News in the Category "Type"
Page 33 of 96
Video: Overcoming the Cyber Security Skills Gap: Ask Bruce, Episode Eight
A shortage of skilled cyber security employees is one of the most significant challenges organizations face today.
In this video, Resilient CTO Bruce Schneier explains the cyber security skills gap, and outlines steps to help organizations overcome it.
Q&A: Bruce Schneier on Joining IBM, IoT Woes, and Apple v. the FBI
It's going to get worse before it gets better
Security guru Bruce Schneier is a regular at shows like RSA and his talks are usually standing-room-only affairs.
Schneier has written some of the definitive texts for modern cryptography teaching and his current book, Data and Goliath, examines the perils and solutions to government and corporate surveillance of internet users. The Register sat down with him to talk over the news of the day, and to get an idea of where the security industry is going.
Q: First things first—you’re the CTO of Resilient Systems, which IBM is in the process of buying…
Bruce Schneier: We're Sleepwalking towards Digital Disaster and Are Too Dumb to Stop
Coders and tech bros playing chance with the future
Security guru Bruce Schneier has issued a stark warning to the RSA 2016 conference—get smart or face a whole world of trouble.
The level of interconnectedness of the world’s technology is increasing daily, he said, and is becoming a world-sized web—which he acknowledged was a horrible term—made up of sensors, distributed computers, cloud systems, mobile, and autonomous data processing units. And no one is quite sure where it is all heading.
“The world-sized web will change everything,” he said. “It will cause more real-world consequences, has fewer off switches, and gives more power to the powerful. It’s less being designed than created and it’s coming with no forethought or planning. And most people are unaware that it’s coming.”…
Bruce Schneier on IBM Grabbing Him Up with Resilient Systems
Bruce Schneier chats with SearchSecurity during lunch at RSAC about IBM's plans to acquire Resilient Systems to complete their security offering.
RSA Conference is a place to meet and greet anyone involved in security these days, proved by a chance encounter with Bruce Schneier during lunch on Tuesday in the press room. And few individuals had news as big as Schneier, with the announcement yesterday that IBM would acquire Resilient Systems, the company where he serves as CTO.
“For the company, it’s fantastic; they have this whole big security strategy and you can see a big hole where we belong, and they see that,” Schneier told SearchSecurity while we waited for lunch to be rolled out…
Video: Building a Security Culture: Ask Bruce, Episode Seven
Business leaders and IT security professionals don’t always see eye to eye—and that creates risk.
In this video, Resilient Systems CTO Bruce Schneier outlines ways for business and security leaders to build trust and create a security-focused organizational culture.
Video: How to Prevent the Normalization of Deviance: Ask Bruce, Episode Six
Without proper controls, minor—yet insecure—behaviors can become accepted habits at organizations. And that can lead to major security risks.
In this video, Resilient CTO Bruce Schneier explains how security leaders can spot insecure practices, and stop them from taking hold at their organization.
Study Finds That Anti-Crypto Laws Won't Work on an International Stage
A new report shows that anti-crypto laws wouldn't change a thing, as criminals would simply look globally
In response to attempts to put restrictions on encryption technology, a new report surveys 546 encryption products in 54 countries outside the United States, out of 865 hardware and software products total.
The report demonstrates that encryption technology is very international in nature and that it is impossible for local regulations to have any effect on it, said Bruce Schneier, a fellow at the Berkman Center for Internet and Society at Harvard University,
“The cat is out of the bag,” he said. “It is an international world. All the research is international and has been for decades. All the conferences are international and have been for decades.”…
Review: Data and Goliath
Hi everyone,
Political views aside, it is important to be aware of the fact that what we post online has a footprint. This is something I always tell my daughters and the younger generations. After reading “Data and Goliath” by Bruce Schneier, it is clear why corporate and government surveillance is on the rise—but more importantly the book is a good resource for learning how to protect your privacy online, if you so choose.
One story that this book reminded me of is from a few years back. The premise of the story being that targeted advertising from this teen girl’s online behavior figured out that she was pregnant before her dad did. Here’s an excerpt of the New York Times article:…
Most Encryption Products Far beyond Reach of US Law Enforcement
Anyone seeking to keep their data hidden could use hundreds of encryption services offered by companies outside the US if Washington compels tech companies to decrypt communications.
If Washington forces American tech companies to give law enforcement access to encrypted communication, it might not provide the advantage investigators want when tracking terrorists or criminals.
Companies outside the US are responsible for nearly two-thirds of tech products that offer some form of encryption, according to a study released Thursday from renowned cryptographer Bruce Schneier. Because those firms are beyond the reach of US laws, he said, anyone who wants to avoid American intelligence agencies or police eavesdropping could simply switch to another secure platform…
Backdoor Laws Can't Contain Global Encryption, Says New Report
In recent months, the FBI has been pushing for stronger US restrictions on encryption—but a new report from Harvard’s Berkman Center suggests such laws reach only a small portion of the relevant products. Taking a census of 865 different encryption products from around the world, the report finds that roughly two-thirds are produced and distributed overseas, outside the jurisdiction of US law. Germany was the biggest source of non-US crypto, with 112 separate products either for sale or available free. Just over a third of the foreign products make their code available as open source…
Sidebar photo of Bruce Schneier by Joe MacInnis.