News in the Category "Articles"

Page 9 of 21

Bruce Schneier: There Are Three Big Threats to Cybersecurity—and One Defense

  • Dennis Keohane
  • BetaBoston
  • December 5, 2014

BetaBoston partnered with Silicon Valley Bank, Hack/Reduce, and Terrible Labs on Thursday to host the Cyber Security Symposium. Security experts from Credit Suisse, Threat Stack, Bit9 and others convened for a day-long event, the second niche-focused conference put together by SVB, Atlas Venture’s Cort Johnson and Terrible Labs’ Smith Anderson after the Quantified Self Conference in March.

The event was capped off with a talk by security expert Bruce Schneier, a fellow at the Berkman Center for Internet and Society at Harvard, and the chief technology officer at Co3 Systems…

Video: Surveillance: The Hidden Ways You’re Tracked

Just how much of your life is watched? Security expert Bruce Schneier points out that it is more than most people think, says Chris Baraniuk.

  • Chris Baraniuk
  • BBC
  • October 27, 2014

Watch the Video on BBC.com

Do you have secrets? Security expert Bruce Schneier has little patience for those who say they don’t.

When asked about government and corporate surveillance, there are some who shrug their shoulders and say they have nothing to fear because they have nothing to hide. Schneier’s response? “I ask them their salary and they won’t tell me. I ask them about their sexual fantasy world and they won’t tell me. The whole ‘I have nothing to hide’ thing is stupid, that’s a dumb comment,” he says. What’s more, your day-to-day behaviour is monitored in ways you wouldn’t even realise, so these details and many more could be open for all to see – and use against you. And that’s a problem, even if you happen to trust your government to use the data for good…

"A Motivated, Funded, Skilled Hacker Will Always Get In"—Schneier

It's how you respond that's key, says securo guru

  • John Leyden
  • The Register
  • October 9, 2014

Hacking attacks are more or less inevitable, so organisations need to move on from the protection and detection of attacks towards managing their response to breaches so as to minimise harm, according to security guru Bruce Schneier.

Prevention and detection are necessary, but not sufficient, he said. Improving response means that organisations stay on their feet even after they are hit by a serious security breach or hacking attack.

“A sufficiently motivated, funded and skilled hacker will always get in,” Schneier told delegates during a keynote at the IP Expo conference in London. The security guru added that criminals and hackers are now using the sort of tools and techniques that were once the sole purview of intel agencies…

Internet Turned into "Giant Surveillance Platform" by NSA

  • Ruadhán Mac Cormaic
  • The Irish Times
  • October 6, 2014

The US National Security Agency (NSA) has turned the internet into a “giant surveillance platform,” a leading security specialist has said.

Bruce Schneier, who has written extensively on digital security and privacy, told an audience in Dublin tonight that the revelations by whistleblower Edward Snowden of large-scale surveillance by the NSA showed that we were living in a “golden age of surveillance.”

In a lecture for the human rights group Front Line Defenders, Mr. Schneier said the NSA’s role changed completely after the 9/11 attacks, when US intelligence agencies were given “an impossible mission: never again.” “The only way to ensure something doesn’t happen is to know everything that is happening,” he said…

A Look Back at ‘The State of Incident Response’ by Bruce Schneier

  • Zubair Ashraf
  • Security Intelligence
  • September 24, 2014

In my continuing series of keynote recaps, I will be covering Bruce Schneier’s keynote at Black Hat USA 2014—yes, it can be called a keynote even though it is more of a briefing. By the way, Black Hat: Next time, please give him appropriate space; people were lining up outside the room waiting to get in because of the lack of space.

I will be sharing what I learned from his speech in my own words with selected graphics. Schneier’s “The State of Incident Response” talk is available online, but if you don’t have an hour to watch that, read this as a recap. Hopefully, it will help you take some action or remind you of your New Year’s resolution to improve security. Finally, I hope this serves as a good resource for those starting in the field who are too focused on their day-to-day cyberdefense role to step back and look at the bigger picture…

BlackHat 2014: Incident Response Best Practice & Automation Key to Success—Bruce Schneier

  • Fahmida Y. Rashid
  • Infosecurity Magazine
  • August 11, 2014

Network breaches are inevitable. It’s what happens next that really matters, said renowned cryptographic expert Bruce Schneier during the Black Hat security conference.

If there is something the organization has the attacker wants, the attacker will figure out a way to get in. Regardless of how much the organization invests in its defenses, attackers need to find that one weak spot to succeed. This is why incident response—being able to detect an incident had occurred, and then being able to respond effectively to remediate the incident—is so critical…

Incident Response: Beyond the Breach

Bruce Schneier on Expanding the Use of Automated Tools

  • Eric Chabrow
  • InfoRisk Today
  • August 8, 2014

When the organizers of the just-concluded Black Hat USA conference wanted to explore incident response, they turned to Bruce Schneier, the cryptographer, author, blogger and cybersecurity expert, to make a presentation. Until recently, however, Schneier’s name wouldn’t be on most people’s list of incident response experts.

Schneier’s reputation, after all, was built on his keen observations of the influence of IT security on society and vice versa, as well as bringing to light the previously unknown, such as the National Security Agency’s tampering with cryptography guidance from the National Institute of Standards and Technology (see …

Black Hat: Bruce Schneier Talks Incident Response, Trends

  • Adam Greenberg
  • SC Magazine
  • August 7, 2014

In his Black Hat 2014 session entitled “The State of Incident Response,” security guru Bruce Schneier, CTO of Co3 Systems, Inc., said that hackers will invariably breach networks, but it is what comes next that really matters.

Placing a great deal of emphasis on automated systems and technology being used to support the people needed for incident response, Schneier proposed a four-step approach: observe, context, decide, and act.

Observe means knowing what is happening on networks in real-time, which can be done using log monitoring, log analysis tools, network management tools and the like, Schneier said…

Bruce Schneier: Web Attackers Are Trouncing Defenders

  • Dan Worth
  • V3.co.uk
  • June 5, 2014

Cyber defenders are currently fighting a losing battle against hackers and government agencies, according to security expert Bruce Schneier.

Speaking in London on Thursday, the security guru said that with cyber criminals’ attacks increasing in sophistication all the time, incidents like the Target credit card theft will only become more common.

“Security is a battle of attack versus defence and right now on the internet attack is much easier than defence,” he said at the Good Exchange event, attended by V3.

Schneier pointed to advanced persistent threats (APT) as an area where organisations are woefully ill-prepared to prevent attacks…

How to Create a Safer Password

A short password, or one using a name or a word in a dictionary, can be easily cracked by computers. And simply adding "@" for the letter "a" isn't going to fool the bad guys.

  • Susie Poppick
  • Money Magazine
  • April 14, 2014

Here’s cryptographer and computer security expert Bruce Schneier’s advice on using and managing your passwords.

1. Use a “passphrase”: a sentence you can remember. Then replace each word of the phrase with its initial, a similar digit or symbol, or, at random, use a whole word.

For example:

MY DOG NATE WOOFS AND RUNS IN HIS SLEEP

m d N8 w @ r ! h s

The new password is mdN8w@r!hs. (Don’t use this one, though.)

2. That may still be tough to remember. If you need to, write a reminder and hide the paper somewhere safe. But write the phrase or a hint, not the password…

1 7 8 9 10 11 21

Sidebar photo of Bruce Schneier by Joe MacInnis.