News in the Category “Recorded Interviews”

This Is Your Brain on Terrorism

Why sensationalized terrorism coverage makes us overreact to risk.

  • Carlos Maza
  • Vox
  • March 20, 2017

For most Americans, terrorism is only ever experienced through a television screen or front page of a newspaper. Despite generating massive headlines, terrorism kills a shockingly small number of Americans every year, especially when compared to a problem like gun violence. In terms of the public's attention, terrorism takes up a lot more space than its death toll warrants.

But for cable news networks, terrorism coverage is big business.

Read More →

Bruce Schneier on New Security Threats from the Internet of Things

  • Amber Ankerholz
  • Linux.com
  • March 17, 2017

Security expert Bruce Schneier says we're creating an Internet that senses, thinks, and acts, which is is the classic definition of a robot. "I contend that we're building a world-sized robot without even realizing it," he said recently at the Open Source Leadership Summit (OSLS).

In his talk, Schneier explained this idea of a world-sized robot, created out of the Internet, that has no single consciousness, no single goal, and no single creator. You can think of it, he says, as an Internet that affects the world in a direct physical manner.

Read More →

3 Important Things to Know about Big Brother Watching Us

  • Kristina Guerrero and Cassarah Coffey
  • The List
  • March 15, 2017

Watch the Video on TheListTV.com

WikiLeaks may have exposed the CIA's ability to hack into phones, televisions, cars—pretty much everything, but according to internationally renowned security technologist and author Bruce Schneier, it isn't the intelligence agencies you should be worried about. He's more concerned that these technologies have been around for decades. Bruce is sharing three things to be concerned about with Kristina Guerrero.

1.

Read More →

Bruce Schneier on IoT Regulation

  • Chris Brook
  • Threatpost
  • March 6, 2017

Mike Mimoso talks to Bruce Schneier, CTO of IBM Resilient, at RSA 2017 about the early days of the conference, his campaign for IoT regulation, and how the technical community needs to get involved with policy.

Listen to the Audio on Threatpost.com

Read More →

Bruce Schneier and the Call for "Public Service Technologists"

  • Network World
  • February 23, 2017

At RSA 2017, Bruce Schneier spoke with Network World on the increasing importance of technologists' presence in education and policy-making.

Watch the Video on CIO.com

Read More →

Reflecting on 2016: The Year in Cybersecurity

  • Radio Boston
  • December 27, 2016

On Tuesday, President-elect Donald Trump named cyber expert Tom Bossert as his homeland security adviser.

Bossert is currently a fellow at the Atlantic Council and was a former national security aide to President George W. Bush.

He says cybersecurity will be one a top priority in his new job.

And if the events of 2016 say anything, Bossert will likely have a lot on his plate.

Read More →

Cybersecurity Expert Bruce Schneier: American Elections Will Be Hacked

  • Democracy Now
  • November 30, 2016

"American Elections Will Be Hacked." That’s the title of a recent article in The New York Times by our next guest, the leading cybersecurity and privacy researcher Bruce Schneier. Schneier warns, "Our newly computerized voting systems are vulnerable to attack by both individual hackers and government-sponsored cyberwarriors. It is only a matter of time before such an attack happens."

Watch the Video on DemocracyNow.org

Read More →

Can the American Election Be Hacked?

  • The Economist
  • October 26, 2016

In the second episode of Economist Radio specials running up to the presidential election, security expert Bruce Schneier examines vulnerabilities in electoral voting systems.

Listen to the Audio on Economist.com

Read More →

Can You Hack an Election? Can You Stop Terrorism by Spying?

  • David Pakman Show
  • October 15, 2016

Bruce Schneier joined David Pakman to discuss computer security in relation to politics and election mechanics.

Watch the video on YouTube.com

Read More →

After The DNC Hack, What's Stopping Russian Hackers From Accessing Voting Machines?

  • Tori Bedford
  • Boston Public Radio
  • August 4, 2016

Just before the start of the Democratic National Convention, top-secret emails from the Democratic National Committee were published on whistleblower website Wikileaks, in a major operation the FBI attributed to Russian hackers.

Some U.S. officials have raised subsequent questions: Were the hackers deliberately attempting to influence the election in favor of Donald Trump? Did Trump have any influence?

Read More →

RSA Conference Asia Pacific & Japan 2016 Interview

  • RSA Conference
  • August 1, 2016

Linda Gray, General Manager of the RSA Conference, speaks with Bruce Schneier on the topic of his keynote, "Security in the World-Sized Web," at RSA Conference 2016 Singapore.

Watch the Video on RSAConference.com

Read More →

Securing the World-Sized Web

Bruce Schneier on How IoT Changes Everything in Security

  • Geetha Nandikotkur
  • InfoRisk Today
  • July 22, 2016

Bruce Schneier, CTO at the security firm Resilient Systems, is busy examining how IoT - the name given to the computerization of everything in our lives - is changing the security world.

