News Tagged "Infosecurity"

Page 1 of 2

#ISC2Congress: Modern Security Pros Are Much More than Technologists, Says Bruce Schneier

  • Michael Hill
  • Infosecurity
  • November 18, 2020

Speaking in the opening keynote of the virtual (ISC)2 Security Congress, renowned security technologist and best-selling author Bruce Schneier discussed the public-interest aspects of technology.

In particular, he explored the ethics of data privacy and security, whilst also outlining how today’s cybersecurity professionals are more than technologists; the work they do affects society as a whole.

“In cybersecurity, government access to encrypted communications has been the subject of a 25-year long debate. On the one side, there are police claiming they are going dark and need access to encrypted data in order to solve crimes. On the other side, security experts say it is impossible to provide that access without making systems insecure.”…

#RSAC: How to Hack Society

  • Sean Michael Kerner
  • Infosecurity
  • February 27, 2020

The method, procedures, and practices used by cybersecurity professionals have relevance beyond just the technology sphere; they can also be used to hack society.

That’s the view espoused by Bruce Schneier, security technologist, researcher, and lecturer at the Harvard Kennedy School, during a keynote session at the RSA Conference in San Francisco.

“This is the big idea: we here in our community have developed some very effective techniques to deal with code and technology,” Schneier said. “Can our expertise in IT security transfer to broader social systems like the tax code, or the systems we use to choose our elected officials or the market economy?”…

#Infosec16: Securing the IoT is the Next Big Challenge, Says Bruce Schneier

  • Michael Hill
  • Infosecurity
  • June 9, 2016

“The Internet of Things (IoT) is our next big security challenge and I think it’s the way we are going to be colliding with the real world in interesting ways.”

Speaking at Infosecurity Europe 2016 Bruce Schneier said that securing the IoT is a lot about what we already know, and some of what we don’t know.

“It’s one big inter-connected system of systems with threats, attackers, effects; the IoT is everything we’ve seen now, just turned up to 11 and in a way we can’t turn it off.”

As the IoT becomes more connected it also becomes more physical, invading our lives on an unprecedented scale with more real-world consequences when a breach occurs, and it’s something that we can’t afford to fail to secure, Schneier explained…

BlackHat 2014: Incident Response Best Practice & Automation Key to Success—Bruce Schneier

  • Fahmida Y. Rashid
  • Infosecurity Magazine
  • August 11, 2014

Network breaches are inevitable. It’s what happens next that really matters, said renowned cryptographic expert Bruce Schneier during the Black Hat security conference.

If there is something the organization has the attacker wants, the attacker will figure out a way to get in. Regardless of how much the organization invests in its defenses, attackers need to find that one weak spot to succeed. This is why incident response—being able to detect an incident had occurred, and then being able to respond effectively to remediate the incident—is so critical…

TrustyCon 2014: NSA Surveillance "a Benign Enemy," Says Bruce Schneier

Reuters Technology reporter Joseph Menn interviewed security expert Bruce Schneier in front of last week's TrustyCon audience in San Francisco, where the security expert provided his analysis of the government surveillance controversy

  • Infosecurity
  • March 4, 2014

Bruce Schneier has been a vocal critic of the mass surveillance being conducted by the NSA and GCHQ. The security expert recently left his post at BT and joined the board of digital rights firm Electronic Frontier Foundation (EFF), one of TrustyCon’s organizers. Although several of TrustyCon’s speakers were part of the group who withdrew from their speaking commitments at last week’s RSA Conference, Schneier was featured on the agenda at both events.

Schneier said that the NSA’s surveillance capabilities are far and away the most advanced in the world, but not necessarily the most skilled. What the Snowden documents have provided are a window into what’s going on at the NSA, he added, “but they are the same sorts of things that any well-funded government is doing – Israel, China, France, and anyone with a budget. It just so happens that the US has the largest budget.”…

RSA 2012: Are Software Liability Laws Needed?

  • Infosecurity
  • March 1, 2012

Software liability laws are needed to hold software companies accountable for making faulty products, argued Bruce Schneier, chief technology security officer with BT during a pro-con debate held Wednesday at the RSA Conference.

Schneier said that liability laws would transfer the economic cost for faulty software from the user to the developer and provide an incentive for the developer to fix the problem.

He compared the situation of the software market to the early days of the automobile industry when Congress passed laws that held auto manufacturers responsible for faulty vehicles that caused accidents. This prompted the auto industry to begin fixing the problems, such as stop using wooden wheels that would fall apart at high speeds…

RSA 2012: Schneier Reveals Three Biggest Information Security Risks in 2012

  • Infosecurity
  • February 29, 2012

In his session at the RSA Conference in San Francisco, February 28th 2012, Bruce Schneier listed what he perceives to be the three biggest risks to information security right now: The rise of big data; ill-conceived law enforcement regulations; and the cyberwar arms race.

The rise of big data

The rise of big data, Schneier declared, is inevitable due to the cost of saving data being so cheap. “It’s easy and cheaper to search than sort,” he said. “The collection of data is being aggravated – mainly so the companies doing it can make more money… Companies like Apple, Amazon and Google are all competing to be the company that monetises your data.”…

RSA 2012: Schneier on Why Anonymous Is Not a Group and Why They're Certainly Not As Good As You Think They Are

  • Infosecurity
  • February 29, 2012

At the RSA Conference 2012 in San Francisco, February 29, Bruce Schneier and Davi Ottenheimer discuss Schneier’s latest book and how to enable the trust that society needs to thrive.

Following on from Schneier’s talk yesterday on the three biggest risks to information security in 2012, this discussion focussed purely on the topic of Schneier’s latest book, Liars and Outliers.

Here are some of the session highlights:

  • Security depends on people. “I started in cryptography because I didn’t like people. I wanted to study numbers. Anyone in security needs to understand that people act in unpredictable ways.”…

Interview: BT's Bruce Schneier

BT's Bruce Schneier has made a reputation for himself by exploring the unconventional sides of security. Drew Amorosi sat down with this industry luminary to gain a greater understanding of the man and, briefly, dive into the mind and life that is Bruce S

  • Drew Amorosi
  • Infosecurity
  • July 11, 2011

Bruce Schneier is, without question, a superstar of the security industry. Often labeled as a security “expert” or “guru,” there is perhaps nobody in the field that is more often quoted or respected. His name is as synonymous with security as Michael Jordan’s is with basketball, or the Beatles are with rock and roll. But, as he told me when I sat down with him in London this spring, “Bruce Schneier the security celebrity” was spawned from rather accidental beginnings.

“I actually don’t have a good creation myth, which I should—I should have made one up a decade ago, because I’m always asked, where did you get your security interest?” he responds jokingly. “The truth is, I’ve always been interested in security.”…

Cybercrime Is Crime with Different Tactics—Interview with Bruce Schneier

  • Infosecurity
  • December 8, 2009

Cybercrime is just like any other type of crime only with different tactics, Bruce Schneier tells Infosecurity.

“In information security there are very real threats, and the main threat is crime,” Schneier said, although he also pointed out that many information security threats are due to ‘accidents’ rather than malice.

Another trend going forward, is the interaction between IT and physical systems such as ID cards, ATM machines, Oyester cards, etc. “When the physical hits the IT world. I think the security there is a really big deal,” Schneier predicted…

Sidebar photo of Bruce Schneier by Joe MacInnis.