Cigital » The Silver Bullet Security Podcast with Gary McGraw
Summary: Building Security In
- Visit Website
- RSS
- Artist: Gary McGraw
- Copyright: Copyright © Cigital 2016
Podcasts:
On the 45th episode of The Silver Bullet Security Podcast, Gary chats with Lorrie Cranor, Associate Professor of Computer Science and Engineering and Public Policy at Carnegie Melon University. Gary and Lorrie discuss how everyday people think about privacy and what we can do to get them to care about it, the relationship between trust and privacy, and why the US is lagging behind the EU on privacy-related issues. They close out the discussion by talking about women in computing. Lorrie Cranor Security and Usability: Designing Secure Systems That People Can Use Web Privacy with P3P CyLab Usable Privacy and Security Laboratory (CUPS) A “Nutrition Label” for Privacy Google search privacy video The post The Common Disregard for Privacy with Lorrie Cranor appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw. The post The Common Disregard for Privacy with Lorrie Cranor appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw.
On the 44th episode of The Silver Bullet Security Podcast, Gary talks with Steve Kent, Chief Scientist – Information Security, for BBN Technologies, a division of Raytheon. Gary and Steve discuss the history of network security, secure transport and base Internet protocols, the role of politics in the adoption of security on the Internet, applied cryptography, and whether security and individual liberty co-exist. They finish by discussing extremely high end wine. Internet’s Biggest Security Hole Securing the Border Gateway Protocol (PPT) 2006: Statement before Congress regarding a nationwide ID system
On the 44th episode of The Silver Bullet Security Podcast, Gary talks with Steve Kent, Chief Scientist – Information Security, for BBN Technologies, a division of Raytheon. Gary and Steve discuss the history of network security, secure transport and base Internet protocols, the role of politics in the adoption of security on the Internet, applied cryptography, and whether security and individual liberty co-exist. They finish by discussing extremely high end wine. Internet’s Biggest Security Hole Securing the Border Gateway Protocol (PPT) The post The History of Network Security with Steve Kent appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw. The post The History of Network Security with Steve Kent appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw.
On the 43rd episode of The Silver Bullet Security Podcast, Gary chats with Christofer Hoff, Director of Cloud and Virtualization Solutions at Cisco. Hoff is well known for his colorful blog posts and presentations on cloud security and other complex security issues. Suffice it to say, the cloud was a big topic for this issue. And rum. Transcript of this episode [PDF] Rational Survivability The Frogs Who Desired a King: A Virtualization & Cloud Computing Fable Cloudifornication: Indiscriminate Information Intercourse Involving Internet Infrastructure Mount Gay Extra Old Rum (Gary’s favorite) Ron Zacapa Centenario Rum (Hoff’s favorite)
On the 43rd episode of The Silver Bullet Security Podcast, Gary chats with Christofer Hoff, Director of Cloud and Virtualization Solutions at Cisco. Hoff is well known for his colorful blog posts and presentations on cloud security and other complex security issues. Suffice it to say, the cloud was a big topic for this issue. And rum. Rational Survivability The Frogs Who Desired a King: A Virtualization & Cloud Computing Fable Cloudifornication: Indiscriminate Information Intercourse Involving Internet Infrastructure Mount Gay Extra Old Rum (Gary’s favorite) Ron Zacapa Centenario Rum (Hoff’s favorite) The post The Hype behind Cloud Security with Chris Hoff appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw. The post The Hype behind Cloud Security with Chris Hoff appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw.
On the 42nd episode of The Silver Bullet Security Podcast, Gary chats with Gillian Hayes, Assistant Professor in Informatics at the Bren School of Information and Computer Sciences at UC Irvine. Gary and Gillian discuss how much people really need to know about security going on behind the scenes, how usability affects the health records security, whether or not surveillance changes how 20-somethings act in public (including on the net), and how having more women technologists positively impacts the humanization of technology. Transcript of this episode [PDF] Gillian Hayes Social and technological action research (STAR) Ben Shneiderman National Center for Women and Information Technology The Discovery of Heaven
On the 42nd episode of The Silver Bullet Security Podcast, Gary chats with Gillian Hayes, Assistant Professor in Informatics at the Bren School of Information and Computer Sciences at UC Irvine. Gary and Gillian discuss how much people really need to know about security going on behind the scenes, how usability affects the health records security, whether or not surveillance changes how 20-somethings act in public (including on the net), and how having more women technologists positively impacts the humanization of technology. Transcript of this episode [PDF] Gillian Hayes Ben Shneiderman National Center for Women and Information Technology The Discovery of Heaven The post Informatics and Health Security with Gilian Hayes appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw. The post Informatics and Health Security with Gilian Hayes appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw.