From sensors that collect data about our environment to databases in the cloud to analytics that help us make use of data, the Internet of Things is capable of changing our physical world.

"We're building an internet that senses, thinks and acts, but doesn't have a body, and that is the textbook definition of a robot," Schneier says. "What I want to propose is that we're building a world-sized robot, and we don't even realize it.

Read More →

Adam Ruins Everything: Security and Big Data with Bruce Schneier

  • Adam Ruins Everything
  • July 5, 2016

Adam is joined by Bruce Schneier to talk about current problems facing the TSA, gun control, and how data and security intersect.

One of the topics that resonated deeply with last season's Adam Ruins Everything viewers was Bruce Schneier's take on security and "security theater". So we had to bring Bruce on the podcast. Bruce is a brilliant cryptographer and security expert, who's written countless articles and academic papers and published 13 books, including Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World.

Read More →

Going Dark or Getting Personal? The Battle Between Data, Privacy & Intrusion

  • The Legal Edition
  • June 25, 2016

Bruce Schneier and attorney David O'Brien discuss the new report issued by the Berkman Center for Internet & Society at Harvard University on the issue of “Going Dark,” and the role of law enforcement and privacy rights under scrutiny, revelations of government spying, and analysis of the Apple iPhone Encryption litigation and its progeny unfolding in the Federal Courts.

Watch the Video on YouTube.com

Read More →

Internet of Things Security: Ask Bruce, Episode Nine

  • ResilienTV
  • May 9, 2016

The Internet of Things (IoT) is ushering in a new age of hyperconnectivity – and new cyber security challenges.

In this video, Resilient CTO Bruce Schneier explains how the Internet of Things raises the stakes in cyber security, and explores how organizations will need to battle these new challenges.

Watch the Video on ResilientSystems.com

Read More →

Bruce Schneier: Building Cryptographic Systems

Security expert Bruce Schneier discusses security from the perspectives of both the National Security Agency and the National Institution of Standards and Technology.

  • Charles Severance
  • Computer
  • April 2016

Since the 1930s at Bletchley Park, there has been a continuous arms race to both improve and break cryptography. The files leaked by National Security Agency (NSA) contractor Edward Snowden made it clear that governments regularly gather data on average citizens, which makes us wonder if privacy is even possible. Do our carefully designed cryptographic systems protect our information as we expect them to, or are they just thin veils that can easily be pierced by the government? I posed these questions to leading security expert Bruce Schneier.

Read More →

Bruce Schneier on the Integration of Privacy and Security

  • Chris Brook
  • Threatpost
  • March 23, 2016

Threatpost Editor in Chief Mike Mimoso talks to crypto pioneer and security expert Bruce Schneier of Resilient Systems about the early days of the RSA Conference, the integration of privacy and security, and the current FBI-Apple debate over encryption and surveillance.

Watch the Video on Threatpost.com

Read More →

Reacting Fast is Not Enough (RSA 2016)

  • David Spark
  • CloudPassage
  • March 17, 2016

"Companies go to the cloud not because the security person tells them to. They go to the cloud because the business person tells them to. Because the economics of doing it is so compelling and the security person has to manage," said Bruce Schneier (@schneierblog), CTO, Resilient Systems, in our conversation at the RSA 2016 Conference in San Francisco.

Computing is embedded in everything we do, such as cars and planes, said Schneier.

Read More →

RSA 2016 Interview with Bruce Schneier

  • ITProTV
  • March 15, 2016

At RSA 2016, ITProTV asked Bruce Schneier about his views on the security risks of the Internet of Things.

Watch the Video on Youtube.com

Read More →

Overcoming the Cyber Security Skills Gap: Ask Bruce, Episode Eight

  • ResilienTV
  • March 11, 2016

A shortage of skilled cyber security employees is one of the most significant challenges organizations face today.

In this video, Resilient CTO Bruce Schneier explains the cyber security skills gap, and outlines steps to help organizations overcome it.

Watch the Video on ResilientSystems.com

Read More →

Building a Security Culture: Ask Bruce, Episode Seven

  • ResilienTV
  • February 25, 2016

Business leaders and IT security professionals don't always see eye to eye—and that creates risk.

In this video, Resilient Systems CTO Bruce Schneier outlines ways for business and security leaders to build trust and create a security-focused organizational culture.

Watch the Video on ResilientSystems.com

Read More →

How to Prevent the Normalization of Deviance: Ask Bruce, Episode Six

  • ResilienTV
  • February 18, 2016

Without proper controls, minor—yet insecure—behaviors can become accepted habits at organizations. And that can lead to major security risks.

