News in the Category "Text"
Page 18 of 64
"A Lot of Attacks from Western Countries Go through China," Says Bruce Schneier
The attack on Sony Pictures over the film The Interview was perpetrated by North Korea, according to security expert Bruce Schneier.
The former chief technology officer of BT Managed Security Solutions, now CTO at Resilient Systems, had expressed scepticism at the time of the attack that the secretive dictatorship had been behind the attack, motivated by the theme of the film: two hapless American agents who were supposed to assassinate the country’s leader, Kim Jong-un.
But in a video keynote speech at LinuxCon 2015, Schneier claimed that he had changed his mind. “Many of us, including myself, were skeptical for several months. By now it does seem obvious that it was North Korea, as amazing as that sounds,” he said…
Bruce Schneier: The Cyberwar Arms Race Is On
Security expert says we're in a cyberwar arms race, and with the Sony attack, North Korea has already taken the first shot at the United States.
LinuxCon is about Linux, cloud, and containers, but it’s also about security. In the past year, programmers have been reminded that merely being “open-source” doesn’t mean that your code is safe. Assuming you’re secure is a mistake. Because, as security maven Bruce Schneier explained to the LinuxCon audience via Google Hangouts, we’re in a cyber-arms race.
In particular Schneier focused on last fall’s Sony cyber attack. At the time, Schneier said that when the FBI said North Korea was behind the attack, he didn’t believe them. Now, he does.
…
Bruce Schneier: "We're in Early Years of a Cyber Arms Race"
Security guru Bruce Schneier says there’s a kind of cold war now being waged in cyberspace, only the trouble is we don’t always know who we’re waging it against.
Schneier appeared onscreen via Google Hangouts at the LinuxCon/CloudOpen/ContainerCon conference in Seattle on Tuesday to warn attendees that the modern security landscape is becoming increasingly complex and dangerous.
"We know, on the internet today, that attackers have the advantage," Schneier said. "A sufficiently funded, skilled, motivated adversary will get in. And we have to figure out how to deal with that."…
The New America: Little Privacy, Big Terror
Excerpt
In Data and Goliath, Bruce Schneier, a security technologist and fellow at Harvard Law School, explores what it means to have entered the age of mass surveillance. Our data are collected in the first instance by private corporations, but are increasingly exploited, as Edward Snowden has shown, by government intelligence agencies. The NSA didn’t have to build from scratch a vast database on billions of innocent citizens the world over, Schneier explains, because private corporations had already done so. All the NSA needed was access.
…
Bruce Schneier on Security Metrics that Matter
“I like to measure the performance of the team,” said Bruce Schneier (@schneierblog), CTO of Resilient Systems, Inc., in our conversation at the 2015 Black Hat Conference in Las Vegas. “I like to see metrics about people, about process, about technology. There isn’t one metric that works since it’s such a complicated and moving target… Right now companies have to use the data that they have to figure out if their teams are effective.”
Schneier feels that certain metrics, such as blocked attacks, don’t really provide a gauge of how secure you are…
Bruce Schneier: "Hacking Team is a Dangerous Company"
The American security guru fears that the diffusion of the software could be used by criminal groups
This interview also appeared in Italian.
You wrote in your blog: “I don’t think the company is going to survive”. However, at least in Italy and in the US Hacking Team has powerful sponsors…Will they survive?
«It remains to be seen. We know from the leaked documents that they have sold their products to the most repressive governments in the world…and overcharged them whenever possible. We know that they secretly put spyware and remote-control capabilities into the software they sold, allowing them back-door access without the knowledge of the governments they sold to. We know that they try to shield their activities from the UN in any way they can. We know, because of how completely and severely they were penetrated, that their own network security was pretty bad. They’ve already told all of their customers to stop using their software because it is no longer safe for them to do so. Hacking Team might have enough money in their bank accounts to stay around for a while, but do you think anyone will do business with them ever again?»…
Bruce Schneier: It’s Time to Start Prioritizing IT Security
Cyberattacks are getting more frequent, sophisticated and successful. Can organizations adapt security choices to cope better?
Nobody would disagree that IT security is necessary.
At minimum, it’s needed to satisfy relevant government and industry compliance regulations, along with your insurance company, investors, suppliers, customers and other business partners. At most, it also protects your data and systems from much-dreaded cyberattacks.
The hard part lies in the details.
‘What type of security should we invest in?”
“How much will this cost?’
‘Is there any ROI on security spending?’
To explore these issues, we sat down with security technologist Bruce Schneier…
Bruce Schneier: Get Ready for More "Organizational Doxing"
Bruce Schneier has been writing about security issues on his blog, his blog, Schneier on Security, since 2004, and in a monthly newsletter since 1998. He writes books, articles, and academic papers. Currently, he is the Chief Technology Officer of Resilient Systems, a fellow at Harvard’s Berkman Center, and a board member of Electronic Frontier Foundation.
What do you see as the greatest cyber risks today?
I don’t like ranking risks, and I worry that concentrating on the ‘greatest’ risk obscures all of the other risks. Basically, the big cyber risks are what everyone is talking about. It’s not like they’re hidden or subtle. They’re risks against our data: copying it, deleting it, modifying it, barring us access from it. They’re follow-on risks, because the Internet is so pervasive in modern society. They’re everything we’re actually worried about…
Is iPhone Banking Safe? An Expert Answers
iPhone and mobile banking can feel like setting foot in the jungle: You don’t know what’s in there, but you suspect a lot of it’s not good. We hear a lot of terms thrown around when it comes to iPhone banking security: 128 bit encryption, two factor authentication, security dongles—and a lot of scary anecdotes about millions of credit card account numbers being stolen from this or that company. Getting to the bottom of whether iPhone banking is safe can be confusing at best. So is iPhone banking safe?
To get a real handle on the question, ‘Is iPhone banking safe?’ we interviewed internet security expert Bruce Schneier, cryptographer, fellow at Harvard’s Berkman Center and the Chief Technology Officer of Resilient Systems. He’s also the author of various books on general security, cryptography and computer security, including the critically acclaimed …
Bruce Schneier: IT Teams Need Cyberattack Response Planning More Than Prevention
Corporate and government IT teams have been rushing to prevent the kind of large-scale cyberattack experienced recently by Sony Pictures, Blue Cross, Anthem, Target, Home Depot and the U.S. Department of the Interior, among others. In each of these cases, hackers from locations around the globe were able to gain access to computer networks housing sensitive information, accounts, and personal data, such as the social security and credit card numbers of consumers and employees. The consequences of such security breaches can be devastating.
"Everyone is hoping that they’re not next," said Bruce Schneier, a security guru and internationally renowned security technologist…
Sidebar photo of Bruce Schneier by Joe MacInnis.