Latest News

Page 28

Schneier: It's Time to Regulate IoT to Improve Cyber-Security

In a keynote at the SecTor security conference, Bruce Schneier makes a case for more regulatory oversight for software and the Internet of Things

  • Sean Michael Kerner
  • eWeek
  • November 15, 2017

The time has come for the U.S. government and other governments around the world, to start regulating Internet of Things (IoT) security, according to Bruce Schneier, CTO of IBM’s Resilient Systems.

Schneier delivered his message during a keynote address at the SecTor security conference here. He noted that today everything is basically a computer, whether it’s a car, a watch, a phone or a television. IoT today has several parts including sensors that collect data, computing power to figure out what to do with the collected data and then actuators that affect the real world…

An Interview with Bruce Schneier on the Internet of Things, Global Surveillance, and Cybersecurity

  • Jamie
  • ExpressVPN
  • October 24, 2017

Bruce Schneier is a world-renowned cryptographer and security technologist whom the Economist has dubbed an “internet-security guru.” Schneier has authored a dozen books since 1993, with his next book—Click Here to Kill Everybody: Peril and Promise in a Hyper-Connected World—due for release in September 2018, and set to tackle the burgeoning trends of cybercrime, corporate surveillance, and how to mitigate the catastrophic risks from unsecured devices.

Earlier this year, Schneier wrote a chilling article in New York Magazine detailing the pressing dangers of unsecured IoT devices and, more recently, …

The Cybersecurity Canon: Data and Goliath

  • John Davis
  • Palo Alto Networks
  • October 8, 2017

Executive Summary

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World” is a book meant to scare you, and it does a good job. The book is designed to get our attention and serve as a wake-up call on a number of issues that beg for more robust public discussion. Chief among these issues are mass surveillance from governments and the commercial world, and how this is affecting personal privacy and even public security. More importantly, I believe Bruce Schneier offers some excellent recommendations as to what we should all be talking about and doing when it comes to bringing these critical issues out of the shadows and into the light. Finally, this book offers some ideas that I believe can serve as the basis for the formulation of improved norms of responsible behavior, more effective government and industry policies and regulations, and perhaps more balanced national and international laws relevant to the digital age. As such, this book deserves a place of honor in the Cybersecurity Canon…

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier (Review)

  • Dr. Jan Kalberg and CDT Monte Ho
  • The Cyber Defense Review
  • Fall 2017

We all surrender privacy in some form and fashion and allow companies to gather data so these enterprises can better serve us. Our cell phone provider needs to know where we are to route calls to the appropriate cell tower. As consumers and users, we allow the cell phone company to track and follow our moves because the convenience of being able to receive a call is greater than our perceived loss of privacy. For the last twenty years, Americans have accepted that the benefit of convenience outweighs the loss of privacy. Bruce Schneier makes a strong argument that this construct should no longer be the case. The book Data and Goliath has a compelling message that is a Red Thread of a question through the text: “Do you accept the surrender of your data for convenience?” The author is an authority in the field of cybersecurity—a renowned computer scientist and cryptographer. Schneier has been at the forefront of cybersecurity developments since the 1990s with an appetite to address current challenges and put them in perspective…

On Internet Privacy, Be Very Afraid

‘Surveillance Is the Business Model of the Internet,’ Berkman and Belfer Fellow Says

  • Liz Mineo
  • Harvard Gazette
  • August 24, 2017

In the internet era, consumers seem increasingly resigned to giving up fundamental aspects of their privacy for convenience in using their phones and computers, and have grudgingly accepted that being monitored by corporations and even governments is just a fact of modern life.

In fact, internet users in the United States have fewer privacy protections than those in other countries. In April, Congress voted to allow internet service providers to collect and sell their customers’ browsing data. By contrast, the European Union hit Google this summer with a $2.7 billion antitrust fine…

Is It Time To Regulate the IoT?

  • Danny Bradbury
  • SecTor
  • August 11, 2017

US Senators just introduced new legislation to regulate the purchase of Internet of Things (IoT) devices. Why did they do it, and what chance is there of success?

The Internet of Things Cybersecurity Improvement Act would set minimum security requirements for federal procurements of connected devices. These include the ability to patch code, a lack of hard-coded passwords, and freedom from known security vulnerabilities.

Bruce Schneier, security author, CTO at IBM Resilient and fellow at Harvard’s Berkman Klein Center for Internet & Society, is one of the people endorsing the bill. He will talk about the dangers of the IoT in his …

"Surveillance Is the Business Model of the Internet"

Under surveillance capitalism, we’ve lost control of our devices and our data – but there is a way back. Interview with Bruce Schneier by Agne Pix.

  • Agne Pix
  • OpenDemocracy
  • July 18, 2017

Polish version

Agne Pix (AP): Does technology protect our privacy on the internet or is it a threat?

Bruce Schneier (BS): There are a lot of technologies that help preserve privacy and keep us and our data secure, like for example encryption. Technology can also remove privacy: you may think of cameras or listening devices and insecure internet connections. We are living in a world where we often interact with computers. They produce data about these interactions, which is data about ourselves and that is collected by corporations. Surveillance is the business model of the internet. So right now a lot of the technology that we use is harmful to our security and privacy…

Video: NSA Contractor Charged for Leak After Intercept Exposé Reveals Russian Cyberattack of 2016 Election

  • Democracy Now
  • June 6, 2017

Watch the Video on DemocracyNow.org

A military intelligence contractor has been arrested and charged with leaking a top-secret NSA report to the media that reveals Russian military intelligence conducted a cyberattack on at least one U.S. voting software company just days before last November’s presidential election. The charges were announced after The Intercept published part of the NSA report on Monday. It is the first criminal leak case under President Trump. We speak with security technologists Bruce Schneier and Jake Williams, who is a former member of the NSA’s Tailored Access Operations hacking team…

"Surveillance Shouldn’t Be the Business Model of the Internet. We Can Change It"

  • Kim Arora
  • The Times of India
  • May 28, 2017

Dubbed a ‘security guru’ by The Economist, Bruce Schneier has authored several books, including NYT bestseller Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, as well as hundreds of articles and academic papers. In 2013, the American security technologist was invited to brief a US Congress group about the documents revealed by whistleblower Edward Snowden, and to explain ‘what the NSA (National Security Agency) was doing’. In an email interview to Kim Arora , he spoke about the recent Wannacry ransomware attack, cybersecurity, and threats to privacy. …

Video: Cybersecurity Talk with Bruce Schneier: How to Start Your Career in Cybersecurity?

  • Paula
  • CQURE Academy
  • April 13, 2017

Watch the Video on CQUREAcademy.com

In today’s episode, together with Bruce Schneier, we are talking about how to start and skyrocket your career in cybersecurity.

Paula: I’m here with Bruce Schneier. The most prominent person in security. Thank you so much for being with me. I have a couple of questions.

Where to expect hacks?

You have delivered a presentation about IoT (Internet of things). IoT hacks it’a not a very surprising thing for IT security professionals like hotels and different devices but everybody’s wondering: what’s coming next?…

Sidebar photo of Bruce Schneier by Joe MacInnis.