In this video, Resilient CTO Bruce Schneier explains how security leaders can spot insecure practices, and stop them from taking hold at their organization.

Watch the Video on ResilientSystems.com

Read More →

Incident Response Orchestration: Ask Bruce, Episode Five

  • ResilienTV
  • February 3, 2016

Organizations are overwhelmed with security alerts—far more than they can reasonably manage. Incident response orchestration and automation can go a long way in helping teams resolve security events faster and more effectively.

Watch the Video on ResilientSystems.com

Read More →

The Security Mindset

  • Computer
  • February 3, 2016

Security guru Bruce Schneier talks with Charles Severance about what it takes to think like a security expert.

Watch the Video on YouTube.com

Read More →

Bruce Schneier on the Golden Age of Surveillance

  • Mo Lotman
  • The Technoskeptic
  • December 22, 2015

Internet security expert, privacy advocate, and author Bruce Schneier speaks with the Technoskeptic about the public-private surveillance partnership that monitors everything we do, and what needs to happen in order to restore our privacy.

Listen to the Audio on TheTechnoskeptic.com

Read More →

Making Your Mark as a CISO: Ask Bruce, Episode Four

  • ResilienTV
  • November 20, 2015

Being a CISO is often a tenuous, highly political job—and for security matters, the buck stops with you. In this interview, Bruce Schneier offers strategies for making your mark on your organization.

Watch the Video on ResilientSystems.com

Read More →

Today’s Trends in Cyber Resilience: Ask Bruce, Episode Three

  • ResilienTV
  • November 2, 2015

"Cyber resilience" has emerged as the standard cybersecurity teams are striving for. Resilient Systems CTO and security expert Bruce Schneier explains what's driving cyber resilience, and offers steps and strategies for improving cyberattack preparedness and resilience.

Watch the Video on ResilientSystems.com

Read More →

A Conversation with Bruce Schneier

  • CyberSeed 2015
  • October 29, 2015

Bruce Schneier spoke at CyberSeed 2015: Emerging Cybersecurity Trends in Cloud, IoT and Mobility.

Watch the Video on YouTube

Read More →

Incident Response and the Rise of Organizational Doxing: Ask Bruce, Episode Two

  • ResilienTV
  • October 13, 2015

In the wake of the cyberattacks on Sony and Ashley Madison, it's clear that organizational doxing—the act of hacking into a business and releasing private information like executive and employee emails or salary information —is a rising threat for businesses.

Resilient Systems CTO and security expert Bruce Schneier explores the trend and how security teams can prepare for a doxing attack.

Watch the Video on ResilientSystems.com

Read More →

Automation in Incident Response: Ask Bruce, Episode One

  • ResilienTV
  • October 8, 2015

Resilient Systems CTO and security expert Bruce Schneier explores how security pros can intelligently leverage automation to empower incident response teams to mitigate cyberattacks faster and more effectively.

Watch the Video on ResilientSystems.com

Read More →

How Big Brother Snuck Up On Us

  • Jane Karowski
  • The Social Network Station
  • September 7, 2015

Listen to the Audio on TheSocialNetworkStation.com

Show Recap

The episode in brief:

  • Bruce Schneier talks about privacy and security
  • His new book Data and Goliath
  • The hidden battles to collect your data and control your world
  • The nonsense of data vs. metadata
  • Why privacy is not a changeable social norm
  • The harm ubiquitous mass surveillance does to our society
  • TheSocialNetworkStation.com/shows/the-social-network-show/

Astute regular listeners may have observed that Dr. J is becoming more and more intrigued with the related issues of privacy and security. These apply to online and mobile phone technology. Both are thoroughly involved in communicating with your social networks.

Read More →

Security and Privacy with Bruce Schneier

  • Software Engineering Daily
  • September 3, 2015

“What we learn again and again is that security is less about what you think of, and more about what you didn’t think of.”

Questions

  • In Data and Goliath, what are the motives of different goliaths?
  • Why is the Ashley Madison case a watershed moment in security?
  • Do you still feel we should break up the NSA?
  • Will Google and Amazon become military contractors?
  • How can we defend ourselves from DOS attacks from refrigerators?
  • When we put processors in refrigerators, and cars, and thermostats, are we increasing the attack surface, and our vulnerabilities faster than we are improving our utility?

Listen to the Audio on SoftwareEngineeringDaily.com

Read More →

Private Thoughts – Bruce Schneier on the Ephemeral, Privacy, and Data

  • Bruce Schneier
  • Restore the Fourth
  • August 18, 2015

Private Thoughts sat down with Bruce Schneier at the Electronic Frontier Foundation’s 25th anniversary party in July. Schneier is an internationally renowned security technologist and author of 13 books. He discussed the effects of the loss of ephemeral communication and the ease of data collection and storage.

