Physical Access Entry, Time and Attendance, as well as Single Sign On Solutions. However, Biometrics are also starting to boom into other industry sectors as well, such as airport security, construction/workforce management, and as we all know, mobile solutions as well. In today's radio show, we interview Mr. Neil Norman, CEO of Human Recognition Systems, based out of the United Kingdom. Human Recognition Systems has scored many firsts in the UK, such as:
*Implementing the use of "Iris at a Glance" technology;
*Deploying Biometrics across the correctional and penal system in the UK;
*Deploying Biometrics at a UK based airport;
*Also being the UK's first vendor to offer Multimodal Biometric Solutions.
Of course, we will be finding out first hand about many of these firsts, but also, we will hear about successful client implementations, and what lays ahead for Human Recognition Systems in the coming years.
What is Android fragmentation and how does it affect the mobile security of the Android-based devices? In this Mobile Security Talk episode, Dan Koretsky, sr. security researcher at Lacoon Security, provides us a brief overview of Android fragmentation and its security implications.
In this podcast Caleb Barlow speaks with Sandy Bird, CTO of IBM Security Systems, co-founder of Q1 Labs to discuss his recent appointment as an IBM Fellow, part of IBM’s elite "most exceptional" technical professionals. Sandy will explain what makes being an IBM Fellow so rewarding and will shed some light on the types of people that have been honored with this distinction. In addition, Sandy will discuss how his career and the security landscape have both evolved during his during a time that threats have constantly evolved for financial profit. He’ll also explain what it’s like to work in the security industry and why college students should consider a career working in cyber security.
New threats, new applications, and new technologies are combining to create the opportunity for a new approach to IT security. What "old school" IT security practices will be passed on to the next generation and what new ones will emerge?
On Friday, May 22nd, Christopher Beier from Fiserv, the leading global provider of information management and electronic commerce systems for the financial services industry, will join Steve as guest co-host to talk about the concept of Security 2.0, some of the emerging technologies and requirements that are helping to shape how we approach security, and Fiserv’s experience implementing it.
Christopher Beier is a senior product manager for Fiserv online security products, including Fraud Detection System, Intelligent Authentication, and FraudNet. He is a seasoned security professional with more than a decade of experience in both the private sector and the military.
Join Host Live Chats
- Psychic Choice Radio (6 chatters)
- PSH Radio Show (3 chatters)
- Do ChimeIn (3 chatters)
- Everything Kathy B (2 chatters)
- Lisa aka lablady (2 chatters)
- Michael Jacksons Maker of Dreams (2 chatters)
- ADR CoXHost (2 chatters)
- Top Star Hip Hop Radio (2 chatters)
- peace333 (1 chatters)
- Here Be Monsters (1 chatters)