article thumbnail

LLM Summary of My Book Beyond Fear

Schneier on Security

Claude (Anthropic’s LLM) was given this prompt: Please summarize the themes and arguments of Bruce Schneier’s book Beyond Fear. Then lay out the most salient criticisms of the book. Key Arguments: Analyze risks empirically using evidence, statistics, and probability rather than intuition.

article thumbnail

Author Q&A: A patient’s perspective of advanced medical technology and rising privacy risks

Security Boulevard

A close friend of mine, Jay Morrow, has just authored a book titled “Hospital Survival.” Related: Ransomware plagues healthcare Jay’s book is very personal.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Books Worth Your Time (Q4)

Adam Shostack

The Huawei and Snowden Questions , by Olav Lysne is a deep dive into what happens when an untrusted vendor builds your trusted computing base, and more importantly, why a great many of the “obvious” ways to address those risks are subject to easy work-arounds. Cult of the Dead Cow , Joseph Menn. How to design games.

article thumbnail

New Book Coming in September: "Click Here to Kill Everybody"

Schneier on Security

My next book is still on track for a September 2018 publication. Risks are Becoming Catastrophic. Conclusion: Technology and Policy, Together. It also needs to telegraph: "everyone needs to read this book." Norton is still the publisher. Everyone Favors Insecurity 3. Autonomy and Physical Agency Bring New Dangers 4.

Internet 150
article thumbnail

Digital Risk Types Demystified: A Strategic Insight into Online Threats

Centraleyes

Never underestimate the power of technology in shaping your business’s success. The digital landscape is advancing, and the risks of shirking cutting-edge technology are substantial. The future belongs to those who recognize and harness the power of technology to benefit their organizations.

Risk 52
article thumbnail

New Duo E-Book, Attack Vectors Decoded: Securing Organizations Against Identity-Based Threats

Duo's Security Blog

Identity-based cyberattacks are a challenge across all organizations, regardless of size, industry or technology. Some of the solutions are easy policy changes that organizations can turn on immediately, like Duo’s Risk-Based Authentication (RBA). Recently, attackers have targeted multi-factor authentication (MFA).

article thumbnail

Amy Zegart on Spycraft in the Internet Age

Schneier on Security

Amy Zegart has a new book: Spies, Lies, and Algorithms: The History and Future of American Intelligence. The third challenge posed by emerging technologies strikes at the heart of espionage: secrecy. I have not yet read the book. Wired has an excerpt : In short, data volume and accessibility are revolutionizing sensemaking.

Internet 178