Latest News

Page 38

Bruce Schneier: "We're in Early Years of a Cyber Arms Race"

  • Neil McAllister
  • The Register
  • August 19, 2015

Security guru Bruce Schneier says there’s a kind of cold war now being waged in cyberspace, only the trouble is we don’t always know who we’re waging it against.

Schneier appeared onscreen via Google Hangouts at the LinuxCon/CloudOpen/ContainerCon conference in Seattle on Tuesday to warn attendees that the modern security landscape is becoming increasingly complex and dangerous.

"We know, on the internet today, that attackers have the advantage," Schneier said. "A sufficiently funded, skilled, motivated adversary will get in. And we have to figure out how to deal with that."…

Video: Private Thoughts – Bruce Schneier on the Ephemeral, Privacy, and Data

  • Bruce Schneier
  • Restore the Fourth
  • August 18, 2015

Private Thoughts sat down with Bruce Schneier at the Electronic Frontier Foundation’s 25th anniversary party in July. Schneier is an internationally renowned security technologist and author of 13 books. He discussed the effects of the loss of ephemeral communication and the ease of data collection and storage.

Watch the Video on RestoreTheFourthSF.com

The New America: Little Privacy, Big Terror

  • David Cole
  • The New York Review
  • August 13, 2015

Excerpt

In Data and Goliath, Bruce Schneier, a security technologist and fellow at Harvard Law School, explores what it means to have entered the age of mass surveillance. Our data are collected in the first instance by private corporations, but are increasingly exploited, as Edward Snowden has shown, by government intelligence agencies. The NSA didn’t have to build from scratch a vast database on billions of innocent citizens the world over, Schneier explains, because private corporations had already done so. All the NSA needed was access.

Bruce Schneier on Security Metrics that Matter

  • David Spark
  • Tenable Blog
  • August 10, 2015

“I like to measure the performance of the team,” said Bruce Schneier (@schneierblog), CTO of Resilient Systems, Inc., in our conversation at the 2015 Black Hat Conference in Las Vegas. “I like to see metrics about people, about process, about technology. There isn’t one metric that works since it’s such a complicated and moving target… Right now companies have to use the data that they have to figure out if their teams are effective.”

Schneier feels that certain metrics, such as blocked attacks, don’t really provide a gauge of how secure you are…

Video: Bruce Schneier on Jeep Hack and Encryption

  • Boom Bust
  • August 7, 2015

Boom Bust correspondent Bianca Facchinei sits down with Bruce Schneier – chief technology officer at Resilient Systems, Inc. and fellow at the Berkman Center for Internet and Society at Harvard Law School – at the Black Hat conference in Las Vegas. Bruce gives us his take on the infamous 2014 Jeep Cherokee hack and tells us how government surveillance impacts social movements.

Watch the Video on YouTube

Video: How Vulnerable are Airlines to Hackers?

  • Bloomberg Business
  • August 7, 2015

Resilient Systems CTO Bruce Schneier discusses the vulnerability of airlines to hackers with Bloomberg’s Emily Chang at the Def Con hacking convention in Las Vegas.

Watch the Video on Bloomberg.com

Bruce Schneier: "Hacking Team is a Dangerous Company"

The American security guru fears that the diffusion of the software could be used by criminal groups

  • Stefania Maurizi
  • L'Espresso
  • July 29, 2015

This interview also appeared in Italian.

You wrote in your blog: “I don’t think the company is going to survive”. However, at least in Italy and in the US Hacking Team has powerful sponsors…Will they survive?
«It remains to be seen. We know from the leaked documents that they have sold their products to the most repressive governments in the world…and overcharged them whenever possible. We know that they secretly put spyware and remote-control capabilities into the software they sold, allowing them back-door access without the knowledge of the governments they sold to. We know that they try to shield their activities from the UN in any way they can. We know, because of how completely and severely they were penetrated, that their own network security was pretty bad. They’ve already told all of their customers to stop using their software because it is no longer safe for them to do so. Hacking Team might have enough money in their bank accounts to stay around for a while, but do you think anyone will do business with them ever again?»…

Bruce Schneier: It’s Time to Start Prioritizing IT Security

Cyberattacks are getting more frequent, sophisticated and successful. Can organizations adapt security choices to cope better?

  • Daniel Dern
  • Work Intelligent.ly
  • July 24, 2015

Nobody would disagree that IT security is necessary.

At minimum, it’s needed to satisfy relevant government and industry compliance regulations, along with your insurance company, investors, suppliers, customers and other business partners. At most, it also protects your data and systems from much-dreaded cyberattacks.

The hard part lies in the details.

‘What type of security should we invest in?”

“How much will this cost?’

‘Is there any ROI on security spending?’

To explore these issues, we sat down with security technologist Bruce Schneier…

Bruce Schneier: Get Ready for More "Organizational Doxing"

  • Chad Hemenway
  • Cyber Risk Network
  • July 21, 2015

Bruce Schneier has been writing about security issues on his blog, his blog, Schneier on Security, since 2004, and in a monthly newsletter since 1998. He writes books, articles, and academic papers. Currently, he is the Chief Technology Officer of Resilient Systems, a fellow at Harvard’s Berkman Center, and a board member of Electronic Frontier Foundation.

What do you see as the greatest cyber risks today?

I don’t like ranking risks, and I worry that concentrating on the ‘greatest’ risk obscures all of the other risks. Basically, the big cyber risks are what everyone is talking about. It’s not like they’re hidden or subtle. They’re risks against our data: copying it, deleting it, modifying it, barring us access from it. They’re follow-on risks, because the Internet is so pervasive in modern society. They’re everything we’re actually worried about…

Infosec Influencers: An Interview with Bruce Schneier

  • David Bisson
  • Tripwire
  • July 16, 2015

This week, as part of our new ‘Infosec Influencer’ series, I had the pleasure of sitting down with Bruce Schneier, an internationally renowned security technologist and one of The State of Security’s Top Influencers in Security You Should Be Following in 2015. He has written 12 books, including Liars and Outliers: Enabling the Trust Society Needs to Thrive, not to mention published hundreds of articles and essays. His blog has is read by over 250,000 people, and he is regularly quoted by the press. Additionally, he regularly testifies before Congress and is an advisory board member for EFF and EPIC, among other organizations…

Sidebar photo of Bruce Schneier by Joe MacInnis.