News in the Category "Type"

Page 17 of 96

Video: The Most Consequential Cyber-Attack in History Just Happened. What Now?

  • LA Times
  • December 24, 2020

Watch the Video on LATimes.com

The recently revealed hack of government networks, believed to have been conducted by Russia, is a historic act of espionage and revealed severe leaks in the U.S.’s cyberdefense, says cryptographer and security expert Bruce Schneier.

Video: AshbrookLIVE #14 – Bruce Schneier

  • AshbrookLIVE
  • December 24, 2020

Watch the Video on YouTube.com

A Vast Cyberattack on the USA: Russian hackers put the US federal government at “grave risk”. The Fortune 500 too. Cyber master Bruce Schneier lays out the depth of the debacle.

Audio: Full Disclosure with Bruce Schneier

  • BarCode
  • December 20, 2020

Listen to the Audio on TheBarCodePodcast.com

Internationally renowned security guru, privacy specialist and author, Bruce Schneier, stops by BarCode to discuss the FireEye Hack, Covid-19 Vaccine Cold Chain Attacks, CISA, and Net Neutrality. Host Chris Glanden is joined by special guest co-host Alex, and Tony the Bartender explains his theorem for a “Blitzen”.

Audio: How Your Digital Footprint Makes You the Product

  • TechSequences
  • December 16, 2020

Listen to the Audio on TechSequences.org

You have probably heard the saying: “If you are not paying for the product, you ARE the product”. Nowhere is this more acute than on the internet when our personal data is collected, analyzed and used to persuade us to buy products or ideas, many times without our explicit knowledge or permission. Our guest Bruce Schneier, a renowned security technologist, author and Berkman Klein Center fellow at Harvard has said: “On the internet data is power, to the extent the powerless have access to it, they gain in power, to the extent the already powerful have access to it, they further consolidate their power.”…

Video: Hack in the Box Security Conference Keynote Interview

  • Hack In The Box Security Conference
  • December 3, 2020

Watch the Video on YouTube.com

For this keynote, Bruce gave attendees the chance to pick his brain and have him answer their burning questions live. Bruce chose 10 of the questions to answer on the future of our ever changing cyber security landscape.

Video: Election Security: Securing the Vote While Securing the System

  • The Legal Edition
  • November 19, 2020

Discussion on how voting machines are inherently vulnerable—what can and should be done to make them safer—to adhere to the ‘Gold Standard’ of paper ballots used in many states across the US in this election. Further discussion on hacking, audits and International bad actors trying to infiltrate state election databases as well as old voting machines that are vulnerable to attack and manipulation. An open and frank discussion with a ‘security guru’ with decades of experience on how we can keep America’s democratic process of voting safe and secure. …

#ISC2Congress: Modern Security Pros Are Much More than Technologists, Says Bruce Schneier

  • Michael Hill
  • Infosecurity
  • November 18, 2020

Speaking in the opening keynote of the virtual (ISC)2 Security Congress, renowned security technologist and best-selling author Bruce Schneier discussed the public-interest aspects of technology.

In particular, he explored the ethics of data privacy and security, whilst also outlining how today’s cybersecurity professionals are more than technologists; the work they do affects society as a whole.

“In cybersecurity, government access to encrypted communications has been the subject of a 25-year long debate. On the one side, there are police claiming they are going dark and need access to encrypted data in order to solve crimes. On the other side, security experts say it is impossible to provide that access without making systems insecure.”…

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World (Review)

  • Christopher Hickernell
  • Core Defenses LLC
  • November 7, 2020

Data and Goliath by Bruce Schneier is an eye-opening look into the secret operations of our country’s surveillance operations.  Through his analysis of the classified information leaked by former CIA contractor, Edward Snowden, Bruce breaks down the impacts that mass surveillance is having on society.  He brings immense insights into how government and societies need to rectify the power imbalance and work to restore privacy and trust.  While many of Bruce’s recommendations involve broad, overarching changes to legislation, there are several principles that security professionals can adopt to do our part—such as building resilience into our systems and processes; fixing vulnerabilities; upholding trust; and not subverting products or standards…

Audio: Ballot Question 1: Risks & Regulations Regarding Right to Repair

  • Pioneer Institute
  • October 13, 2020

Listen to the Audio on PioneerInstitute.org

Join Hubwonk host Joe Selvaggi and security technologist Bruce Schneier as they discuss risks associated with car telematics as well as how best to ensure public safety in the future of the internet of everything.

Audio: We Live in a Security and Privacy World that Science Fiction Didn’t Predict

  • OWASP PDX Podcast
  • October 4, 2020

Listen to the Audio on BuzzSprout.com

Bruce Schneier was interviewed by David Quisenberry and John L. Whiteman on the podcast of the Open Web Application Security Project’s Portland, Oregon chapter.

1 15 16 17 18 19 96

Sidebar photo of Bruce Schneier by Joe MacInnis.