Debbie Buchanan public
[search 0]
Download the App!
show episodes
 
Artwork

1
ASecuritySite Podcast

Professor Bill Buchanan OBE

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
  continue reading
 
The real side of life and running a business, offering insights, discussions, questions, and, most importantly, how to do real life. It's fun and real. Check it out now. and. co-founders - Husband and wife team Dave Evans (author and co-founder of and.) and his wife Debbie Halls-Evans (COO of and. TV winner of The Taste and Scotlands Home of the Year Christmas). Listen to full episodes, listen to the shorts in under 5 minutes dLog. Get involved and share with Dave, Debbie.
  continue reading
 
Loading …
show series
 
Anna is a Professor of Computer Science at Brown University. Her research spans many areas of advanced cryptography including with digital signatures, group signatures, blind signatures, e-cash and anonymous digital credentials. She was originally from Ukraine, and undertook her masters degree at MIT in 1999, and then went onto a PhD in 2002 in the…
  continue reading
 
The fallback for law enforcement agencies has always been the place where files are stored, and all the best encryption within end-to-end communications will not stop unencrypted files at rest from being examined. But when the user encrypts data into the Cloud and where they hold their own keys, that’s when the nightmare begins for them. The rise o…
  continue reading
 
YouTube: https://youtu.be/hcdk3u2R5Mo Yesterday, I gave two short presentations on PQC (Post Quantum Cryptography), and next week, I’m in London to give a more focused talk on the subject. And so, it’s great to see that Samsung is driving forward the adoption of PQC methods in their new S25 smartphone. There are two companies that have a core focus…
  continue reading
 
In this episode, Dave Evans and Debbie Halls Evans sit down with Jamie Jones-Buchanan, former Leeds Rhinos Rugby League star and now the Director of Culture, Diversity, and Inclusion at the club. Jamie shares his remarkable journey from a working-class upbringing to winning seven Grand Finals and now shaping the next generation through leadership, …
  continue reading
 
Why is leadership in crisis? In this episode of the podcast, Dave Evans and Debbie Halls Evans sit down with James Eder, a serial entrepreneur, leadership advocate and passionate believer in living with intention. From co-founding Student Beans to navigating life with a heart condition, James shares how leadership, action and resilience are central…
  continue reading
 
Aysegul Sensoy has over 20 years of management experience with blockchain, emerging technologies, fintech, business development, marketing and sales. She is currently the chair of the Istanbul Blockchain Women Association and CIS Regional Manager of Fuze Finance. She received her bachelor's degree in economics from Istanbul University and her maste…
  continue reading
 
Mindset, sacrifice, and life after football with Matt Jarvis In this episode of and Double D, Matt Jarvis, former Premier League and England international footballer, sits down with Dave and Debbie to share his journey on and off the pitch. From representing England at Wembley to navigating the challenges of retirement, Matt reflects on the lessons…
  continue reading
 
Amit is a professor of computer science at UCLA and is the director of the Center for Encrypted Functionalities. Amit has been cited in his research work over 63,000 times and has an h-index of 91. In 2000, he graduated with a PhD from MIT and then moved to Princeton. In 2004, he then moved to UCLA. Over the years, he has made so many great advance…
  continue reading
 
In this fun episode ofand Double D, hosts Dave and Debbie sit down with the hilarious and insightful David Taylor, author ofThe Naked Leader. Together, they unpack the myths of leadership, challenge corporate norms, andredefine success. 💡Key moments include: The radical power of a blank flip chartHow to embrace failure, take risks, and focus onoutc…
  continue reading
 
Bart is a Professor in the Electrical Engineering department at KU Leuven in Belgium. He co-invented the Miyaguchi (Meya-Goochy)–Preneel scheme and which converts a block cipher into a hash function. Bart is also one of the co-inventors of the RIPEMD-160 hashing method, and which is used in Bitcoin addresses. He also co-designed the stream ciphers …
  continue reading
 
In this thought-provoking episode ofand Double D, hosts Dave Evans and Debbie Halls-Evans sit down with the transformative Alex Belisle-Springer. Together, they navigate the power of language, the courage to self-correct, and the beauty of embracing discomfort. From redefining curiosity to exploring human equity through tartans, this conversation i…
  continue reading
 
#113 Bending reality is about vision, not deadlines. This episode asks what if reality isn’t as rigid as you’ve been led to believe? In this mind-bending episode the transformational coach and bestselling author Victoria Song how to uncover the secrets behind her groundbreaking book, Bending Reality. Together, they explore the art of making the imp…
  continue reading
 
Ivan Damgard is a professor in the Department of Computer Science at Aarhus University in Denmark. He is the co-inventor of the Merkle-Damgard construction, and which was used in MD5, SHA-1 and SHA-2. In 2020, he received the Test of Time Award for a paper entitled "A Generalisation, a Simplification and Some Applications of Paillier's Probabilisti…
  continue reading
 
