Tag Archives: Security and Privacy

An interview with Bernhard Esslinger

In this interview, we discuss to Bernhard Esslinger, author of the book, Learning and Experiencing Cryptography with CrypTool and SageMath. We discuss the motivation behind writing the book, the target audience, the most useful aspects of the book, the challenges of writing the book, and advice for other engineers who are considering writing a book.  Bernhard Esslinger …

Thinking About Your Password with Serge Borso

Artech House author Serge Borso gave us some interesting insights on your day-to-day internet security: I recently had the opportunity to teach a SANS class focused on Web Application Security and during the course of this training I met some great people. It’s always exciting to make connections with other security minded people, and in …

Cryptography 101: From Theory to Practice with Rolf Oppliger

This book provides a comprehensive introduction into cryptography and the current state of the art. It starts with an overview about cryptography as a field of study and the various unkeyed, secret key, and public key cryptosystems that are available, and it then delves more deeply into the technical details of the systems. The goal …

Cybersecurity vs. Productivity: How Do We Meet In The Middle?

Recently, I have seen many more discussions about cybersecurity breaches. Could this be down to many more people working from home? Or is expected due to the increase of technology in our day-to-day lives? Or both? This Forbes article from 2018 – https://www.forbes.com/sites/sallypercy/2018/11/27/the-top-three-business-priorities-for-leaders-over-the-next-three-years/?sh=26358f834ec9 – said that companies would be making cybersecurity and big data one …

Does E2EE Provide Messaging and Conferencing Security? with Rolf Oppliger

We are thrilled to share Series Editor Rolf Oppliger’s insights into E2EE and their role in messaging and conferencing security: Does E2EE Provide Messaging and Conferencing Security? Since the triumphant advance of Internet messaging in general, and the revelations of Edward Snowden in particular, people have talked a lot about end-to-end encryption (E2EE) and why …

‘If the public knew:’ Ripple20 shows medical device software cyber weakness

Enjoy this blog post, which originally appeared on meditechdive.com, written by Greg Slabodkin, and featuring Chris Gates, one of the authors of Medical Device Cybersecurity for Engineers and Manufacturers, and book contributor Allan Friedman of the NTIA: A dearth of details on third-party software widely used in medical devices is making patients vulnerable to cybersecurity threats, a …