News in the Category “Video”
In today’s episode, together with Bruce Schneier, we are talking about how to start and skyrocket your career in cybersecurity.
Paula: I’m here with Bruce Schneier. The most prominent person in security. Thank you so much for being with me.
Why sensationalized terrorism coverage makes us overreact to risk.
For most Americans, terrorism is only ever experienced through a television screen or front page of a newspaper. Despite generating massive headlines, terrorism kills a shockingly small number of Americans every year, especially when compared to a problem like gun violence. In terms of the public's attention, terrorism takes up a lot more space than its death toll warrants.
But for cable news networks, terrorism coverage is big business.
WikiLeaks may have exposed the CIA's ability to hack into phones, televisions, cars—pretty much everything, but according to internationally renowned security technologist and author Bruce Schneier, it isn't the intelligence agencies you should be worried about. He's more concerned that these technologies have been around for decades. Bruce is sharing three things to be concerned about with Kristina Guerrero.
At RSA 2017, Bruce Schneier spoke with Network World on the increasing importance of technologists' presence in education and policy-making.
"American Elections Will Be Hacked." That’s the title of a recent article in The New York Times by our next guest, the leading cybersecurity and privacy researcher Bruce Schneier. Schneier warns, "Our newly computerized voting systems are vulnerable to attack by both individual hackers and government-sponsored cyberwarriors. It is only a matter of time before such an attack happens."
Bruce Schneier joined David Pakman to discuss computer security in relation to politics and election mechanics.
Linda Gray, General Manager of the RSA Conference, speaks with Bruce Schneier on the topic of his keynote, "Security in the World-Sized Web," at RSA Conference 2016 Singapore.
Bruce Schneier and attorney David O'Brien discuss the new report issued by the Berkman Center for Internet & Society at Harvard University on the issue of “Going Dark,” and the role of law enforcement and privacy rights under scrutiny, revelations of government spying, and analysis of the Apple iPhone Encryption litigation and its progeny unfolding in the Federal Courts.
The Internet of Things (IoT) is ushering in a new age of hyperconnectivity – and new cyber security challenges.
In this video, Resilient CTO Bruce Schneier explains how the Internet of Things raises the stakes in cyber security, and explores how organizations will need to battle these new challenges.
Security expert Bruce Schneier discusses security from the perspectives of both the National Security Agency and the National Institution of Standards and Technology.
Since the 1930s at Bletchley Park, there has been a continuous arms race to both improve and break cryptography. The files leaked by National Security Agency (NSA) contractor Edward Snowden made it clear that governments regularly gather data on average citizens, which makes us wonder if privacy is even possible. Do our carefully designed cryptographic systems protect our information as we expect them to, or are they just thin veils that can easily be pierced by the government? I posed these questions to leading security expert Bruce Schneier.
Threatpost Editor in Chief Mike Mimoso talks to crypto pioneer and security expert Bruce Schneier of Resilient Systems about the early days of the RSA Conference, the integration of privacy and security, and the current FBI-Apple debate over encryption and surveillance.
"Companies go to the cloud not because the security person tells them to. They go to the cloud because the business person tells them to. Because the economics of doing it is so compelling and the security person has to manage," said Bruce Schneier (@schneierblog), CTO, Resilient Systems, in our conversation at the RSA 2016 Conference in San Francisco.
Computing is embedded in everything we do, such as cars and planes, said Schneier.
A shortage of skilled cyber security employees is one of the most significant challenges organizations face today.
In this video, Resilient CTO Bruce Schneier explains the cyber security skills gap, and outlines steps to help organizations overcome it.
Business leaders and IT security professionals don't always see eye to eye—and that creates risk.
In this video, Resilient Systems CTO Bruce Schneier outlines ways for business and security leaders to build trust and create a security-focused organizational culture.
Without proper controls, minor—yet insecure—behaviors can become accepted habits at organizations. And that can lead to major security risks.
In this video, Resilient CTO Bruce Schneier explains how security leaders can spot insecure practices, and stop them from taking hold at their organization.
Organizations are overwhelmed with security alerts—far more than they can reasonably manage. Incident response orchestration and automation can go a long way in helping teams resolve security events faster and more effectively.
Bruce Schneier was honored as the Business Leader in Cybersecurity by the Boston Global Forum, for dedicating his career to the betterment of technology security and privacy.
Mr. Schneier attended and sent his acceptance speech remotely via online conference.
