If we're ever going to get security right, technologists must embrace the need for policy and government leaders must do the same with technology, which is why Bruce Schneier's Click Here to Kill Everybody: Security and Survival in a Hyper-connected World is the 2019 must-read book for every government leader, elected and administrative.
Specific security prescriptions range from standards and principles to the creation of a new federal agency, a National Cyber Office, that would advise and hold other agencies accountable, but also manage government-wide security efforts, such as the NIST Cybersecurity Framework.
Click Here to Kill Everybody is accessible to anyone who wants to learn about the problems and potential solutions of our increasingly Internet connected world, without feeling overwhelmed by the nuances and technological details that leave most people paralyzed with confusion.
"The admittedly clickbait title of this book refers to the still-science-fictional scenarios of a world so interconnected, with computers and networks so deeply embedded in our most important technical infrastructures, that someone could potentially destroy civilization with a few moue clicks.
Ben's Book of the Month: Review of "Click Here to Kill Everybody: Security and Survival in a Hyper-connected World"
Perhaps the most meaningless term in information security is though leader. I know what it is supposed to mean, but many people who consider themselves information security thought leaders are anything but that. Nonetheless, if there is anyone who is a thought leader in the true sense of the term, it's Bruce Schneier. Schneier has written on near every aspect of information security.
Policy-makers must get to grips with "the internet of things." I'm recommending this book to them
Oh no! Another book with a terrifying, it's-the-end-of-the-world title. They're in vogue at the moment. Sadly, for us mere mortals, Click Here to Kill Everybody is by Bruce Schneier, who is one of the world's top cyber-security experts, and not someone given to exaggeration.
In the second episode of The NULLCON Podcast, internationally renowned security technologist, Bruce Schneier talked about his latest book Click Here to Kill Everybody, the risk and future of post-quantum cryptography, and his views on governments asking for backdoors.
"I worry about the monopolies that are engaged in surveillance capitalism."—Bruce Schneier, Security Technologist
Matt Ward interviewed Bruce Schneier on the podcast The Disruptors.
Embedded in an increasing number of the devices and objects surrounding us, computers are turning the everyday world into a radically programmable attack surface. This is the subject of computer security & cryptography legend Bruce Schneier's latest book, Click Here To Kill Everybody. In this episode we meet up with Bruce to explore how the profusion of insecure devices, capable of being put to a variety of unpredictable purposes, is radically shifting the balance of power. Via cyberattacks, smaller states get the ability to content with the great powers — and an entirely new class of non-state actors are being granted the power to disrupt nations.
Phenomena like the Mirai Botnet, Bruce argues, are just the beginning: we discuss a host of potential attacks on life and property, from car and thermostat hacking to ransomware against hospitals — and how surveillance capitalism' is one of the most important vectors behind this worrying new paradigm.
More than 40 years ago, Bill Gates and Paul Allen founded Microsoft with a vision for putting a personal computer on every desk.
No one really believed them, so few tried to stop them. Then before anyone realized it, the deed was done: Just about everyone had a Windows machine, and governments were left scrambling to figure out how to put Microsoft's monopoly back in the bottle.
This sort of thing happens again and again in the tech industry.
The world is wired. Thanks to the Internet of Things (IoT), pretty much every electronic device we own can now talk to each of our other devices. While it might seem fun to be able to adjust settings on your refrigerator from your cell phone or track brush strokes from your e-toothbrush app, the IoT comes with a brand new set of vulnerabilities as well. Last spring, a computer security company revealed that hackers had stolen a casino's entire database of high rollers by exploiting vulnerabilities in an Internet-connected aquarium.
Photo of Bruce Schneier by Per Ervland.
Schneier on Security is a personal website. Opinions expressed are not necessarily those of IBM Resilient.