article thumbnail

LLM Summary of My Book Beyond Fear

Schneier on Security

Claude (Anthropic’s LLM) was given this prompt: Please summarize the themes and arguments of Bruce Schneier’s book Beyond Fear. Then lay out the most salient criticisms of the book. Key Arguments: Analyze risks empirically using evidence, statistics, and probability rather than intuition. It’s interesting.

article thumbnail

MasterCard DNS Error Went Unnoticed for Years

Krebs on Security

MasterCard.com relies on five shared Domain Name System (DNS) servers at the Internet infrastructure provider Akamai [DNS acts as a kind of Internet phone book, by translating website names to numeric Internet addresses that are easier for computers to manage]. “This typo has now been corrected.”

DNS 362
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Risk Talk at JPL

Adam Shostack

The first part of the talk puts threat modeling in context for engineering secure systems, while the second part considers why we do what we do and asks some questions about how we think about risk. The biggest of those questions starts from the observation that many of the ways weve learned to use math in risk involve iteration.

Risk 130
article thumbnail

Digital nomads and risk associated with the threat of infiltred employees

Security Affairs

Companies face the risk of insider threats, worsened by remote work. The insider threat, or the risk that an employee could harm the company, is a growing concern. The insider threat, or the risk that an employee could harm the company, is a growing concern. North Korean hackers infiltrate firms via fake IT hires, stealing data.

Risk 122
article thumbnail

Public Hearing on IoT Risks

Schneier on Security

The US Consumer Product Safety Commission is holding hearings on IoT risks: The U.S. The information received from the public hearing will be used to inform future Commission risk management work. The information received from the public hearing will be used to inform future Commission risk management work.

IoT 236
article thumbnail

New Book Coming in September: "Click Here to Kill Everybody"

Schneier on Security

My next book is still on track for a September 2018 publication. Risks are Becoming Catastrophic. It also needs to telegraph: "everyone needs to read this book." In the book I need a word for the Internet plus the things connected to it plus all the data and processing in the cloud. Norton is still the publisher.

Internet 185
article thumbnail

Worthwhile Books Q4 2022

Adam Shostack

Books that I read in the fourth quater that are worth your time include several about safety with lessons for cybersecurity Cyber Both of my so-called cyber books are not about cyber — if you judge a book by its cover. The excellent book by Ms. But both have some pretty important lessons for us.