Cigital » The Silver Bullet Security Podcast with Gary McGraw show

Cigital » The Silver Bullet Security Podcast with Gary McGraw

Summary: Building Security In

Join Now to Subscribe to this Podcast

Podcasts:

 The Common Disregard for Privacy with Lorrie Cranor | File Type: audio/mpeg | Duration: 0:26:51

On the 45th episode of The Silver Bullet Security Podcast, Gary chats with Lorrie Cranor, Associate Professor of Computer Science and Engineering and Public Policy at Carnegie Melon University. Gary and Lorrie discuss how everyday people think about privacy and what we can do to get them to care about it, the relationship between trust and privacy, and why the US is lagging behind the EU on privacy-related issues. They close out the discussion by talking about women in computing. Lorrie Cranor Security and Usability: Designing Secure Systems That People Can Use Web Privacy with P3P CyLab Usable Privacy and Security Laboratory (CUPS) A “Nutrition Label” for Privacy Google search privacy video The post The Common Disregard for Privacy with Lorrie Cranor appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw. The post The Common Disregard for Privacy with Lorrie Cranor appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw.

 The History of Network Security with Steve Kent | File Type: audio/mpeg | Duration: 0:32:29

On the 44th episode of The Silver Bullet Security Podcast, Gary talks with Steve Kent, Chief Scientist – Information Security, for BBN Technologies, a division of Raytheon. Gary and Steve discuss the history of network security, secure transport and base Internet protocols, the role of politics in the adoption of security on the Internet, applied cryptography, and whether security and individual liberty co-exist. They finish by discussing extremely high end wine. Internet’s Biggest Security Hole Securing the Border Gateway Protocol (PPT) 2006: Statement before Congress regarding a nationwide ID system

 The History of Network Security with Steve Kent | File Type: audio/mpeg | Duration: 0:32:29

On the 44th episode of The Silver Bullet Security Podcast, Gary talks with Steve Kent, Chief Scientist – Information Security, for BBN Technologies, a division of Raytheon. Gary and Steve discuss the history of network security, secure transport and base Internet protocols, the role of politics in the adoption of security on the Internet, applied cryptography, and whether security and individual liberty co-exist. They finish by discussing extremely high end wine. Internet’s Biggest Security Hole Securing the Border Gateway Protocol (PPT) The post The History of Network Security with Steve Kent appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw. The post The History of Network Security with Steve Kent appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw.

 The Hype behind Cloud Security with Chris Hoff | File Type: audio/mpeg | Duration: 0:31:56

On the 43rd episode of The Silver Bullet Security Podcast, Gary chats with Christofer Hoff, Director of Cloud and Virtualization Solutions at Cisco. Hoff is well known for his colorful blog posts and presentations on cloud security and other complex security issues. Suffice it to say, the cloud was a big topic for this issue. And rum. Transcript of this episode [PDF] Rational Survivability The Frogs Who Desired a King: A Virtualization & Cloud Computing Fable Cloudifornication: Indiscriminate Information Intercourse Involving Internet Infrastructure Mount Gay Extra Old Rum (Gary’s favorite) Ron Zacapa Centenario Rum (Hoff’s favorite)

 The Hype behind Cloud Security with Chris Hoff | File Type: audio/mpeg | Duration: 0:31:56

On the 43rd episode of The Silver Bullet Security Podcast, Gary chats with Christofer Hoff, Director of Cloud and Virtualization Solutions at Cisco. Hoff is well known for his colorful blog posts and presentations on cloud security and other complex security issues. Suffice it to say, the cloud was a big topic for this issue. And rum. Rational Survivability The Frogs Who Desired a King: A Virtualization & Cloud Computing Fable Cloudifornication: Indiscriminate Information Intercourse Involving Internet Infrastructure Mount Gay Extra Old Rum (Gary’s favorite) Ron Zacapa Centenario Rum (Hoff’s favorite) The post The Hype behind Cloud Security with Chris Hoff appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw. The post The Hype behind Cloud Security with Chris Hoff appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw.