On the 41st episode of The Silver Bullet Security Podcast, Gary talks with Fred Schneider, Samuel B. Eckert Professor of Computer Science at Cornell University and author of Trust in Cyberspace. On the show, Gary and Fred discuss the relationship between security and reliability, diversity as a security mechanism, and the continuum of attack categories from configuration problems, to bugs, to flaws, to trust issues. Fred briefly discusses Pointillism at the end of the show. Transcript of this episode [PDF] Fred B. Schneider IEEE Security and Privacy 7, 1 (January/February 2009) [PDF], 14–17. With Ken Birman. Trust in Cyberspace Pointillism (Seurat)
On the 41st episode of The Silver Bullet Security Podcast, Gary talks with Fred Schneider, Samuel B. Eckert Professor of Computer Science at Cornell University and author of Trust in Cyberspace. On the show, Gary and Fred discuss the relationship between security and reliability, diversity as a security mechanism, and the continuum of attack categories from configuration problems, to bugs, to flaws, to trust issues. Fred briefly discusses Pointillism at the end of the show. Transcript of this episode [PDF] Fred B. Schneider IEEE Security and Privacy 7, 1 (January/February 2009) [PDF], 14–17. With Ken Birman. Trust in Cyberspace Pointillism (Seurat) The post Security vs. Reliability with Fred Schneider appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw. The post Security vs. Reliability with Fred Schneider appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw.
Industry Leaders In Application Security & Research
Industry Leaders In Application Security & Research
For the 40th episode of The Silver Bullet Security Podcast, Gary interviews Bob Blakley, VP and research director of The Burton Group’s Identity and Privacy Strategies. Gary and Bob discuss the importance of liberal arts degrees, the (over) complications of CORBA security, whether computer security requires a complete shift in approach, cybersecurity and governments, and the movie Perils in Nude Modeling (really). Transcript of this episode [PDF] Ceci n’est pas un Bob – Bob’s blog CORBA Security: An Introduction to Safe Computing with Objects NDSS’98 Trust Management Panel: LE NOZZE DI NOMEN [PDF] – The NDSS “wedding script” Moving U.S. Cybersecurity Beyond Cyberplatitudes Perils in Nude Modeling The post Comparing Security Models with Bob Blakley appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw. The post Comparing Security Models with Bob Blakley appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw.
For the 39th episode of The Silver Bullet Security Podcast, Gary chats with Matt Blaze, Associate Professor of Computer and Information Science at the University of Pennsylvania. Gary and Matt start the show off discussing the Obama administration’s “cyber coordinator” plan and the large number of cyber plans that are never cyber realized. They also discuss key escrow, warrantless wiretapping, the responsibility we have to stay engaged with issues surrounding individual liberty and privacy, and the similarities between physical locks and computer security. Matt’s musical tastes are also briefly touched on. Matt Blaze Matt Blaze – Wikipedia Matt Blaze’s Exhaustive Search – Matt’s blog Safecracking, Secrecy and Science Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks – IEEE Security & Privacy, March/April 2003 RSA panel on Surveillance Silver Bullet 11: Dorothy Denning Trust Management Signaling Vulnerabilities in Wiretapping Systems – IEEE Security & Privacy, November/December 2005, by M. Sherr, E. Cronin, S. Clark and M. Blaze. Eno/Byrne: Everything That Happens Will Happen Today
For the 39th episode of The Silver Bullet Security Podcast, Gary chats with Matt Blaze, Associate Professor of Computer and Information Science at the University of Pennsylvania. Gary and Matt start the show off discussing the Obama administration’s “cyber coordinator” plan and the large number of cyber plans that are never cyber realized. They also discuss key escrow, warrantless wiretapping, the responsibility we have to stay engaged with issues surrounding individual liberty and privacy, and the similarities between physical locks and computer security. Matt’s musical tastes are also briefly touched on. Matt Blaze Matt Blaze – Wikipedia Matt Blaze’s Exhaustive Search – Matt’s blog Safecracking, Secrecy and Science Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks – IEEE Security & Privacy, March/April 2003 RSA panel on Surveillance Silver Bullet 11: Dorothy Denning Trust Management Signaling Vulnerabilities in Wiretapping Systems – IEEE Security & Privacy, November/December 2005, by M. Sherr, E. Cronin, S. Clark and M. Blaze. Eno/Byrne: Everything That Happens Will Happen Today The post “Cyber Coordinator” defined with Matt Blaze appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw. The post “Cyber Coordinator” defined with Matt Blaze appeared first on Cigital » The Silver Bullet Security Podcast with Gary McGraw.
For the 38th episode of The Silver Bullet Security Podcast, Gary talks privacy with Kay Connelly, Associate Professor of Computer Science at Indiana University and Senior Associate Director of IU’s Center for Applied Cybersecurity Research. Gary and Kay discuss why in situ usability study is important, the E.T.H.O.S. living lab (including the “presence clock” and the portal monitor), and Kay’s advice to women interested in pursuing a career in computer science. Kay Connelly E.T.H.O.S. – Ethical Technology in the Homes of Seniors Crafting a Smarter, Gentler Cell Phone – NPR story featuring Kay Connelly Silver Bullet #7: John Stewart Silver Bullet #15: Annie Antón HIPAA The Song Is You: A Novel by Arthur Phillips I Was Told There’d Be Cake by Sloane Crosley