News in the Category "Type"
Page 30 of 96
Audio: Reflecting on 2016: The Year in Cybersecurity
Listen to the Audio on WBUR.org
On Tuesday, President-elect Donald Trump named cyber expert Tom Bossert as his homeland security adviser.
Bossert is currently a fellow at the Atlantic Council and was a former national security aide to President George W. Bush.
He says cybersecurity will be one a top priority in his new job.
And if the events of 2016 say anything, Bossert will likely have a lot on his plate.
Joining the show to remember some of the top cybersecurity issues in the news this year, including the Democratic National Committee Hack, the “Internet Of Things” malware attack and more, is Harvard Berkman fellow and security expert Bruce Schneier…
Video: Cybersecurity Expert Bruce Schneier: American Elections Will Be Hacked
“American Elections Will Be Hacked.” That’s the title of a recent article in The New York Times by our next guest, the leading cybersecurity and privacy researcher Bruce Schneier. Schneier warns, “Our newly computerized voting systems are vulnerable to attack by both individual hackers and government-sponsored cyberwarriors. It is only a matter of time before such an attack happens.”
What Bruce Schneier Teaches Us about IoT and Cybersecurity
As if I haven’t said it a million times, IoT security is critical.
But just when I thought I had it all figured out, somebody comes along and sheds new light on this very important topic in a different way.
At a November 16 hearing held by the Congress Committee on Energy and Commerce in light of the devastating October 21 Dyn DDoS attack, famous cryptologist and computer security expert Bruce Schneier offered a new perspective on IoT security, which makes it easier for everyone to understand the criticality of the issue.
After watching it at least three times, I decided to share the main concepts with the readers of TechTalks. Here are the key takeaways, which I’ve taken the pain to elaborate on…
Security Experts Call For Regulation On IoT Cybersecurity
During a House Committee hearing today, Bruce Schneier also asks for the establishment of a new government agency devoted to cybersecurity.
Security experts asked lawmakers for more action, today, during a Congressional hearing on IoT security. On their wishlist: consequences to manufacturers for delivering insecure products, a federally funded independent lab for pre-market cybersecurity testing, and an entirely new federal agency devoted to cybersecurity.
The hearing, “Understanding the Role of Connected Devices in Recent Attacks,” was held by the US House Committee on Energy and Commerce, with expert witnesses Dale Drew, senior vice president and chief security officer of Level 3 Communications; Dr. Kevin Fu, CEO of Virta Labs and associated professor of electrical engineering and computer science at the University of Michigan; and Bruce Schneier, fellow of the Berkman Klein Center at Harvard University…
Not a Matter of ‘If’ on IoT Cybersecurity Rules, Experts Say
Computer security experts on Wednesday pressed for comprehensive federal regulations mandating strong security protocols for the Internet of Things, saying it’s not a matter of if but when rules are issued for connected devices.
“The Internet of Things affects the world in a directly physical manner—cars, appliances, thermostat, airplanes,” said Bruce Schneier, a computer security expert at Harvard University, during testimony at a hearing held by two House Energy and Commerce subcommittees. “There’s real risk to life and property. There’s real, catastrophic risks.”…
Audio: Can the American Election Be Hacked?
Listen to the Audio on Economist.com
In the second episode of Economist Radio specials running up to the presidential election, security expert Bruce Schneier examines vulnerabilities in electoral voting systems.
Hacking: What Journalists Need to Know. A Conversation with Bruce Schneier
The hacking of Democratic Party organizations has made internet security germane to the 2016 presidential election campaign. America’s intelligence community has accused high-level Russian officials of backing these cyberattacks in an attempt to influence the election result. Such allegations have helped thrust relations between Washington and Moscow to their lowest point in decades.
Meanwhile, the integrity of America’s internet infrastructure was tested on Oct. 21, 2016 with a distributed denial of service (DDoS) attack.
Journalist’s Resource spoke with security expert Bruce Schneier about the attacks and what journalists need to know. The interview, conducted by email while Schneier was traveling, has been edited for length…
Video: Can You Hack an Election? Can You Stop Terrorism by Spying?
Bruce Schneier joined David Pakman to discuss computer security in relation to politics and election mechanics.
Bruce Schneier—Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
One of the most striking paradoxes of our time resides in our smartphones. Our everyday use of these iconic and progressively factotum apparatuses records at various levels every activity we do in space and time, with the unbelievable outcome that, on a mass scale, we’re happy about that and willfully give up our intimate privacy to be allowed to continue using them. It’s nothing new, but we’re still turning our head to what is behind. There are battles going on to conquer the most strategic parts of the big data we produce, in the huge business called “DaaS” (data as a service). Data and Goliath is a book about these battles, written by an acknowledged security expert, who has not given up on opposing the total surveillance paradigm. He thoughtfully couples a lucid analysis deducted from plenty of facts and sources with suggestions. Schneier’s privacy advocacy clarifies the overwhelming confusion in the current post-Snowden revelation period, sorting out the wrong approach to national securities and the inflated scale of control. His passionate approach doesn’t prevent him from imagining alternative scenarios, where new types of business models replace the current privacy in exchange for free services model. On the other side, an important part of the book is dedicated to advice, from breaking up the NSA into more specialized agencies, to teaching users why they need to stop sharing so much personal and intimate details and how. Being encouraged by a major expert in the field is the best argument for privacy one can ask for…
« Quelqu’un Apprend à Détruire Internet », Selon Bruce Schneier
Pour l’écrivain et expert en cybersécurité et en cryptographie Bruce Schneier, « quelqu’un est en train d’apprendre à détruire Internet », comme il le titre dans son dernier article de blog. L’actuel directeur de la technologie de Resilient, une société d’IBM, affirme que des attaques particulières visent des acteurs majeurs du web depuis déjà deux ans.
Bruce Schneier est une sommité en ce qui concerne la sécurité informatique. L’auteur du mythique livre « Applied Cryptograhy » tient depuis 2004 un blog très fréquenté dans lequel, ce mardi 13 septembre, il a publié …
Sidebar photo of Bruce Schneier by Joe MacInnis.