 Informatics and Health Security with Gilian Hayes | File Type: audio/mpeg | Duration: 0:30:51

On the 42nd episode of The Silver Bullet Security Podcast, Gary chats with Gillian Hayes, Assistant Professor in Informatics at the Bren School of Information and Computer Sciences at UC Irvine. Gary and Gillian discuss how much people really need to know about security going on behind the scenes, how usability affects the health records security, whether or not surveillance changes how 20-somethings act in public (including on the net), and how having more women technologists positively impacts the humanization of technology. Transcript of this episode [PDF] Gillian Hayes Social and technological action research (STAR) Ben Shneiderman National Center for Women and Information Technology The Discovery of Heaven

 Informatics and Health Security with Gilian Hayes | File Type: audio/mpeg | Duration: 0:30:51

On the 42nd episode of The Silver Bullet Security Podcast, Gary chats with Gillian Hayes, Assistant Professor in Informatics at the Bren School of Information and Computer Sciences at UC Irvine. Gary and Gillian discuss how much people really need to know about security going on behind the scenes, how usability affects the health records security, whether or not surveillance changes how 20-somethings act in public (including on the net), and how having more women technologists positively impacts the humanization of technology. Transcript of this episode [PDF] Gillian Hayes Ben Shneiderman National Center for Women and Information Technology The Discovery of Heaven The post Informatics and Health Security with Gilian Hayes appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw. The post Informatics and Health Security with Gilian Hayes appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw.

 Security vs. Reliability with Fred Schneider | File Type: audio/mpeg | Duration: 0:31:51

On the 41st episode of The Silver Bullet Security Podcast, Gary talks with Fred Schneider, Samuel B. Eckert Professor of Computer Science at Cornell University and author of Trust in Cyberspace. On the show, Gary and Fred discuss the relationship between security and reliability, diversity as a security mechanism, and the continuum of attack categories from configuration problems, to bugs, to flaws, to trust issues. Fred briefly discusses Pointillism at the end of the show. Transcript of this episode [PDF] Fred B. Schneider IEEE Security and Privacy 7, 1 (January/February 2009) [PDF], 14–17. With Ken Birman. Trust in Cyberspace Pointillism (Seurat)

 Security vs. Reliability with Fred Schneider | File Type: audio/mpeg | Duration: 0:31:51

On the 41st episode of The Silver Bullet Security Podcast, Gary talks with Fred Schneider, Samuel B. Eckert Professor of Computer Science at Cornell University and author of Trust in Cyberspace. On the show, Gary and Fred discuss the relationship between security and reliability, diversity as a security mechanism, and the continuum of attack categories from configuration problems, to bugs, to flaws, to trust issues. Fred briefly discusses Pointillism at the end of the show. Transcript of this episode [PDF] Fred B. Schneider IEEE Security and Privacy 7, 1 (January/February 2009) [PDF], 14–17. With Ken Birman. Trust in Cyberspace Pointillism (Seurat) The post Security vs. Reliability with Fred Schneider appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw. The post Security vs. Reliability with Fred Schneider appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw.

 Show 040 – An Interview with Bob Blakley | File Type: application/pdf | Duration: Unknown

Industry Leaders In Application Security & Research

 Comparing Security Models with Bob Blakley | File Type: application/x-pdf | Duration: Unknown
Unknown file type. Enclosure URL IS: - http://www.isoc.org/isoc/conferences/ndss/98/blakl_sl.pdf

Industry Leaders In Application Security & Research

 Comparing Security Models with Bob Blakley | File Type: audio/mpeg | Duration: 0:25:48

For the 40th episode of The Silver Bullet Security Podcast, Gary interviews Bob Blakley, VP and research director of The Burton Group’s Identity and Privacy Strategies. Gary and Bob discuss the importance of liberal arts degrees, the (over) complications of CORBA security, whether computer security requires a complete shift in approach, cybersecurity and governments, and the movie Perils in Nude Modeling (really). Transcript of this episode [PDF] Ceci n’est pas un Bob – Bob’s blog CORBA Security: An Introduction to Safe Computing with Objects NDSS’98 Trust Management Panel: LE NOZZE DI NOMEN [PDF] – The NDSS “wedding script” Moving U.S. Cybersecurity Beyond Cyberplatitudes Perils in Nude Modeling The post Comparing Security Models with Bob Blakley appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw. The post Comparing Security Models with Bob Blakley appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw.