Being a CISO is often a tenuous, highly political job—and for security matters, the buck stops with you. In this interview, Bruce Schneier offers strategies for making your mark on your organization.
"Cyber resilience" has emerged as the standard cybersecurity teams are striving for. Resilient Systems CTO and security expert Bruce Schneier explains what's driving cyber resilience, and offers steps and strategies for improving cyberattack preparedness and resilience.
In the wake of the cyberattacks on Sony and Ashley Madison, it's clear that organizational doxing—the act of hacking into a business and releasing private information like executive and employee emails or salary information —is a rising threat for businesses.
Resilient Systems CTO and security expert Bruce Schneier explores the trend and how security teams can prepare for a doxing attack.
Resilient Systems CTO and security expert Bruce Schneier explores how security pros can intelligently leverage automation to empower incident response teams to mitigate cyberattacks faster and more effectively.
Private Thoughts sat down with Bruce Schneier at the Electronic Frontier Foundation’s 25th anniversary party in July. Schneier is an internationally renowned security technologist and author of 13 books. He discussed the effects of the loss of ephemeral communication and the ease of data collection and storage.
Boom Bust correspondent Bianca Facchinei sits down with Bruce Schneier – chief technology officer at Resilient Systems, Inc. and fellow at the Berkman Center for Internet and Society at Harvard Law School – at the Black Hat conference in Las Vegas. Bruce gives us his take on the infamous 2014 Jeep Cherokee hack and tells us how government surveillance impacts social movements.
The "smart bad guys" figure out how to get around TSA, says security technologist and Harvard Law School fellow Bruce Schneier.
"Last year was being called the 'year of the breach,'" said Bruce Schneier, CTO of Resilient Systems, formerly Co3 Systems. "Now, you and I know every year [has] been the year of the breach. But last year there were a bunch of really high-profile breaches where the companies involved did a terrible job of responding, that they were actually in chaos and it looked that way."
In this interview, recorded at the 2015 RSA Conference, SearchSecurity editorial director Robert Richardson sat down with Schneier to discuss Resilient Systems' contribution to improving enterprise incident response management in the coming year.
"As a business or as an individual you have to make a choice. Should I do this thing—whatever it is—on my computer and on my network or on a cloud computer on a cloud network," asked Bruce Schneier (@schneierblog), CTO of Resilient Systems, Inc., in our conversation at the 2015 RSA Conference in San Francisco.
Whatever you choose, you're going to be making a trade-off. Schneier recommends you first look at who your adversaries are.
Erin Ade sits down with Bruce Schneier – security expert, author, and fellow at the Berkman Center for Internet and Society at Harvard Law School. Bruce tells us that a cloud service is safer than running your own data center when you are entrusting your data to a provider who understands security better than you do. And for most people this is definitely the case. Bruce also talks to Erin about state actors weakening security standards and about the security of various open source encryption options.
Part 2 of our discussion with Bruce Schneier about about the golden age of surveillance and his new book, "Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World."
AMY GOODMAN: This is Democracy Now!, democracynow.org, The War and Peace Report. I'm Amy Goodman, with Juan González. Our guest is Bruce Schneier. He is a leading security technologist.
Video: Data and Goliath: Bruce Schneier on the Hidden Battles to Collect Your Data and Control Your World
Leading security and privacy researcher Bruce Schneier talks about about the golden age of surveillance and his new book, "Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World." The book chronicles how governments and corporation have built an unprecedented surveillance state. While the leaks of Edward Snowden have shed light on the National Security Agency's surveillance practices, less attention has been paid to other forms of everyday surveillance—license plate readers, facial recognition software, GPS tracking, cellphone metadata and data mining.
JUAN GONZÁLEZ: We turn now to look at what our next guest calls the "golden age of surveillance." The leading security and privacy researcher Bruce Schneier is out with a new book, Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. The book chronicles how governments and corporations have build an unprecedented surveillance state.
EMMA ALBERICI, PRESENTER: One of the world's leading experts in online security is Bruce Schneier. He's a fellow at Harvard University's Berkman Center for Internet and Society. His latest book, 'Data and Goliath', is about how governments and corporations are using and controlling our data.
I spoke to Bruce Schneier from Minneapolis.
Bruce Schneier, noted cryptologist and fellow at the Berman Center for Internet & Society at Harvard Law School, tells us how to protect our Wi-Fi connection in public and prevent ISPs from tracking our mobile internet use.
