Remove Book Remove Internet Remove Technology
article thumbnail

Relax. Internet password books are OK

Malwarebytes

The big book of passwords. There’s one password management tool which experiences more than its fair share of derision—the oft-maligned Internet password book. These are, as you may expect, physical books which are little more than empty notepads with “Internet password book” written on the front.

Passwords 142
article thumbnail

Policy vs Technology

Schneier on Security

I teach cybersecurity policy and technology at the Harvard Kennedy School of Government. My most recent two books, Data and Goliath -- about surveillance -- and Click Here to Kill Everybody -- about IoT security -- are really about the policy implications of technology. Technology is inherently future focused.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Amy Zegart on Spycraft in the Internet Age

Schneier on Security

Amy Zegart has a new book: Spies, Lies, and Algorithms: The History and Future of American Intelligence. Now everyone is racing for insight and the internet gives them tools to do it. The third challenge posed by emerging technologies strikes at the heart of espionage: secrecy. I have not yet read the book.

Internet 196
article thumbnail

New Book Coming in September: "Click Here to Kill Everybody"

Schneier on Security

My next book is still on track for a September 2018 publication. What a Secure Internet+ Looks Like 8. How We Can Secure the Internet+ 9. How to Engender Trust on the Internet+. Conclusion: Technology and Policy, Together. It also needs to telegraph: "everyone needs to read this book."

Internet 164
article thumbnail

New Book Announcement: Click Here to Kill Everybody

Schneier on Security

I am pleased to announce the publication of my latest book: Click Here to Kill Everybody: Security and Survival in a Hyper-connected World. This is a book about technology, and it's also a book about policy. My aim is to discuss what a regulated Internet might look like before one is thrust upon us after a disaster.

article thumbnail

Technology and Policymakers

Schneier on Security

Technology is now deeply intertwined with policy. It's all changing fast; technology is literally creating the world we all live in, and policymakers can't keep up. The answer requires a deep understanding of both the policy tools available to modern society and the technologies of AI. Today, it's a crisis.

article thumbnail

BOOK REVIEW: ‘Security Yearbook’ preserves cybersecurity history — highlights tectonic shift

The Last Watchdog

Companies today spent vast amounts on incredibly sophisticated defenses, such as next-gen firewalls , EDR , DLP and IDS technologies that generate oceans of threat feeds pouring into artificially intelligent SIEMs , UEBAs and other analytics platforms. Then along came cloud computing and the Internet of Things. You see it everywhere.”