 “Cyber Coordinator” definied with Matt Blaze | File Type: audio/mpeg | Duration: 0:32:36

For the 39th episode of The Silver Bullet Security Podcast, Gary chats with Matt Blaze, Associate Professor of Computer and Information Science at the University of Pennsylvania. Gary and Matt start the show off discussing the Obama administration’s “cyber coordinator” plan and the large number of cyber plans that are never cyber realized. They also discuss key escrow, warrantless wiretapping, the responsibility we have to stay engaged with issues surrounding individual liberty and privacy, and the similarities between physical locks and computer security. Matt’s musical tastes are also briefly touched on. Matt Blaze Matt Blaze – Wikipedia Matt Blaze’s Exhaustive Search – Matt’s blog Safecracking, Secrecy and Science Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks – IEEE Security & Privacy, March/April 2003 RSA panel on Surveillance Silver Bullet 11: Dorothy Denning Trust Management Signaling Vulnerabilities in Wiretapping Systems – IEEE Security & Privacy, November/December 2005, by M. Sherr, E. Cronin, S. Clark and M. Blaze. Eno/Byrne: Everything That Happens Will Happen Today

 “Cyber Coordinator” defined with Matt Blaze | File Type: audio/mpeg | Duration: 0:32:36

For the 39th episode of The Silver Bullet Security Podcast, Gary chats with Matt Blaze, Associate Professor of Computer and Information Science at the University of Pennsylvania. Gary and Matt start the show off discussing the Obama administration’s “cyber coordinator” plan and the large number of cyber plans that are never cyber realized. They also discuss key escrow, warrantless wiretapping, the responsibility we have to stay engaged with issues surrounding individual liberty and privacy, and the similarities between physical locks and computer security. Matt’s musical tastes are also briefly touched on. Matt Blaze Matt Blaze – Wikipedia Matt Blaze’s Exhaustive Search – Matt’s blog Safecracking, Secrecy and Science Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks – IEEE Security & Privacy, March/April 2003 RSA panel on Surveillance Silver Bullet 11: Dorothy Denning Trust Management Signaling Vulnerabilities in Wiretapping Systems – IEEE Security & Privacy, November/December 2005, by M. Sherr, E. Cronin, S. Clark and M. Blaze. Eno/Byrne: Everything That Happens Will Happen Today The post “Cyber Coordinator” defined with Matt Blaze appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw. The post “Cyber Coordinator” defined with Matt Blaze appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw.

 The Importance of In-Situ Usability with Kay Connelly | File Type: audio/mpeg | Duration: 0:25:14

For the 38th episode of The Silver Bullet Security Podcast, Gary talks privacy with Kay Connelly, Associate Professor of Computer Science at Indiana University and Senior Associate Director of IU’s Center for Applied Cybersecurity Research. Gary and Kay discuss why in situ usability study is important, the E.T.H.O.S. living lab (including the “presence clock” and the portal monitor), and Kay’s advice to women interested in pursuing a career in computer science. Kay Connelly E.T.H.O.S. – Ethical Technology in the Homes of Seniors Crafting a Smarter, Gentler Cell Phone – NPR story featuring Kay Connelly Silver Bullet #7: John Stewart Silver Bullet #15: Annie Antón HIPAA The Song Is You: A Novel by Arthur Phillips I Was Told There’d Be Cake by Sloane Crosley

Comments

Login or signup comment.