For this keynote, Bruce gave attendees the chance to pick his brain and have him answer their burning questions live. Bruce chose 10 of the questions to answer on the future of our ever changing cyber security landscape.
Discussion on how voting machines are inherently vulnerable—what can and should be done to make them safer—to adhere to the ‘Gold Standard’ of paper ballots used in many states across the US in this election. Further discussion on hacking, audits and International bad actors trying to infiltrate state election databases as well as old voting machines that are vulnerable to attack and manipulation. An open and frank discussion with a ‘security guru’ with decades of experience on how we can keep America’s democratic process of voting safe and secure. …
Speaking in the opening keynote of the virtual (ISC)2 Security Congress, renowned security technologist and best-selling author Bruce Schneier discussed the public-interest aspects of technology.
In particular, he explored the ethics of data privacy and security, whilst also outlining how today’s cybersecurity professionals are more than technologists; the work they do affects society as a whole.
“In cybersecurity, government access to encrypted communications has been the subject of a 25-year long debate. On the one side, there are police claiming they are going dark and need access to encrypted data in order to solve crimes. On the other side, security experts say it is impossible to provide that access without making systems insecure.”…
Join Hubwonk host Joe Selvaggi and security technologist Bruce Schneier as they discuss risks associated with car telematics as well as how best to ensure public safety in the future of the internet of everything.
Bruce Schneier was interviewed by David Quisenberry and John L. Whiteman on the podcast of the Open Web Application Security Project’s Portland, Oregon chapter.
Bruce Schneier Says Pressure on Retailers Could Fix Insecure IoT Supply Chains
IoT devices can be made cheaply and quickly. But as a result, they may lack adequate security features.
There’s been a global effort by countries, standards organizations and corporations to improve the state of IoT security through voluntary baseline standards. Connected devices suffer from a range of issues, including insecure default configurations when they’re sold as well as inconsistent patching by vendors.
But an IoT device isn’t just one product. It’s an assembly of components that come from a variety of manufacturers made in a variety of places. A security problem could be rooted in any of those components…
A selection of books, essays, and academic papers chosen by Bruce Schneier for The Syllabus.
This essay expands on the notion that people should “hack” democracy as a vehicle for change. Peering beyond the buzzwords, a healthier approach to political transformation through technological means “would involve refraining from fetishizing the tools while taking their intrinsically political nature into account along with the question of their design.”
II. Coding Democracy
This book offers an exploration of hackers as both societal disrupters and innovators. Admirably, Webb not only lays out a theoretical case for how hackers can invent “new forms of distributed, decentralized democracy” but she provides a close examination of prominent and productive case studies…
Our new series of interviews are based on the executive online programme “Blockchain Rules”. In this series, we are going to interview thought leaders from the blockchain ecosystem interested in sharing their thoughts and opinion about the topics that will be covered in the “Blockchain Rules” course. In this second podcast of the series Dr. Giovanna Massarotto, UCL Blockchain Rules Online Programme Coordinator, interviews Bruce Schneier.
Audio: Is Contact Tracing Dumb? False Positives, Loss of Trust, and an Uncertain Path Back to Normalcy
There has been so much hype about contact tracing technology and how it will be the key to reopening the country. Google and Apple, for example, are building a system to track contact between people who might spread the disease. The idea is simple: since Bluetooth is constantly scanning for other devices, your phone can use wireless signals to see who you’ve been near. Somebody who gets a positive diagnosis can tell the app, which will inform everyone else who has been in proximity to alert them about risks of possible transmission…
Sidebar photo of Bruce Schneier by Joe MacInnis.