Latest News

Page 2

Audio: Bruce Schneier on Truth, Reality, and Contact Tracing

  • Reality 2.0
  • May 27, 2020

Doc Searls and Katherine Druckman talk to Bruce Schneier about contact tracing, digital identity, hacking, privacy, and regulation.

Listen to the Audio on Reality2Cast.com

Video: Public Interest Technologists—Interview with Bruce Schneier and Jon Callas

  • Cyber Cyber Cyber Cyber
  • May 19, 2020

An interview with security experts Bruce Schneier and Jon Callas about public interest technologists. What are public interest technologists, and why are they important? Find out in this in-depth interview.

Watch the Video on YouTube.com

Video: Heise Webinar

  • Heise Events
  • April 15, 2020

Bruce Schneier spoke about incident response and IoT security as part of Heise’s online conference “Best of IT-Security.”

Watch the Video on Techcast.com

An Interview with Bruce Schneier, Renowned Security Technologist

  • Eric Wallach
  • The Politic
  • April 1, 2020

Bruce Schneier is an internationally renowned, award-winning public-interest technologist who serves as Chief of Security Architecture at Inrupt, a company working to bring Sir Tim Berners-Lee’s distributed data ownership model into the mainstream. Mr. Schneier is a fellow at the Berkman Klein Center for Internet & Society at Harvard University; a Lecturer in Public Policy at the Harvard Kennedy School; a board member of the Electronic Frontier Foundation, AccessNow, and the Tor Project; and an Advisory Board Member of the Electronic Privacy Information Center and VerifiedVoting.org. He is the author of over a dozen books—including one of the quintessential cryptography texts, …

Audio: Breaking Down the Huawei v. Pentagon Dispute

  • Federal Drive
  • March 26, 2020

If nothing else, the long-running Huawei situation shows the importance of considering the supply chain when it comes to cybersecurity. Huawei being the Chinese telecommunications equipment maker basically banned by the federal government. This topic came up at the recent RSA security conference, where Bruce Schneier was. He’s Adjunct Lecturer in Public Policy at Harvard University, and well-known cybersecurity. He joined the Federal Drive with Tom Temin to tell us more.

Listen to the Audio on PodcastOne.com

How to Detect Coronavirus Myths, Scams and Fake News: Security Guru Bruce Schneier Weighs In On COVID-19

  • Seattle 24x7
  • March 15, 2020

The Novel Coronavirus pandemic has scarcely afforded health care authorities with enough time to develop a cohesive testing protocol for millions of Americans. Filling this vacuum, a flood of false and misleading information now threatens to become another alarming side effect of the outbreak.

“We already know that there are disinformation campaigns being run by foreign actors, as well as misinformation being spread from all four corners of the Internet — including from our own president,” relates Bruce Schneier, the renowned cybersecurity specialist in an exclusive Seattle24x7 interview…

#RSAC: How to Hack Society

  • Sean Michael Kerner
  • Infosecurity
  • February 27, 2020

The method, procedures, and practices used by cybersecurity professionals have relevance beyond just the technology sphere; they can also be used to hack society.

That’s the view espoused by Bruce Schneier, security technologist, researcher, and lecturer at the Harvard Kennedy School, during a keynote session at the RSA Conference in San Francisco.

“This is the big idea: we here in our community have developed some very effective techniques to deal with code and technology,” Schneier said. “Can our expertise in IT security transfer to broader social systems like the tax code, or the systems we use to choose our elected officials or the market economy?”…

What’s the Best Way to Use the Cloud to Store Personal Data?

  • Matthew Kassel
  • The Wall Street Journal
  • February 23, 2020

Excerpt

Cloud storage can be a worrisome proposition, particularly as our digital archives grow. Should you back up everything to the cloud, or just some things? Is there data you shouldn’t store in the cloud? And which services should you trust?

No definitive blueprint exists for proper care of your archives, but there are a number of strategies to consider as digital security becomes more of a concern. The Wall Street Journal hosted an email conversation with three experts on cloud storage and the security and privacy issues around it: Alexis Hancock, a staff technologist at the Electronic Frontier Foundation; Ray Lucchesi, president and founder of Silverton Consulting, a storage consulting-services agency; and Bruce Schneier, a security technologist who lectures on public policy at Harvard Kennedy School. Edited excerpts follow…

Audio: Bruce Schneier: On the Future of Public-Interest Tech

  • Humans of InfoSec
  • February 19, 2020

In our latest episode, renowned security technologist Bruce Schneier joined Caroline Wong for an enlightening conversation on the future of public-interest technology. Hailed as a “security guru” by The Economist, Bruce has authored more than a dozen books on security and cryptography, testified before Congress, and served on multiple government committees. Bruce is currently a fellow at the Berkman Klein Center for Internet & Society at Harvard University, a Lecturer in Public Policy at the Harvard Kennedy School, and a board member of the EFF, AccessNow, and the Tor Project. Hundreds of thousands of people regularly read his blog “Schneier on Security.” He joined Humans of InfoSec to discuss the future of ethical technology and the role technologists can play in positively shaping public policy…

Not Just about the Data

Cybersecurity expert Bruce Schneier explains why IoT is a new kind of threat

  • Kevin Jackson
  • Science Node
  • February 17, 2020

The Internet of Things (IoT) finds its way into your life slowly at first. An Alexa device in the kitchen is soon accompanied by a connected camera for your doorbell. Before you know it, you’re surrounded by gadgets made cheaply by companies that believe security is, at best, an afterthought.

The IoT is fraught with vulnerability issues, and hackers may enlist these devices as players in malicious botnets. That said, the IoT’s security problems are often overblown in the media. Every new technology has its stumbles, but those mistakes can be corrected. …

Sidebar photo of Bruce Schneier by Joe MacInnis.