Erin Ade sits down with Bruce Schneier – noted author, cryptologist, and fellow at the Berkman Center for Internet and Security and Harvard Law School. Bruce gives us his take on President Obama’s recent statement on net neutrality and explains why encryption is vital to personal security and privacy.
Just how much of your life is watched? Security expert Bruce Schneier points out that it is more than most people think, says Chris Baraniuk.
Do you have secrets? Security expert Bruce Schneier has little patience for those who say they don't.
When asked about government and corporate surveillance, there are some who shrug their shoulders and say they have nothing to fear because they have nothing to hide. Schneier's response?
Erin Ade talks to Bruce Schneier about the efforts of government and private companies to track us and our personal information. However, our outrage over this invasion of privacy is overshadowed by the convenience of using technology. This tension has led to our ongoing, intense debate over the tradeoffs between security and surveillance. To help sort out all of these issues Schneier weighs in.
Bruce Schneier is one of the best-known security professionals both within the field and in the larger world of technology policymaking. He's written 12 books, produces the influential "Schneier on Security" blog and is widely quoted in the press. After a multi-year stint at BT Managed Security Solutions, Schneier has moved to a startup: Co3 Systems. The new company, where he serves as Chief Technology Officer, makes a tool that focuses specifically on security incident response management.
Bruce Schneier, cyber-security expert and author of Liars and Outliers: Enabling the Trust Society Needs to Thrive, talks about corporate and governmental data collection and surveillance. Schneier gave a lecture, “Internet, Security, and Power” on May 28, 2014 at the UO in Eugene and at the UO in Portland on May 29, 2014.
Few figures in the IT security landscape command the respect and admiration of so many people as does Bruce Schneier. The well-regarded expert recently changed jobs, moving from BT to become the CTO of Co3 Systems in January of this year.
In a video interview with eSecurity Planet, Schneier explains why the incident response technology that Co3 Systems builds is an important part of the modern IT security lifecycle. A key part of what Co3 does is to automate the details of incident response, he said.
Think the Edward Snowden-NSA storyline is played out? Think again.
"I think this story is going to keep going for at least a year, probably longer," said Bruce Schneier, chief technology officer with Co3 Systems, who is working with The Intercept's Glenn Greenwald to analyze and report on the NSA documents allegedly stolen and leaked by former contractor Edward Snowden. "There's an enormous pile of documents; they're very technical [and] hard to understand, and as you go through them, you find stories."
In this interview recorded at the 2014 RSA Conference, SearchSecurity Editorial Director Robert Richardson sits down with Schneier to discuss his role in reviewing the Snowden documents.
Bruce Schneier appeared on an episode of Inventing the Future with Robert Tercek about the collision between open society and surveillance.
Bruce Schneier is a legendary figure in the security community, well-known for his expertise in cryptography and more recently for his insight into the surveillance activities of the National Security Agency (NSA). Schneier currently serves as the CTO of incident response management vendor Co3 Systems. In an interview with eWEEK at the RSA conference here, Schneier detailed his views on the NSA's surveillance activities. When it comes to domestic surveillance and metadata collection, Schneier firmly believes that the Federal Bureau of Investigation is the right agency to handle that data. He noted that the FBI already has domestic security capabilities and is responsible for the national fingerprint database.
Security expert and technologist Bruce Schneier has told the BBC that he believes the NSA and GCHQ have "betrayed the trust of the internet".
Mr Schneier said: "We have to trust the infrastructure [of the internet]... The fact that it has been subverted in ways we don't understand... we don't know what to trust.
Renowned security expert Bruce Schneier talks with Eben Moglen about what we can learn from the Snowden documents, the NSA's efforts to weaken global cryptography, and how we can keep our own free software tools from being subverted.
Since Edward Snowden's disclosures about widespread NSA surveillance, Americans and people everywhere have been presented with a digital variation on an old analog threat: the erosion of freedoms and privacy in exchange, presumably, for safety and security.
Bruce Schneier knows the debate well. He's an expert in cryptography and he wrote the book on computer security; Applied Cryptography is one of the field's basic resources, "the book the NSA never wanted to be published," raved Wired in 1994. He knows the evidence well too: lately he's been helping the Guardian and the journalist Glenn Greenwald review the documents they have gathered from Snowden, in order to help explain some of the agency's top secret and highly complex spying programs.