Watch the Video on RestoreTheFourthSF.com

Read More →

Bruce Schneier on Security Metrics that Matter

  • David Spark
  • Tenable Blog
  • August 10, 2015

"I like to measure the performance of the team," said Bruce Schneier (@schneierblog), CTO of Resilient Systems, Inc., in our conversation at the 2015 Black Hat Conference in Las Vegas. "I like to see metrics about people, about process, about technology. There isn't one metric that works since it's such a complicated and moving target... Right now companies have to use the data that they have to figure out if their teams are effective."

Schneier feels that certain metrics, such as blocked attacks, don't really provide a gauge of how secure you are.

Read More →

Bruce Schneier on Jeep Hack and Encryption

  • Boom Bust
  • August 7, 2015

Boom Bust correspondent Bianca Facchinei sits down with Bruce Schneier – chief technology officer at Resilient Systems, Inc. and fellow at the Berkman Center for Internet and Society at Harvard Law School – at the Black Hat conference in Las Vegas. Bruce gives us his take on the infamous 2014 Jeep Cherokee hack and tells us how government surveillance impacts social movements.

Watch the Video on YouTube

Read More →

How Vulnerable are Airlines to Hackers?

  • Bloomberg Business
  • August 7, 2015

Resilient Systems CTO Bruce Schneier discusses the vulnerability of airlines to hackers with Bloomberg's Emily Chang at the Def Con hacking convention in Las Vegas.

Watch the Video on Bloomberg.com

Read More →

Cybersecurity: Are We Ever Safe From Hackers?

  • BBC
  • June 8, 2015

The number of cyber attacks happening every year is on the rise. We speak to Bruce Schneier, chief technology officer at the IT company Resilient Systems and a fellow at Harvard's Berkman Center for the Internet and Society, about why it can take months before a company or organisation even realises it is under attack, and why so many are unprepared. Also, Wil van Gemert, deputy director of operations at Europol, tells us what European law enforcers are doing about it. He says it is now possible to buy "malware," or malicious software meaning that anyone can become a cyber criminal.

Read More →

Expert: TSA Airport Security Is "A Lot of Theater"

  • CNN
  • June 2, 2015

The "smart bad guys" figure out how to get around TSA, says security technologist and Harvard Law School fellow Bruce Schneier.

Watch the Video on CNN.com

Read More →

Spy-wear?

  • BBC Tech Tent
  • May 15, 2015

Dr Chris Brauer from Goldsmiths, University of London, on how big brands want to sell us things via wearable devices. Bruce Schneier, security and privacy expert and author of the book "Data and Goliath", warns of the threat of companies and governments misusing data about us. Emily Bell, from the Tow Centre for Digital Journalism, on Verizon's buyout of AOL, and Facebook's instant articles. And Zoe Kleinman spends a night alone in a house full of robots.

Read More →

Stuxnet, Sexism, CEOs and Surveillance

  • Cybersecurity Initiative
  • May 14, 2015

New America's Peter Singer and Passcode's Sara Sorcher chat with Bruce Schneier, prolific author and chief technology officer at Resilient Systems, about the challenges of publicly blaming countries for cyberattacks—and whose job it should be to defend private companies against sophisticated nation-state attacks. They also hear from Nate Fick, the CEO of Endgame, a venture-backed security intelligence software company, about how he's leveraging cybersecurity solutions once produced just for the government into the private sector.

Wired's Kim Zetter, author of Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, joins the panel discussion to talk about how the cyber operation on Iran's nuclear facilities launched a new era of warfare; the vulnerability of US critical infrastructure to Stuxnet-like weapons; and the gender diversity issues bedeviling the cybersecurity industry.

Listen to the Audio on NewAmerica.org

Read More →

Data and Goliath: The Hidden Battles to Capture Your Data and Control Your World

  • Financial Sense Newshour
  • May 8, 2015

Cris Sheridan welcomes Bruce Schneier, Chief Technology Officer at Resilient Systems and author of Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. Bruce writes "we are living in the golden age of surveillance" where almost everything we do is now being tracked and used without our knowledge. Bruce speaks with Cris about how much data we produce, the way corporations are using it, the problems associated with ubiquitous surveillance, and why this is a defining issue of our time.

Listen to the Audio on YouTube.com

Read More →

Schneier v. Baker Puts Mayweather v. Pacquiao in the Shade

  • Steptoe Cyberlaw Podcast
  • May 5, 2015

Episode 65 would be ugly if it weren't so much fun. Our guest is Bruce Schneier, cryptographer, computer science and privacy guru, and author of the best-selling Data and Goliath—a book I annotated every few pages of with the words, "Bruce, you can't possibly really believe this." And that's pretty much how the interview goes, as Bruce and I mix it up over hackbacks, whether everyone but government should be allowed to use Big Data tools, Edward Snowden, whether "mass surveillance" has value in fighting terrorism, and whether damaging cyberattacks are really infrequent and hard to attribute. We disagree mightily—and with civility.

