article thumbnail

Amy Zegart on Spycraft in the Internet Age

Schneier on Security

Amy Zegart has a new book: Spies, Lies, and Algorithms: The History and Future of American Intelligence. Now everyone is racing for insight and the internet gives them tools to do it. In the digital age, however, secrecy is bringing greater risk because emerging technologies are blurring nearly all the old boundaries of geopolitics.

Internet 176
article thumbnail

New Book Coming in September: "Click Here to Kill Everybody"

Schneier on Security

My next book is still on track for a September 2018 publication. Risks are Becoming Catastrophic. What a Secure Internet+ Looks Like 8. How We Can Secure the Internet+ 9. How to Engender Trust on the Internet+. It also needs to telegraph: "everyone needs to read this book." Norton is still the publisher.

Internet 149
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Public Hearing on IoT Risks

Schneier on Security

The US Consumer Product Safety Commission is holding hearings on IoT risks: The U.S. Consumer Product Safety Commission (CPSC, Commission, or we) will conduct a public hearing to receive information from all interested parties about potential safety issues and hazards associated with internet-connected consumer products.

IoT 188
article thumbnail

Books Worth Your Time (Q4)

Adam Shostack

The Huawei and Snowden Questions , by Olav Lysne is a deep dive into what happens when an untrusted vendor builds your trusted computing base, and more importantly, why a great many of the “obvious” ways to address those risks are subject to easy work-arounds. Cult of the Dead Cow , Joseph Menn. How to design games.

article thumbnail

“Fire Doesn’t Innovate” by Kip Boyle (Book Review)

Adam Shostack

I hate reviewing books by people I know, because I am a picky reader, and if you can’t say anything nice, don’t say anything at all. I also tend to hate management books, because they often substitute jargon for crisp thinking. It is not a book for the CSO. The book is organized into two major parts.

CSO 100
article thumbnail

AUTHOR Q&A: New book, ‘Hackable,’ suggests app security is the key to securing business networks

The Last Watchdog

The cybersecurity operational risks businesses face today are daunting, to say the least. Ted Harrington’s new book Hackable: How To Do Application Security Right argues for making application security a focal point, while laying out a practical framework that covers many of the fundamental bases. But where to start?

Risk 154
article thumbnail

Adversarial ML Attack that Secretly Gives a Language Model a Point of View

Schneier on Security

Here’s the latest: a training-time attack that forces the model to exhibit a point of view: Spinning Language Models: Risks of Propaganda-As-A-Service and Countermeasures.” Systems like GPT-3 will make it easy for those AIs to mine previous conversations and related Internet content and to appear knowledgeable.

Media 233