News Tagged "SC Magazine"

Page 1 of 1

Reboot 25: Industry Pioneers

  • Danielle Walker
  • SC Magazine
  • December 8, 2014

Excerpt

According to Bruce Schneier, his career in IT security has been an endeavor he naturally “flowed into.” Schneier, a prominent cryptologist who developed numerous encryption algorithms, including Blowfish and Twofish, has continued to contribute to the industry through his musings and insight on his esteemed blog “Schneier on Security,” and newsletter “Crypto-Gram,” which have garnered a major following in the community. Having gotten his start in cryptography, Schneier says he eventually moved into computer security, network security and security technology as a focus. In his attempt to “understand context” as it pertains to the threat landscape, Schneier also turned to examining the economics, psychology and sociology of security and now he primarily studies and shares his views on the political science of security, he tells …

Black Hat: Bruce Schneier Talks Incident Response, Trends

  • Adam Greenberg
  • SC Magazine
  • August 7, 2014

In his Black Hat 2014 session entitled “The State of Incident Response,” security guru Bruce Schneier, CTO of Co3 Systems, Inc., said that hackers will invariably breach networks, but it is what comes next that really matters.

Placing a great deal of emphasis on automated systems and technology being used to support the people needed for incident response, Schneier proposed a four-step approach: observe, context, decide, and act.

Observe means knowing what is happening on networks in real-time, which can be done using log monitoring, log analysis tools, network management tools and the like, Schneier said…

RSA 2014: Bruce Schneier Champions Encryption in 'Golden Age' of Government Surveillance

Cryptography expert Bruce Schneier, now CTO of Co3 Systems, continued his criticism of the National Security Agency's surveillance during his well-attended talk at the RSA Conference in San Francisco today.

  • Doug Drinkwater
  • SC Magazine
  • February 25, 2014

Schneier has been a fierce critic of the National Security Agency (NSA) ever since the details of this surveillance were first revealed by former CIA contractor Edward Snowden last summer. And following on from an interview with CNN this week where he argued for the NSA to be split up, he took the opportunity to champion for stronger encryption in front of a packed audience at the RSA Conference.

Schneier, who left BT—also reportedly offering back doors in products—to join Co3 Systems in December, mused from the beginning that the talk was going to be a prickly and hotly-contested subject. “This will be a fun topic.”…

RSA Conference: Governments Trying to "Seize Control" of the Internet

  • Asavin Wattanajantra
  • SC Magazine
  • October 11, 2012

A famed computer security expert believes governments are trying to seize control of the internet, but will fail in the long term to reach that goal.

Bruce Schneier, BT’s chief technology officer and author of several important books on security, said that governments that didn’t understand the internet were trying to take control of it. He looked at US proposals of creating an ‘internet kill-switch’, claiming that policy makers were crazy to even think of a single mechanism to shut-off all internet traffic.

He said: “You see these types of government proposals, and they come from law enforcement, lobbyists or the military, and we’re going to see more of those. Short-term we’re going to see a bunch of years where governments are going to seize more control over this dangerous ‘anarchistic net’ and rein it back in.”…

The Top 5 Influential IT Security Thinkers

  • SC Magazine
  • December 15, 2005

Excerpt

The seemingly constant industry buzz surrounding Schneier is well-deserved. With a trail of bestselling books in his wake and two encryption algorithms, Blowfish and Twofish, to his credit, Schneier is well-placed to discuss/argue various IT security-related issues in his free monthly newsletter Crypto-Gram. Most recently, he questioned reported comments made by Howard Schmidt that noted Schmidt’s support for holding programmers personally accountable for insecure code. These published accounts, which sometimes seem to allude to personal liability, are inaccurate, Schmidt says. He notes that his comments were made “in the context of how [programmers’] ability to write secure code should be a part of performance reviews.” Schneier says, however, “It is the software manufacturers that should be held liable” for insecure code. Although the additional costs for making products more secure would fall to consumers, he says securer solutions would prove cost-effective in the long run since users already pay more than they bargained for to fix holes of products they have deployed…

Sidebar photo of Bruce Schneier by Joe MacInnis.