Listen to the Audio on SteptoeCyberblog.com

Read More →

Schneier on Security Resilience

Insights from Security Leader at GISEC Event in Dubai

  • Geetha Nandikotkur
  • InfoRisk Today
  • April 29, 2015

Listen to the Audio on InfoRiskToday.in

In developing markets such as Asia and the Middle East, how can security practitioners best prepare themselves to tackle the rapidly-changing threat landscape? Resilience is the key, says security leader Bruce Schneier.

The way to think about security is a combination of protection, detection and response, says Schneier, a fellow at the Berkman Center for Internet and Society at the Harvard Law School, USA. While there is a lot of prevention and detection technology, response is the missing piece, he says.

Read More →

Schneier: Incident Response Management Key to Surviving a Data Breach

  • SearchSecurity
  • April 27, 2015

SAN FRANCISCO—Between Target, Home Depot, Sony Pictures and many others, 2014 was undeniably the year of the data breach, and companies are finally realizing the likelihood that they could be next.

"Last year was being called the 'year of the breach,'" said Bruce Schneier, CTO of Resilient Systems, formerly Co3 Systems. "Now, you and I know every year [has] been the year of the breach. But last year there were a bunch of really high-profile breaches where the companies involved did a terrible job of responding, that they were actually in chaos and it looked that way."

In this interview, recorded at the 2015 RSA Conference, SearchSecurity editorial director Robert Richardson sat down with Schneier to discuss Resilient Systems' contribution to improving enterprise incident response management in the coming year.

Read More →

Cloud Computing Trade-Offs

  • David Spark
  • Tenable Blog
  • April 24, 2015

"As a business or as an individual you have to make a choice. Should I do this thing—whatever it is—on my computer and on my network or on a cloud computer on a cloud network," asked Bruce Schneier (@schneierblog), CTO of Resilient Systems, Inc., in our conversation at the 2015 RSA Conference in San Francisco.

Whatever you choose, you're going to be making a trade-off. Schneier recommends you first look at who your adversaries are.

Read More →

What Does It Take To Feel Secure?

  • TED Radio Hour (NPR)
  • April 17, 2015

Computer security expert Bruce Schneier says there's a big difference between feeling secure and actually being secure. He explains why we worry about unlikely dangers while ignoring more probable risks.

Listen to the Audio on NPR.org

Transcript

GUY RAZ, HOST:

It's the TED Radio Hour from NPR. I'm Guy Raz. And on the show today, we're exploring ideas about Maslow's hierarchy of human needs, and ranked at number two, security - the second step on the pyramid.

Read More →

The Hidden Struggles to Control Your Data

  • Late Night Live (Australian Broadcasting Corporation)
  • April 14, 2015

Just how much of your life is being watched and tracked? Who has access to all this information and what are they doing with it?

Bruce Schneier, fellow at Harvard Law School, author of Data and Goliath, points out the danger is not only from corporations and governments, but also cybercriminals, when these institutions lose your details.

Listen to the Audio on ABC.net.au

Read More →

Schneier: Turn Data Over to Those With Greatest Data Security Knowledge

  • Boom Bust
  • April 8, 2015

Erin Ade sits down with Bruce Schneier – security expert, author, and fellow at the Berkman Center for Internet and Society at Harvard Law School. Bruce tells us that a cloud service is safer than running your own data center when you are entrusting your data to a provider who understands security better than you do. And for most people this is definitely the case. Bruce also talks to Erin about state actors weakening security standards and about the security of various open source encryption options.

Read More →

Bruce Schneier, Data and Goliath

  • Paul Harris Online
  • March 27, 2015

Bruce Schneier spoke with Paul Harris about his new book, Data and Goliath. Topics include:

  • Are we giving up too much information voluntarily in exchange for free services?
  • What are data brokers gathering about us, who are they selling it to?
  • Are private companies doing enough to shield our data from government?
  • How companies and law enforcement can use your cell phone to know where you’ll be tomorrow.
  • Whether the NSA can process the huge amounts of surveillance info it is gathering on all of us.
  • The war on terror as an excuse to get into anyone’s computer, and its chilling effect on free speech and thought.

Listen to the Audio on PaulHarrisOnline.Blogspot.com

Read More →

Metadata Retention and Privacy

  • 2ser Radio
  • March 23, 2014

Last week the proposed data retention bill passed through the House of Representatives, and is expected to pass through the Senate soon. These laws are set to allow warrantless access to phone calls, sms, social media and internet usage, in the name of tightening our national security.

