Posts

Adam Shostack shared insights on Threat Modeling in 2018

Image
One of Adam Shostack’s initial experiences in information security came as Systems Manager at the Brigham and Women’s Hospital (1992-1996). Visit  https://continuumsecurity.net/adam-shostack-joins-continuum-securitys-board for more information about him.

Adam Shostack: Adding Value to Your Organization

Adam Shostack is focused on providing each client the best in information security consulting services – those that effectively address and resolve their organization’s unique security issues.  From security process review and comprehensive threat modeling training to expert risk analysis and long-term security strategy, Adam Shostack looks to deliver clients the solutions they need prepare for and prevent cybersecurity problems well into the future. Adam Shostack and his team look to provide each client a level of value and service not available anywhere else.  Those who choose Shostack & Associates have access to: ·          Credible, proven security consultants with years of industry experience. ·          Thorough analysis of security flaws that reduce and prevent crises in the future. ·          Insight and strategy needed to ...

Adam Shostack: Usable Security

Adam Shostack is a cybersecurity professional with decades of experience in the industry. As such, Adam Shostack understands some of the prominent aspects of getting users to appreciate and easily understand the various issues of security. Indeed, usability is one of the overlooked aspects of security, as any controls built into a system that hinders a users' ability to accomplish their goals will either be ignored or bypassed in one way or another. Security engineers have to build systems with their users in mind, and by building usable security functions, they help in making the system a secure one. One of the reasons why application security problems are common is because many deployed security measures are not exactly user-friendly. By thinking about how to make security usable, various security mechanisms will have a hard time gaining acceptance. According to Adam Shostack , Security can be made usable in a number of ways. For starters, it can be understood so ...

Adam Shostack: Technology and Privacy

Adam Shostack's career as a security and privacy expert has enabled him to study various aspects of privacy in the digital age. Adam Shostack , like many other experts, knows that as technology continues to become a vital aspect of people's lives, tech also becomes more involved with the personal side of life, sometimes more intrusively than someone would want. As technology advances, more personal information about you is continuously being collected . Your personal device (laptop, smartphone, tablet) probably knows more of you than your friends. Tech has become part of life, and it carries a lot of personal information, from private messages to friends and family, to pictures, audio files, calendar and contacts list. Since individuals have become so comfortable with technology, it’s easy to ignore the need to stay aware of the various ways personal information can be compromised . Even deleting cannot adequately assure the safety of such information, especially ...

Adam Shostack: What is Security Engineering

Adam Shostack's career in security and privacy matters spans more than two decades, during which he's gotten to understand and appreciate the role of security engineering in an increasingly digital world. Security engineering entails the building of systems that can be reliable and dependable in the face of error or malice. As a discipline, it is focused on the methods, tools and processes required to design, test and implement complete systems, and adapt the needs of these systems to the environment around them. The security engineering profession requires expertise in various disciplines, including computer security and cryptography through both hardware and software. The skills needed to excel range from business process analysis to software engineering and testing skills. The knowledge of economics, law, applied psychology and organizations is also important. Many are the security systems that have critical assurance requirements. Should they fail, the consequ...