Tag Archives: Security and Privacy

Exclusive Interview from our Authors Joe Rushanan and James Gillis

In this interview, we talk to Joe and James authors of the book Cryptography and Satellite Navigation. We discuss the motivation behind writing the book, the target audience, the most useful aspects of the book, the challenges of writing the book, and advice for other engineers who are considering writing a book. Joe Rushanan has …

Exclusive Interview with our Authors Axel Wirth, Christopher Gates, and Jason Smith

In this interview, we talk to Axel, Christopher, and Jason authors of the book Medical Device Cybersecurity for Engineers and Manufacturers, Second Edition. We discuss the motivation behind writing the book, the target audience, the most useful aspects of the book, the challenges of writing the book, and advice for other engineers who are considering …

Exclusive Interview from our Author Kaustubh Dhondge

In this interview, we talk to Kaustubh Dhondge, author of the book Lifecycle IoT Security for Engineers. We discuss the motivation behind writing the book, the target audience, the most useful aspects of the book, the challenges of writing the book, and advice for other engineers who are considering writing a book.  Dr. Kaustubh Dhondge …

An interview with Bernhard Esslinger

In this interview, we discuss to Bernhard Esslinger, author of the book, Learning and Experiencing Cryptography with CrypTool and SageMath. We discuss the motivation behind writing the book, the target audience, the most useful aspects of the book, the challenges of writing the book, and advice for other engineers who are considering writing a book.  Bernhard Esslinger …

Thinking About Your Password with Serge Borso

Artech House author Serge Borso gave us some interesting insights on your day-to-day internet security: I recently had the opportunity to teach a SANS class focused on Web Application Security and during the course of this training I met some great people. It’s always exciting to make connections with other security minded people, and in …

Cryptography 101: From Theory to Practice with Rolf Oppliger

This book provides a comprehensive introduction into cryptography and the current state of the art. It starts with an overview about cryptography as a field of study and the various unkeyed, secret key, and public key cryptosystems that are available, and it then delves more deeply into the technical details of the systems. The goal …

Cybersecurity vs. Productivity: How Do We Meet In The Middle?

Recently, I have seen many more discussions about cybersecurity breaches. Could this be down to many more people working from home? Or is expected due to the increase of technology in our day-to-day lives? Or both? This Forbes article from 2018 – https://www.forbes.com/sites/sallypercy/2018/11/27/the-top-three-business-priorities-for-leaders-over-the-next-three-years/?sh=26358f834ec9 – said that companies would be making cybersecurity and big data one …