Disputes and amendments to the bill have focused on confidentiality threats for journalists and whistleblowers, but what effect will data retention have on the average person?

Our host Sam Baran spoke to Bruce Schneier, who is a fellow at Harvard University's Berkman Center for Internet and Society and author of the book Data and Goliath about the ways governments and corporations are storing and using data.

Read More →

Data and Goliath

  • Sunrise on 7 (Australia)
  • March 21, 2015

With Australia’s data retention laws set to pass the Senate, world-leading online security expert Bruce Schneier explains the danger of metadata.

Note: this video may not be viewable outside Australia.

Watch the Video on YouTube

Read More →

ALP Supports Amended Version of Govt's ISP Data Bill

  • Mark Colvin
  • PM (Australian Broadcasting Corporation)
  • March 17, 2015

Listen to the Audio on ABC.net.au

Transcript

MARK COLVIN: The ALP has agreed to support an amended version of the Government's bill to force Internet Service Providers to keep their customers' data for two years.

It'll let government agencies see what we've all been doing on the phone or online.

Bipartisan support means the bill is likely to pass.

The bodies expected to get access range from various police and customs agencies to the Competition watchdog, the ACCC.

Read More →

Personal Data Collection and Your Technology Footprint

  • Radio New Zealand
  • March 16, 2015

How much do you know about what others might know about you, from your use of technology? How do you minimise your online footprint on things you'd rather keep private?

Bruce Schneier is a US technology and security expert, whose latest book is Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, talks to Kathryn Ryan about how much information is being gathered by governments and corporations through our use of phones and computers.

Listen to the Audio on RadioNZ.co.nz

Read More →

Part 2: Bruce Schneier on the Hidden Battles to Collect Your Data and Control Your World

  • Democracy Now!
  • March 13, 2015

Part 2 of our discussion with Bruce Schneier about about the golden age of surveillance and his new book, "Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World."

Watch the Video on DemocracyNow.org

See also: Part 1

Transcript

AMY GOODMAN: This is Democracy Now!, democracynow.org, The War and Peace Report. I'm Amy Goodman, with Juan González. Our guest is Bruce Schneier. He is a leading security technologist.

Read More →

Data and Goliath: Bruce Schneier on the Hidden Battles to Collect Your Data and Control Your World

  • Democracy Now!
  • March 13, 2015

Leading security and privacy researcher Bruce Schneier talks about about the golden age of surveillance and his new book, "Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World." The book chronicles how governments and corporation have built an unprecedented surveillance state. While the leaks of Edward Snowden have shed light on the National Security Agency's surveillance practices, less attention has been paid to other forms of everyday surveillance—license plate readers, facial recognition software, GPS tracking, cellphone metadata and data mining.

Watch the Video on DemocracyNow.org

Transcript

JUAN GONZÁLEZ: We turn now to look at what our next guest calls the "golden age of surveillance." The leading security and privacy researcher Bruce Schneier is out with a new book, Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. The book chronicles how governments and corporations have build an unprecedented surveillance state.

Read More →

Interview: Online Security Expert Bruce Schneier

  • Lateline (Australian Broadcasting Corporation)
  • March 10, 2015

Watch the Video on ABC.net.au

Transcript

EMMA ALBERICI, PRESENTER: One of the world's leading experts in online security is Bruce Schneier. He's a fellow at Harvard University's Berkman Center for Internet and Society. His latest book, 'Data and Goliath', is about how governments and corporations are using and controlling our data.

I spoke to Bruce Schneier from Minneapolis.

Read More →

Balancing Surveillance: Privacy and Security in the Digital Age

  • Bruce Schneier
  • Science Friday
  • March 6, 2015

The NSA, Facebook, and Google are constantly mining our personal information for surveillance and advertising purposes, among other goals. Is it possible to keep our data secure in the digital age? Bruce Schneier, a cybersecurity expert and author of Data and Goliath, says, “We need to examine our own fears and decide how much of our privacy we are really willing to sacrifice for convenience.” Read an excerpt from his book here.

Listen to the Audio on ScienceFriday.com

Read More →

There is Actually One Thing You Can Do to Fight the Surveillance Machine

Stop feeling guilty about skimming the Terms of Service. Get mad instead.

  • Manoush Zomorodi
  • New Tech City
  • March 4, 2015

Reading this right now?

Congratulations. You're winning.

Yes, all of the usual corporate and government entities know you're here.

Read More →

"Where's the Data Going?"

  • CTV News
  • February 9, 2015

CTV News spoke with Bruce Schneier about voice recognition in Samsung TVs, and sensors in consumer devices in general.