Following the row over claims German chancellor Angela Merkel's phone was hacked by the US, Channel 4 News speaks to security expert Bruce Schneier and asks if the NSA has gone too far.
Rumours of the NSA hacking Angela Merkel’s encrypted phone have got the world wondering how it would even be possible.
Becky Anderson talks to security technologist Bruce Schneier about protecting phones from infiltration by third parties and how the German Chancellor's phone may have been vulnerable.
Maria Xynou interviewed Bruce Schneier on privacy and surveillance. View this interview and gain an insight on why we should all "have something to hide"!
The Centre for Internet and Society (CIS) interviewed Bruce Schneier on the following questions:
Do you think India needs privacy legislation? Why/ Why not?
The majority of India's population lives below the line of poverty and barely has any Internet access. Is surveillance an elitist issue or should it concern the entire population in the country?
Trust is an invisible yet essential force in our lives, the great stabilizer of human relations. How do we create it? How do we lose it? Bruce Schneier, author of Liars & Outliers: Enabling the Trust that Society Needs to Thrive, joins Steve Paikin to discuss the essential role of trust in society and the threat the "surveillance state" may pose to it.
Bruce Schneier discusses the latest NSA revelations including the NSA working with tech companies to insert weaknesses into their code.
In an effort to undermine cryptographic systems worldwide, the National Security Agency has manipulated global encryption standards, utilized supercomputers to crack encrypted communications, and has persuaded—sometimes coerced—Internet service providers to give it access to protected data. Is there any way to confidentially communicate online? We speak with security technologist and encryption specialist Bruce Schneier, who is a fellow at Harvard's Berkman Center for Internet and Society. He has been working with The Guardian on its recent NSA stories and has read hundreds of top-secret NSA documents provided by Edward Snowden.
More than 10 years ago, NSA officials went to Silicon Valley to learn how to build a better data operation. Chris Hayes talks to Bruce Schneier, security expert, and Colleen Taylor, reporter for TechCrunch and TechCrunch TV.
Bruce Schneier & Jonathan Zittrain in Conversation
From Bruce Schneier:
What I've Been Thinking About
I have been thinking about the Internet and power: how the Internet affects power, and how power affects the Internet. Increasingly, those in power are using information technology to increase their power. This has many facets, including the following:
1. Ubiquitous surveillance for both government and corporate purposes -- aided by cloud computing, social networking, and Internet-enabled everything -- resulting in a world without any real privacy.
Big data is a phrase that means a lot of things to a variety of people. For marketers, it means being able to target ads at certain segments of the population more accurately than ever before; for security pros, it means detecting and responding to incidents more quickly; and for every user connected to the Internet, big data means personal privacy on the Internet is gone.
In this video interview, recorded at the 2013 RSA Conference, security industry luminary and author Bruce Schneier uses three high-profile examples to explain why there is currently no privacy on the Internet. Among those examples is the Mandiant APT1 report, which he uses to show how easily even the most disciplined of Internet users can slip up and expose their identities to the world.
"We live in a world where we're ceding a lot of our power to other companies," said Bruce Schneier (@schneierblog), security blogger and author of "Liars and Outliers" in our conversation at the 2013 RSA Conference in San Francisco.
Schneier was referring to companies such as Google and Facebook that control our data as well as companies that control our devices, such as Apple.
"These companies are in charge of our security and we have no choice but to trust them and in many cases their interests don't align with ours," said Schneier. "It's not that these companies are evil.
Like the rest of the world, the day-to-day function of the Internet relies on trust, according to author and security luminary Bruce Schneier. However, that trust is being frequently and seriously violated by many of companies that dominate the Internet.
In this video interview, Schneier, chief technology security officer with BT Counterpane, discusses the ways in which trust -- and, in turn, data privacy -- is threatened on the Internet, and explains how Google, Apple and others have adopted a feudal model of security, in which their customers have little, if any, recourse to ever reclaim data that rightfully belongs to them.
The digital technologies that so delight us also have a dark side. On this Episode of Inventing the Future with Robert Tercek, the topic of discussion is the future of surveillance technologies. Whether it be the government, big business, organized crime, or even your next door neighbor, chances are you're being tracked and analyzed.
Joining Robert Tercek in asking whether or not privacy is dead are BT Managed Security Solutions' Chief Security Technology Officer, Bruce Schneier and Research Fellow at The Cato Institute, Julian Sanchez.
Paul Muller (@xthestreams), Chief Evangelist, HP Software speaks with two of the HP Protect 2012 keynote speakers about security and risk management.
