Essays and Op Eds

2008

December 9, 2008 • The Wall Street Journal
How to Prevent Digital Snooping

December 4, 2008 • The Guardian and The Hindu
When You Lose a Piece of Kit, the Real Loss Is The Data It Contains

November 21, 2008 • The Wall Street Journal
Why Obama Should Keep His BlackBerry -- But Won't

November 19, 2008 • Wired News
America's Next Top Hash Function Begins

November 13, 2008 • The Guardian and The Hindu
Passwords Are Not Broken, but How We Choose them Sure Is

November 3, 2008
CRB Checking

October 23, 2008 • The Guardian
Time to Show Bottle and Tackle the Real Issues

October 16, 2008 • Wired News
Quantum Cryptography: As Awesome As It Is Pointless

October 2, 2008 • The Guardian
Why Society Should Pay the True Costs of Security

October 1, 2008 • Wired News
The Seven Habits of Highly Ineffective Terrorists

October 2008 • Information Security
Does Risk Management Make Sense?

September 18, 2008 • Wired News
Airport Pasta-Sauce Interdiction Considered Harmful

September 4, 2008 • The Guardian
A Fetishistic Approach to Security Is a Perverse Way to Keep Us Safe

September 4, 2008 • Wired News
How to Create the Perfect Fake Identity

September 2, 2008 • CSO Magazine
Security ROI: Fact or Fiction?

September 2008 • IEEE Spectrum
Here Comes Here Comes Everybody

August 28, 2008 • Los Angeles Times
The TSA's Useless Photo ID Rules

August 21, 2008 • Wired News
Boston Court's Meddling With "Full Disclosure" Is Unwelcome

August 10, 2008 • Security Watch
The Problem Is Information Insecurity

August 7, 2008 • Wired News
Memo to Next President: How to Get Cybersecurity Right

August 7, 2008 • The Guardian
Why Being Open about Security Makes Us All Safer in the Long Run

Jul/Aug 2008 • IEEE Security and Privacy
How the Human Brain Buys Security

July 23, 2008 • Wired News
Lesson From the DNS Bug: Patching Isn't Enough

July 17, 2008 • The Guardian
Software Makers Should Take Responsibility

July 10, 2008 • Wired News
How a Classic Man-in-the-Middle Attack Saved Colombian Hostages

July 2008 • Information Security
Chinese Cyberattacks: Myth or Menace?

June 30, 2008 • Wired News
I've Seen the Future, and It Has a Kill Switch

June 26, 2008 • The Guardian
CCTV Doesn't Keep Us Safe, Yet the Cameras Are Everywhere

June 19, 2008 • Discovery Technology
The Truth About Chinese Hackers

June 12, 2008 • Wired News
The Pros and Cons of Lifelock

June 4, 2008 • The Guardian
Are Photographers Really a Threat?

May 29, 2008 • Wired News
Why Do We Accept Signatures by Fax?

May 26, 2008 • CIO
How to Sell Security

May 15, 2008 • Wired News
Our Data, Ourselves

May 15, 2008 • The Guardian
Crossing Borders with Laptops and PDAs

May 1, 2008 • Wired News
America's Dilemma: Close Security Holes, or Exploit Them Ourselves

May 2008 • Information Security
The Ethics of Vulnerability Research

April 17, 2008 • Wired News
Prediction: RSA Conference Will Shrink Like a Punctured Balloon

April 4, 2008 • ComputerWeekly
Secret Questions Blow a Hole in Security

April 3, 2008 • Wired News
The Difference Between Feeling and Reality in Security

March 20, 2008 • Wired News
Inside the Twisted Mind of the Security Professional

March 13, 2008 • Nature
Census of Cyberspace Censoring

March 6, 2008 • Wired News
The Myth of the "Transparent Society"

March 2008 • Information Security
Consolidation: Plague or Progress

February 23, 2008 • Minneapolis Star Tribune
Security at What Cost?

February 21, 2008 • Wired News
When the Internet Is My Hard Drive, Should I Trust Third Parties?

February 7, 2008 • Detroit Free Press
Driver's Licenses for Immigrants: Denying Licenses Makes Us Less Safe

February 7, 2008 • Wired News
With iPhone, "Security" Is Code for "Control"

January 24, 2008 • Wired News
What Our Top Spy Doesn't Get: Security and Privacy Aren't Opposites

January 10, 2008 • Wired News
Steal This Wi-Fi

More Essays by Date

2014 - 2013 - 2012 - 2011 - 2010 - 2009 - 2008 - 2007 - 2006 - 2005 - 2004 - 2003 - 2002 - 2001 - 2000 - 1999 - 1998 - 1997 - 1995 - 1994 - 1993 - 1992

back to Essays and Op Eds

Photo of Bruce Schneier by Per Ervland.

Schneier on Security is a personal website. Opinions expressed are not necessarily those of Co3 Systems, Inc..