Artech House author Serge Borso gave us some interesting insights on your day-to-day internet security: I recently had the opportunity to teach a SANS class focused on Web Application Security and during the course of this training I met some great people. It’s always exciting to make connections with other security minded people, and in …
At Artech House, we ask our authors what problems their books can help readers solve. In this series, we share what our authors aim to do in their writing. Read on to find out what Serge Borso, who wrote The Penetration Tester’s Guide to Web Applications had to say: What are the features of your book …
When Artech House authors write their books, we ask them what they want their readers to get out of the project. In this series, we show you what our authors, in their own words, wish to impart upon readers. Serge Borso, author of The Penetration Tester’s Guide to Web Applications, describes what his book is …
When Artech House authors write their books, we ask them what they want their readers to get out of the project. In this series, we show you what our authors, in their own words, wish to impart upon readers. Ari Takanen, author of Fuzzing for Software Security Testing and Quality Assurance, Second Edition, describes what …
This book provides a comprehensive introduction into cryptography and the current state of the art. It starts with an overview about cryptography as a field of study and the various unkeyed, secret key, and public key cryptosystems that are available, and it then delves more deeply into the technical details of the systems. The goal …
Recently, I have seen many more discussions about cybersecurity breaches. Could this be down to many more people working from home? Or is expected due to the increase of technology in our day-to-day lives? Or both? This Forbes article from 2018 – https://www.forbes.com/sites/sallypercy/2018/11/27/the-top-three-business-priorities-for-leaders-over-the-next-three-years/?sh=26358f834ec9 – said that companies would be making cybersecurity and big data one …
We are thrilled to share Series Editor Rolf Oppliger’s insights into E2EE and their role in messaging and conferencing security: Does E2EE Provide Messaging and Conferencing Security? Since the triumphant advance of Internet messaging in general, and the revelations of Edward Snowden in particular, people have talked a lot about end-to-end encryption (E2EE) and why …
Authors of Medical Device Cybersecurity for Engineers and Manufacturers Axel Wirth and Chris Gates share what prompted them to write their book: Chris: I was born to this. I really didn’t have a choice. My father was an E.E. in the broadcast industry (radio and television) so I grew up around electronics. I was soldering …
Enjoy this blog post, which originally appeared on meditechdive.com, written by Greg Slabodkin, and featuring Chris Gates, one of the authors of Medical Device Cybersecurity for Engineers and Manufacturers, and book contributor Allan Friedman of the NTIA: A dearth of details on third-party software widely used in medical devices is making patients vulnerable to cybersecurity threats, a …
The authors of Medical Device Cybersecurity for Engineers and Manufacturers explain the need to secure medical devices in the market today: The medical device industry was the first industry to be regulated to produce secure embedded devices, which left manufacturers in the odd position of being trailblazers in what is often unfamiliar territory. Secure development …