Paul speaks with Bruce Schneier, Security Technologist - Author of Liars and Outliers - How societies can use security to enable the trust the need to survive. Paul and Bruce discuss:
- How can security technologists get in front of the security risks resulting from new technologies and general evolutions?
- The importance of swift reaction to inevitable breaches and exploitation tactics.
- Thinking about security in the terms of decision cycles to best anticipate and mitigate risk.
Bruce Schneier talks to Sean Michael Kerner about what's wrong with encryption today and provides insight into what the best browser and operating system to use might be.
Bruce Schneier gives us his views on why morality might well be the key ingredient for better Internet security.
Bruce Schneier takes audience questions at the DEF CON 20 hacker convention in Las Vegas.
Davi Ottenheimer, President of flyingpenguin, interviews Bruce Schneier on his latest book.
We don't demand a background check on the plumber who shows up to fix the leaky sink. We don't do a chemical analysis on food we eat. In the absence of personal relationships, we have no choice but to substitute confidence for trust, compliance for trustworthiness.
Bruce Schneier discussed his book Liars and Outliers at the RSA Conference 2012.
Bruce Schneier's latest book, Liars and Outliers, is a departure from his previous landmark books on cryptography and information security. In Liars and Outliers, Schneier pulls back from technology and looks at trust and security and how those very human concepts have evolved in concert with the development of cooperative societies to build the trust and security mechanisms we have today.
In this interview conducted at RSA Conference 2012, Schneier explains his interest in the sociology of security and trust and how today's online interactions are changing the trust dynamic. He paints a not-so-bleak picture of why the Internet remains a trustworthy and viable platform for communication and ecommerce, and talks about whether social networking and technical feedback mechanisms comprise the new trust going forward.
Two RSA Conference Europe 2010 Keynote speakers discuss Bruce Schneier's session on Security, Privacy and the Generation Gap.
In part one of this interview with Bruce Schneier, he discusses the impending shift in how security will be delivered. Schneier expects security to be embedded in Web-based services and sold directly to service providers, rather than to enterprises and end users. This is a radical transformation for the security industry that security professionals must prepare for. Schneier also discusses consumerization and how traditional security technologies and services must adjust as more untrusted devices connect to trusted networks.
Author and leading security expert Bruce Schneier digs into the topics of the current state of cryptography and whether or not companies should care about the U.S. government's release of portions of the CNCI.
At 2009's Information Security Decisions conference, security expert Bruce Schneier sat down to answer some of readers' security questions, which range from the trustworthiness of outsourced security services to the usefulness of awareness training in securing new technologies.
Bruce Schneier answered audience questions at the DEFCON hacking conference.
But the question is: is everything we go through at checkpoints actually making us safer? Security expert Bruce Schneier says no. He says much of it is just "security theater."
"It's a phrase I coined for security measures that look good, but don't actually do anything," he explained.
Schneier, who has been an adviser to TSA but also its most persistent thorn-in-the-side, says there are too many silly rules.
Bruce Schneier és considerat internacionalment com un gurú de la seguretat informàtica. Va fundar, i actualment dirigeix, la divisió tecnològica de la companyia BT Counterpane, especialitzada en serveis de seguretat informàtica. Citat habitualment als mitjans de comunicació, Schneier ha escrit nombrosos articles a la premsa i ha testificat diverses vegades sobre seguretat al Congrés dels Estats Units.
Note: in this video, the questions are in Spanish but Bruce Schneier's responses are in English.
BT's Bruce Schneier and Ray Stanton talk security with ComputerWeekly.com's security blogger David Lacey at Infosecurity 2008.
While the media bombards consumers with frightening stories, discussions about security are thwarted by the failure of language to separate the "feeling" and "reality" of security, says security guru Bruce Schneier.
Schneier, author of Applied Cryptography and his most recent book Beyond Fear, reckons there is a fundamental problem with the way humans think about security. And its roots can be drawn back to a failure of language.
"'Security' is a complicated word," Schneier told ZDnet.com.au at linuxconf08.
"You can feel secure and there's the reality of security -- how secure you are.
Bruce Schneier answered questions from the audience at DEF CON 15.
Bruce Schneier answered audience questions at the DEF CON hacking conference.
Photo of Bruce Schneier by Per Ervland.
Schneier on Security is a personal website. Opinions expressed are not necessarily those of IBM Resilient.