Watch the Video on CTVNews.ca

Read More →

Passwords

  • Science for the People
  • January 2, 2015

Security expert Bruce Schneier returns to Science for the People to talk about the use and misuse of passwords to safeguard our most important data.

Listen to the Audio on ScienceForThePeople.ca

Read More →

Was the Sony Hack an "Act of War"?

  • All In with Chris Hayes
  • December 18, 2014

Bruce Schneier and former CIA deputy division chief Bruce Klingner spoke with Ari Melber about the Sony hack.

Watch the Video on MSNBC.com

Read More →

Security Expert: We Saw Sony Attack Coming

  • Wall Street Journal's The News Hub
  • December 18, 2014

The security hack that happened to Sony could happen to anyone. Co3 Systems' Bruce Schneier explains on the News Hub with Geoff Rogow.

Watch the Video or Read the Transcript on WSJ.com

Read More →

Schneier on Internet Safety

  • Boom Bust
  • December 5, 2014

Bruce Schneier, noted cryptologist and fellow at the Berman Center for Internet & Society at Harvard Law School, tells us how to protect our Wi-Fi connection in public and prevent ISPs from tracking our mobile internet use.

Watch or Download the Video on RT.com

Read More →

Bruce Schneier: "Encryption Makes the Internet Safer"

  • Boom Bust
  • November 12, 2014

Erin Ade sits down with Bruce Schneier – noted author, cryptologist, and fellow at the Berkman Center for Internet and Security and Harvard Law School. Bruce gives us his take on President Obama’s recent statement on net neutrality and explains why encryption is vital to personal security and privacy.

Watch the Video on YouTube

Read More →

Breaking up the NSA

  • Future Tense
  • September 21, 2014

Almost a year and a half after the Snowden revelations, it’s business as usual for America’s giant global eavesdropping and spying organisation: the NSA, the National Security Agency.

As revelations continue to unfold, legislative attempts to rein in the NSA's powers appear to be stalling. But, Harvard University security analyst Bruce Schneier says the situation is unacceptable.

In the future, argues Schneier, people will look back at the way we ignore privacy today and ask "how could we be that immoral?" He’s put forward his own plan for breaking -up the NSA, and in so doing, bringing its activities under greater civilian control.

Read More →

Bruce Schneier Talks Data-Mining, Surveillance & Embedded Computing Systems

  • Boom Bust
  • July 31, 2014

Erin Ade talks to Bruce Schneier about the efforts of government and private companies to track us and our personal information. However, our outrage over this invasion of privacy is overshadowed by the convenience of using technology. This tension has led to our ongoing, intense debate over the tradeoffs between security and surveillance. To help sort out all of these issues Schneier weighs in.

Read More →

Incident Response Management Breaking New Ground

  • SearchSecurity
  • July 7, 2014

Bruce Schneier is one of the best-known security professionals both within the field and in the larger world of technology policymaking. He's written 12 books, produces the influential "Schneier on Security" blog and is widely quoted in the press. After a multi-year stint at BT Managed Security Solutions, Schneier has moved to a startup: Co3 Systems. The new company, where he serves as Chief Technology Officer, makes a tool that focuses specifically on security incident response management.

Read More →

UO Today #583 Bruce Schneier

  • UO Today
  • June 25, 2014

Bruce Schneier, cyber-security expert and author of Liars and Outliers: Enabling the Trust Society Needs to Thrive, talks about corporate and governmental data collection and surveillance. Schneier gave a lecture, “Internet, Security, and Power” on May 28, 2014 at the UO in Eugene and at the UO in Portland on May 29, 2014.

Watch the Video on The UO Channel

Read More →

Incident Response Redux

  • Security Advisor Alliance Podcast
  • April 22, 2014

Bruce Schneier is the special guest on Episode 11 of the Security Advisor Alliance, on Incident Response.

Listen to the Podcast on Security Advisor Alliance

Read More →

Bruce Schneier, NSA and Toaster Hacking

  • Occupy Radio
  • April 9, 2014

In G-Force, the 2009 Disney movie, a group of secret agent rodents stops a kitchen gadget robot apocalypse. In the real world, we're in no danger from weaponized blenders, but our toasters just might be used in a denial of service attack.

Rivera Sun and Getch talk with computer security, and privacy specialist, Bruce Schneier. We get the scoop on the latest from the NSA, as well as the security vulnerabilities in the vast internet of things, this week on Occupy Radio.

Read More →

Bruce Schneier talks about the Shift of Power on the Internet

  • Trusted Software Alliance
  • April 9, 2014

‘'It's only metadata' is a mischaracterization that plays into goverment hands.'—Bruce Schneier

At the 2014 Source Conference in Boston, I was able to sit down with Bruce Schneier after his keynote to clarify his position on several topics he brought up. The Twitter stream was on fire during his presentation as he described how the power of government and large corporations affects the internet. Where are the boundaries between personal data and corporate/government usage of that data? What is our responsibility in the equation?

