Remove Architecture Remove Book Remove Technology
article thumbnail

Mentions

Adam Shostack

If you're looking for me to go beyond the bounds of technology threat modeling, this was, an interesting, far-ranging conversation about the state of the world. Lastly, I'm interviewed as part of Ed Moyle & Diana Kelley's new book, " Practical Cybersecurity Architecture ," now available for pre-order.

article thumbnail

The Art of Soft Skills in Technical Sales

SecureWorld News

The inspiration for my book, Soft Skills in Technical Sales , came from observing changes in the roles of sales engineers and salespeople. As the VP of Solution Architecture at Herjavec Group, I've done my share of selling and participated in many sales calls with vendors. Initially, I thought the book would consist of a few articles.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mentions

Adam Shostack

If you’re looking for me to go beyond the bounds of technology threat modeling, this was, an interesting, far-ranging conversation about the state of the world. Lastly, I’m interviewed as part of Ed Moyle & Diana Kelley’s new book, “ Practical Cybersecurity Architecture ,” now available for pre-order.

article thumbnail

Could this 'Unhackable' Chip Be a Security Moonshot?

SecureWorld News

Undefined semantics are nooks and crannies of the computing architecture—for example the location, format, and content of program code. Talk of an unhackable technology reminds me of a fireside chat I saw at a SecureWorld conference a few years ago. was discussing his recent book about fixing cybersecurity.

CISO 130
article thumbnail

Nurturing Our Cyber Talent

IT Security Guru

I remember when I set out in IT Architecture and was making the switch to Cybersecurity. For example, I experienced first-hand when I started in this sector that the cost of books, courses and accreditations was and remains astronomical. I wrote several books to share knowledge with those embarking on a career in cybersecurity.

CISO 133
article thumbnail

Developer Interest in Cybersecurity Topics Grows as Data Breaches Persist, O’Reilly Analysis Reveals

CyberSecurity Insiders

BOSTON–( BUSINESS WIRE )– O’Reilly , the premier source for insight-driven learning on technology and business, today announced the findings of its annual platform analysis , which examines the top search terms and most-consumed content on the company’s learning platform. To read the full platform analysis, please visit [link].

article thumbnail

Behind the Scenes: Migrating Duo to Kubernetes

Duo's Security Blog

Like many tech companies, we originally adopted a three-tier architecture — consisting of load balancers, servers and databases. This three-tiered architecture is great, but also comes with its own set of challenges, which Duo and many companies have sought to mitigate with their own internal tooling.