Latest News

Video: Unscripted with Bruce Schneier

  • PSICC Data Privacy Week 2022
  • February 4, 2022

Watch the Video on

A conversation on the future of cybersecurity.

Video: Bruce Schneier on Regulating at the Pace of Tech

  • Transform
  • February 1, 2022

Watch the Video on

Harvard cyber security expert Bruce Schneier spoke with Transform for the publication’s inaugural issue on trust in tech. He said that, given how central technology is to our daily lives, we should be able to trust that tech systems are secure – in the same way we trust that food from the grocery store is safe to eat and planes are safe to fly in.

If those things are safe, it’s only because governments regulate them. “We walk into a restaurant and don’t have to check the kitchen ourselves,” Schneier says. “Governments perform a valuable function in our stead: they are our experts.”…

Audio: History of Hacking

  • Cybercrime Magazine
  • January 29, 2022

Listen to the Audio on

I spoke about the history of hacking with Steve Morgan of the Cybercrime Magazine Podcast.

Video: We Have to Trust Technology

  • Conversation with Nobel Minds
  • January 9, 2022

Watch the Video on

Lucas Cardiell talks to Bruce Schneier, a fellow and lecturer at Harvard’s Kennedy School. Bruce talks about trust, technology, & society and claims that we have no choice other than to trust technology, e.g., Apple, Zoom because through trust our society survives. Trust is the basis for everything.

Video: Bruce Schneier on Regulating at the Pace of Tech

Cyber security expert Bruce Schneier talks about regulation, market failure, and what keeps him up at night

  • Transform
  • December 30, 2021

Watch the Video on

Video: Click Here to Kill Everybody

  • Conversation with Nobel Minds
  • December 26, 2021

Watch the Video on

Lucas Cardiell interviews Bruce Schneier on his book Click Here to Kill Everybody.

Video: Who’s Controlling the Internet?

  • Project Save the World
  • October 28, 2021

Watch the Video or Listen to the Audio on

Bruce Schneier teaches cyber security policy at the Kennedy School of Government, Harvard. He points out that in cyber crime, offence is far easier than defence. Too often, victims of phishing are blamed, whereas legal reforms are needed that will hold manufacturers responsible for defects in their software. The public’s vulnerability is increasing, especially with the rise of the Internet of Things, for many of the computer-controlled gadgets we own cannot even be repaired. Before we can use a new product, we generally have to click (without reading) a long statement that exempts the producer for any liability for its failings. Countries differ in their regulations, and it is unlikely that Russia, China, or even the US will agree to any international norms that restrict the advantages they may possess seek to acquire. It is legal for Facebook or any other privately-owned platform to refuse to advertise, even if this seriously limits freedom of speech about political and social issues. No one can predict how serious the threats may be for the future development of Artificial Intelligence, but Schneier takes the matter seriously and respects those who are working to limit the potential damage…

Bruce Schneier’s book Secrets and Lies

  • Jon Udell
  • Byte
  • October 18, 2021

Everyone who needs to understand or implement cryptographic algorithms reads Bruce Schneier’s Applied Cryptography. In that cookbook for cryptographers, it’s a matter of faith that deep mathematics, properly understood and cleverly arranged, can make three interrelated guarantees regarding digital communication:

  • Confidentiality. Because messages are encrypted, nobody but the sender and the intended recipients can read them.
  • Authenticity. Because messages are signed, nobody can impersonate anyone else.
  • Integrity. Because messages are signed, nobody can tamper with them undetectably…

Audio: Click Here To Kill Everybody

  • Brian Klaas
  • Power Corrupts
  • September 7, 2021

Listen to the Audio on

In early 2021, hackers infiltrated the software that controlled the city’s water supply in Oldsmar, Florida. Through dumb luck, they caught the intrusion shortly after the hacker tried to poison the city’s water.

This hack was part of a growing array of attacks against the Internet of Things, objects that used to operate offline but are now connected to the internet—and therefore vulnerable to hacking. From Wi-Fi enabled tea kettles to cars that can be taken over remotely to knocking power out for entire countries using smart thermostats, the risks are everywhere. We’re just lucky there hasn’t been an Internet of Things attack that has been on the scale of 9/11 or Hiroshima—yet…

Sidebar photo of Bruce Schneier by Joe MacInnis.