article thumbnail

Mentions

Adam Shostack

If you’re looking for me to go beyond the bounds of technology threat modeling, this was, an interesting, far-ranging conversation about the state of the world. Lastly, I’m interviewed as part of Ed Moyle & Diana Kelley’s new book, “ Practical Cybersecurity Architecture ,” now available for pre-order.

article thumbnail

Nurturing Our Cyber Talent

IT Security Guru

I remember when I set out in IT Architecture and was making the switch to Cybersecurity. For example, I experienced first-hand when I started in this sector that the cost of books, courses and accreditations was and remains astronomical. I wrote several books to share knowledge with those embarking on a career in cybersecurity.

CISO 117
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Developer Interest in Cybersecurity Topics Grows as Data Breaches Persist, O’Reilly Analysis Reveals

CyberSecurity Insiders

BOSTON–( BUSINESS WIRE )– O’Reilly , the premier source for insight-driven learning on technology and business, today announced the findings of its annual platform analysis , which examines the top search terms and most-consumed content on the company’s learning platform. To read the full platform analysis, please visit [link].

article thumbnail

Why We Need To Talk About DigitALL

Jane Frankland

It’s run by the United Nation’s and this year, their theme was ‘DigitALL: Innovation & Technology for Gender Equality.’ IWD 2023 should have brought the theme of ‘DigitALL: Innovation & Technology for Gender Equality’ to the forefront, especially for anyone working in tech and cybersecurity.

Education 130
article thumbnail

Could this 'Unhackable' Chip Be a Security Moonshot?

SecureWorld News

Undefined semantics are nooks and crannies of the computing architecture—for example the location, format, and content of program code. Talk of an unhackable technology reminds me of a fireside chat I saw at a SecureWorld conference a few years ago. was discussing his recent book about fixing cybersecurity.

CISO 123
article thumbnail

Securing the future of IoT devices

CyberSecurity Insiders

T he Secredas Project : Advancing technolog ies for co nnected and automated vehicles . While fully automated vehicles may seem a futuristic fantasy, there are many examples of this technology currently operating in the world today.

IoT 84
article thumbnail

Microsoft wraps SolarWinds probe, nudges companies toward zero trust

SC Magazine

Microsoft closed the book on the SolarWinds investigation. Vectra Chief Technology Officer Oliver Tavakoli applauded Microsoft’s endorsement of a zero trust architecture. Microsoft). And for this scenario, the user and the IT administration will be overwhelmed at end.