Internationally renowned security guru, privacy specialist and author, Bruce Schneier, stops by BarCode to discuss the FireEye Hack, Covid-19 Vaccine Cold Chain Attacks, CISA, and Net Neutrality. Host Chris Glanden is joined by special guest co-host Alex, and Tony the Bartender explains his theorem for a “Blitzen”.
You have probably heard the saying: “If you are not paying for the product, you ARE the product”. Nowhere is this more acute than on the internet when our personal data is collected, analyzed and used to persuade us to buy products or ideas, many times without our explicit knowledge or permission. Our guest Bruce Schneier, a renowned security technologist, author and Berkman Klein Center fellow at Harvard has said: “On the internet data is power, to the extent the powerless have access to it, they gain in power, to the extent the already powerful have access to it, they further consolidate their power.”…
For this keynote, Bruce gave attendees the chance to pick his brain and have him answer their burning questions live. Bruce chose 10 of the questions to answer on the future of our ever changing cyber security landscape.
Discussion on how voting machines are inherently vulnerable—what can and should be done to make them safer—to adhere to the ‘Gold Standard’ of paper ballots used in many states across the US in this election. Further discussion on hacking, audits and International bad actors trying to infiltrate state election databases as well as old voting machines that are vulnerable to attack and manipulation. An open and frank discussion with a ‘security guru’ with decades of experience on how we can keep America’s democratic process of voting safe and secure. …
Speaking in the opening keynote of the virtual (ISC)2 Security Congress, renowned security technologist and best-selling author Bruce Schneier discussed the public-interest aspects of technology.
In particular, he explored the ethics of data privacy and security, whilst also outlining how today’s cybersecurity professionals are more than technologists; the work they do affects society as a whole.
“In cybersecurity, government access to encrypted communications has been the subject of a 25-year long debate. On the one side, there are police claiming they are going dark and need access to encrypted data in order to solve crimes. On the other side, security experts say it is impossible to provide that access without making systems insecure.”…
Join Hubwonk host Joe Selvaggi and security technologist Bruce Schneier as they discuss risks associated with car telematics as well as how best to ensure public safety in the future of the internet of everything.
Bruce Schneier was interviewed by David Quisenberry and John L. Whiteman on the podcast of the Open Web Application Security Project’s Portland, Oregon chapter.
Bruce Schneier Says Pressure on Retailers Could Fix Insecure IoT Supply Chains
IoT devices can be made cheaply and quickly. But as a result, they may lack adequate security features.
There’s been a global effort by countries, standards organizations and corporations to improve the state of IoT security through voluntary baseline standards. Connected devices suffer from a range of issues, including insecure default configurations when they’re sold as well as inconsistent patching by vendors.
But an IoT device isn’t just one product. It’s an assembly of components that come from a variety of manufacturers made in a variety of places. A security problem could be rooted in any of those components…
A selection of books, essays, and academic papers chosen by Bruce Schneier for The Syllabus.
This essay expands on the notion that people should “hack” democracy as a vehicle for change. Peering beyond the buzzwords, a healthier approach to political transformation through technological means “would involve refraining from fetishizing the tools while taking their intrinsically political nature into account along with the question of their design.”
II. Coding Democracy
This book offers an exploration of hackers as both societal disrupters and innovators. Admirably, Webb not only lays out a theoretical case for how hackers can invent “new forms of distributed, decentralized democracy” but she provides a close examination of prominent and productive case studies…
Sidebar photo of Bruce Schneier by Joe MacInnis.