Chris is a Professor in the Computer Science and Engineering department at the University of Michigan. He completed his PhD in 2006 at the MIT Computer Science and AI Laboratory under the mentorship of Silvio Micali. He received a Test of Time award at Crypto 2008 for a paper entitled "A Framework for Efficient and Composable Oblivious Transfer" an…
  continue reading
 
Gareth Dauncy on Building Emotional Freedom In this episode of and Double D, we sit down with Gareth Dauncy, architect and creator of the mood App, to uncover how the art of design can transform emotional well-being. What if your emotions were like the tides—shifting, flowing, and endlessly dynamic? From the quiet beauty of his coastal life in Card…
  continue reading
 
What if the way we’ve been taught to chase happiness is actually making us miserable? In this episode, we sit down with Stephanie Harrison, founder of The New Happy, to unpack why our cultural obsession with achievement, perfection, and self-focus is breaking us—and what we can do about it. Stephanie doesn’t just challenge the traditional idea of h…
  continue reading
 
Clifford Cocks is a British mathematician and cryptographer. While working at GCHQ, he invented public key encryption, and which predates the work of the RSA and Diffie-Hellman methods. He studied mathematics as an undergraduate at Kings College, Cambridge, and then joined the Communications-Electronics Security Group (CESG) at GCHQ in 1973. After …
  continue reading
 
What if your business could be fun, fulfilling, and wildly successful—all at the same time? In this episode of Double D, Do Business, we sit down with Simon Severino, the mastermind behind the Strategy Sprints method, to uncover how coaches and entrepreneurs can break free from the feast-or-famine cycle and build a sustainable, thriving business. S…
  continue reading
 
Vadim Lyubashevsky is a cryptographer at IBM Research Europe in Zurich. He received his PhD from the University of California, San Diego in 2008. His core research focus is around lattice-based methods, and especially in areas of practical lattice encryption, digital signatures and privacy-preserving primitives. Along with Chris Peiker and Oded Reg…
  continue reading
 
In this episode of Double D, Dave Evans and Debbie Halls-Evans dive into the colourful world of Anna Campbell Jones— https://annacampbelljones.com/ Anna is a celebrated TV presenter, interior designer, and creative powerhouse. Known for her role in Scotland's Home of the Year and her trailblazing work in sustainability and design, Anna opens up abo…
  continue reading
 
Matthew is a cryptographer and academic at Johns Hopkins University and has designed and analyzed cryptographic systems used in wireless networks, payment systems and digital content protection platforms. A key focus of his work is in the promotion of user privacy. He has an extensive following on X/Twitter (140K followers) and his blog covers impo…
  continue reading
 
Alfred Menezes is a Professor at the University of Waterloo in Ontario. In 2001, he won the Hall Medal from the Institute of Combinatorics and its Applications. Alfred is the lead author of the Handbook of Applied Cryptography, and which has been cited over 25,000 times. He has published many high impact papers, especially in areas of public key en…
  continue reading
 
Tim Duggan’s Radical Guide to Taking Back Your Life Burnout, Balance, and Bold Moves—Discover How toRedefine Success and Start Living on Purpose In this episode of Double D, Dave Evans and Debbie Halls-Evans welcome Tim Duggan, an acclaimedauthor and optimist, for an insightful conversation about rethinking work, life, and balance. The trio dive de…
  continue reading
 
This seminar series runs for students on the Network Security and Cryptography module, but invites guests to participate. Bruce has created a wide range of cryptographic methods including Skein (hash function), Helix (stream cipher), Fortuna (random number generator), and Blowfish/Twofish/Threefish (block ciphers). Bruce has published 14 books, inc…
  continue reading
 
Brent Waters is a Professor at the University of Texas at Austin and the Director of the Cryptography Lab at NTT Research. He graduated from the UCL in 2000, then completed a PhD at Princeton University in 2004. After this, he moved on to Stanford as a postdoc. Overall, Brent was the first to propose Attribute-based Encryption (ABE) and also the fi…
  continue reading
 
Well, as if cybersecurity doesn’t have enough acronyms. There’s RIP, OSPF, TCP, IP, SSH, AES, and so many others. Now, there are three really important ones to remember: ML-KEM (Module Lattice-Based Key Encapsulation Mechanism), ML-DSA (Module Lattice-Based Signature Standard) and SLH-DSA (Stateless Hash-based Digital Signature Standard). ML-KEM is…
  continue reading
 
The cybersecurity world is changing, and where the signature methods of RSA, ECDSA and EdDSA are likely to be replaced by FIPS 204 (aka ML-DSA Module-Lattice-Based Digital Signature Standard— Dilithium) and FIPS 205 (aka SLH-DSA (Stateless Hash-based Digital Signature Standard — SPHINCS+) https://medium.com/@billatnapier/so-what-is-a-prehash-and-wh…
  continue reading
 
