Posts

Adam Shostack: Passionate Professional

Adam Shostack is a successful leader, entrepreneur, technologist and game designer. He’s also the President of Shostack & Associates in Seattle, Washington, and he specializes in cybersecurity. Mr. Shostack has more than a decade of experience and an excellent reputation in his field among both clients and colleagues.  Visit  https://www.darkreading.com/author-bio.asp?author_id=2432& to know more about him. He’s passionate about information security and privacy, particularly at the intersection of technology and people, and his successes reflect it well. Adam Shostack is also the author of Threat Modeling: Designing for Security (Wiley, 2014) and the co-author of The New School of Information Security (Addison-Wesley, 2008). Looking for additional information on Adam Shostack’s career as a cybersecurity visionary? Head to his Twitter page here for his latest updates on his work, content production, public speaking events and more.

Adam Shostack: Skilled Leader

Image
Adam Shostack is a leader and entrepreneur who specialize in cyber security and game design. He’s the President of Shostack & Associates in the Greater Seattle Area, and he has more than a decade of experience in his field. Since beginning his career, he’s earned an excellent reputation among colleagues and clients alike. One such recommendation from Adam Shostack’s LinkedIn profile reads: ·          “Adam did a great job of keeping it interesting, maintaining team morale, and keeping the ‘Evil Genius’ group generating implementable, visionary ideas AND meaningful help to other groups.” Would you like to learn more about Adam Shostack and his business, Shostack & Associates? If so, please visit his CrunchBase page here . There, you can view more information about his education, online presence, recent news/activity, social media posts, places of work and upcoming speaking events. Source: https://www.linkedin.com/i...

Adam Shostack shared insights on Threat Modeling in 2018

Image
One of Adam Shostack’s initial experiences in information security came as Systems Manager at the Brigham and Women’s Hospital (1992-1996). Visit  https://continuumsecurity.net/adam-shostack-joins-continuum-securitys-board for more information about him.

Adam Shostack: Adding Value to Your Organization

Adam Shostack is focused on providing each client the best in information security consulting services – those that effectively address and resolve their organization’s unique security issues.  From security process review and comprehensive threat modeling training to expert risk analysis and long-term security strategy, Adam Shostack looks to deliver clients the solutions they need prepare for and prevent cybersecurity problems well into the future. Adam Shostack and his team look to provide each client a level of value and service not available anywhere else.  Those who choose Shostack & Associates have access to: ·          Credible, proven security consultants with years of industry experience. ·          Thorough analysis of security flaws that reduce and prevent crises in the future. ·          Insight and strategy needed to ...

Adam Shostack: Usable Security

Adam Shostack is a cybersecurity professional with decades of experience in the industry. As such, Adam Shostack understands some of the prominent aspects of getting users to appreciate and easily understand the various issues of security. Indeed, usability is one of the overlooked aspects of security, as any controls built into a system that hinders a users' ability to accomplish their goals will either be ignored or bypassed in one way or another. Security engineers have to build systems with their users in mind, and by building usable security functions, they help in making the system a secure one. One of the reasons why application security problems are common is because many deployed security measures are not exactly user-friendly. By thinking about how to make security usable, various security mechanisms will have a hard time gaining acceptance. According to Adam Shostack , Security can be made usable in a number of ways. For starters, it can be understood so ...

Adam Shostack: Technology and Privacy

Adam Shostack's career as a security and privacy expert has enabled him to study various aspects of privacy in the digital age. Adam Shostack , like many other experts, knows that as technology continues to become a vital aspect of people's lives, tech also becomes more involved with the personal side of life, sometimes more intrusively than someone would want. As technology advances, more personal information about you is continuously being collected . Your personal device (laptop, smartphone, tablet) probably knows more of you than your friends. Tech has become part of life, and it carries a lot of personal information, from private messages to friends and family, to pictures, audio files, calendar and contacts list. Since individuals have become so comfortable with technology, it’s easy to ignore the need to stay aware of the various ways personal information can be compromised . Even deleting cannot adequately assure the safety of such information, especially ...

Adam Shostack: What is Security Engineering

Adam Shostack's career in security and privacy matters spans more than two decades, during which he's gotten to understand and appreciate the role of security engineering in an increasingly digital world. Security engineering entails the building of systems that can be reliable and dependable in the face of error or malice. As a discipline, it is focused on the methods, tools and processes required to design, test and implement complete systems, and adapt the needs of these systems to the environment around them. The security engineering profession requires expertise in various disciplines, including computer security and cryptography through both hardware and software. The skills needed to excel range from business process analysis to software engineering and testing skills. The knowledge of economics, law, applied psychology and organizations is also important. Many are the security systems that have critical assurance requirements. Should they fail, the consequ...