In cybersecurity, there are so many acronyms, and to be an expert, you really need to dig underneath the methods and understand how they work. One weak area of the industry is in the usage of MACs (Message Authentication Codes). With the public-key signing, we use a public key and a private key, where the private key will digitally sign a hash of t…
  continue reading
 
Phillip Rogaway was a Professor at the University of California, Davis, and who has advanced so many areas of cryptography. He was the first to be awarded Levchin prize in 2016. Phillip has over 43,000 citations to his work, including classic papers on random oracles, symmetric key modes, garbled circuits, secure computation, and format-preserving …
  continue reading
 
Like it or not, AI is on the move and now competing with human brain power for its place in our world. We must thus understand the place of LLMs (Large Language Models) in areas such as cybersecurity and in planning towards hybrid systems that integrate both humans and AI within our corporate infrastructures. https://medium.com/asecuritysite-when-b…
  continue reading
 
This week, in my lecture, I will outline one of the most amazing methods ever created in computer science: the Diffie-Hellman method. It was first outlined by Whitfield Diffie and Marty Hellman in 1976 in a paper that built the foundation of our modern world of cybersecurity. https://billatnapier.medium.com/after-48-years-its-a-long-goodbye-to-the-…
  continue reading
 
And, so George Orwell projected a world where every single part of our lives was monitored and controlled by Big Brother. Arthur C Clark outlined the day when machines focused solely on a goal — even if it was to the detriment of human lives. And, Isaac Asimov outlined a world where machines would have to be programmed with rules so that they could…
  continue reading
 
YouTube interview: https://www.youtube.com/watch?v=FDn0Tkhi8zw Yuriy Polyakov is the Vice President of Cryptography and a Principal Scientist at Duality Technologies. His research interests include applied lattice-based cryptography, fully homomorphic encryption, and privacy-preserving machine learning. He is also a co-founder of the open-source PA…
  continue reading
 
Video interview: https://www.youtube.com/watch?v=59Y_kya4lR8 Kurt Rohloff is an Associate Professor of Computer Science at the New Jersey Institute of Technology (NJIT) and a co-founder and CTO of Duality Technologies. He is also a co-founder of the open-source PALISADE Homomorphic Encryption Software Library, and a co-founder of the OpenFHE librar…
  continue reading
 
Written and Narrated by Dave Evans Dive into the speed read of Leadership or Leadershit—think of it as the "Blinkist" version, distilled into under 44 minutes of sharp insights. If you're short on time or just prefer listening, Dave gives you the essence of the whole book in a digestible, podcast-style format. Perfect for leaders on the go who want…
  continue reading
 
Thomas Prest is a cryptography researcher at PQShield and previously worked with Thales. He completed his PhD at the École Normale Supérieure and focuses on post-quantum cryptography and discrete algorithms. Thomas was one of the co-authors of the FALCON digital signature method and has published widely in related areas of PQC.…
  continue reading
 
The podcast title has never been more fitting: our guest for episode 20 of Talking with Tech Leaders is a leading thinker, leading innovator and leading academic. Bill Buchanan is not only Professor of Cryptography at Edinburgh Napier University but also an Officer of the British Empire – awarded in 2017 for services to cybersecurity. The main podc…
  continue reading
 
This is it the finale of Season 5. We wrap up the season using the Speed Read part of the book. Season 5 is all about ⁠⁠⁠⁠⁠ Leadership or Leadershit. ⁠⁠⁠⁠⁠ Ending the season summarising at speed and tangents of ⁠⁠⁠⁠⁠⁠Leadership or Leadershit⁠⁠⁠⁠⁠⁠. The book is built around eight faces of leadership or leadershit, and we explore each one, our interp…
  continue reading
 
This is the final chapter (face) of the book. Penultimate episode of Season 5. Season 5 is all about ⁠⁠⁠⁠ Leadership or Leadershit. ⁠⁠⁠⁠ Let's be honest: We've all encountered some great leaders and some terrible ones the leadershit. Sadly, our experience has been that there are more leadershit than the leadership we all want to work with. We can a…
  continue reading
 
Season 5 is all about ⁠⁠⁠ Leadership or Leadershit. ⁠⁠⁠ Let's be honest: We've all encountered some great leaders and some terrible ones the leadershit. Sadly, our experience has been that there are more leadershit than the leadership we all want to work with. We can also be blind or do not know how to move our leadership from leadershit we've all …
  continue reading
 
Season 5 is all about ⁠⁠⁠ Leadership or Leadershit. ⁠⁠⁠ Let's be honest: We've all encountered some great leaders and some terrible ones the leadershit. Sadly, our experience has been that there are more leadershit than the leadership we all want to work with. We can also be blind or do not know how to move our leadership from leadershit we've all …
  continue reading
 
Season 5 is all about ⁠⁠ Leadership or Leadershit. ⁠⁠ Let's be honest: We've all encountered some great leaders and some terrible ones the leadershit. Sadly, our experience has been that there are more leadershit than the leadership we all want to work with. We can also be blind or do not know how to move our leadership from leadershit we've all do…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play