Read More →

Google Moves to Take Back the Net from Spying Eyes

  • 2ser's The Daily
  • March 18, 2014

News emerged this week that web giant Google is routinely encrypting web searches conducted in China in a move designed to offset the national government's ability to censor the Internet and track what individuals are viewing. The Google move is part of a global expansion of privacy technology to counter surveillance by government intelligence agencies, police and hackers and is seen as a direct consequence of whistleblower, Edward Snowden's release last year of US National Security Agency (NSA) documents exposing the extent of government surveillance of the Internet.

Among the many fears Snowden's leaked revelations have raised is the claim that the NSA and other leading western intelligence agencies are involved in programs to deliberately weaken the Net's security standards to make it easier for them to break in.

Bruce Schneier is a leading US cryptology expert and Chief Technology Officer at CO3 Systems.

The Daily's Kim Williams spoke to him earlier about Google's latest moves to combat alleged privacy intrusions into the Net.

Read More →

Bruce Schneier on Incident Response and His Next Book

  • eSecurity Planet
  • March 13, 2014

Few figures in the IT security landscape command the respect and admiration of so many people as does Bruce Schneier. The well-regarded expert recently changed jobs, moving from BT to become the CTO of Co3 Systems in January of this year.

In a video interview with eSecurity Planet, Schneier explains why the incident response technology that Co3 Systems builds is an important part of the modern IT security lifecycle. A key part of what Co3 does is to automate the details of incident response, he said.

Read More →

Josh Corman Talks to Bruce about His Upcoming Keynote at SOURCE

  • SOURCE Security Conference
  • March 13, 2014

Josh Corman talks to Bruce about his keynote at the 2014 SOURCE Security Conference.

Watch the Video at SourceConference.com

Read More →

Delving into the Security of an Internet of Things

  • Science Friday
  • March 7, 2014

If your car, your thermostat, and your refrigerator are all online and communicating with the world, is enough attention being given to who might be listening—or talking—to your networked things? And what happens if there’s a security flaw in the networking component of, say, your toaster? Security expert Bruce Schneier says that the world is at a crisis point regarding embedded network security, and that an Internet of Things could mean ubiquitous surveillance.

Listen to the Audio on ScienceFriday.com

Read More →

Bruce Schneier Hints at New Snowden Documents, Analysis Techniques

  • SearchSecurity
  • March 4, 2014

Think the Edward Snowden-NSA storyline is played out? Think again.

"I think this story is going to keep going for at least a year, probably longer," said Bruce Schneier, chief technology officer with Co3 Systems, who is working with The Intercept's Glenn Greenwald to analyze and report on the NSA documents allegedly stolen and leaked by former contractor Edward Snowden. "There's an enormous pile of documents; they're very technical [and] hard to understand, and as you go through them, you find stories."

In this interview recorded at the 2014 RSA Conference, SearchSecurity Editorial Director Robert Richardson sits down with Schneier to discuss his role in reviewing the Snowden documents.

Read More →

Joseph Menn Interviews Bruce Schneier

  • TrustyCon
  • March 4, 2014

Joseph Menn interviews Bruce Schneier at TrustyCon 2014, held on February 27, 2014 in San Francisco, California.

Watch the Video on YouTube

Read More →

Next Future Terrifying Technology Will Blow Your Mind

  • CoolTechNews
  • March 4, 2014

Bruce Schneier appeared on an episode of Inventing the Future with Robert Tercek about the collision between open society and surveillance.

Watch the Video on YouTube

Read More →

Bruce Schneier Discusses What Should be Done With the NSA

  • eWeek
  • February 26, 2014

Bruce Schneier is a legendary figure in the security community, well-known for his expertise in cryptography and more recently for his insight into the surveillance activities of the National Security Agency (NSA). Schneier currently serves as the CTO of incident response management vendor Co3 Systems. In an interview with eWEEK at the RSA conference here, Schneier detailed his views on the NSA's surveillance activities. When it comes to domestic surveillance and metadata collection, Schneier firmly believes that the Federal Bureau of Investigation is the right agency to handle that data. He noted that the FBI already has domestic security capabilities and is responsible for the national fingerprint database.

Read More →

Bruce Schneier: "NSA and GCHQ Have Betrayed the Trust of the Internet"

  • BBC News
  • January 27, 2014

Security expert and technologist Bruce Schneier has told the BBC that he believes the NSA and GCHQ have "betrayed the trust of the internet".

Mr Schneier said: "We have to trust the infrastructure [of the internet]... The fact that it has been subverted in ways we don't understand... we don't know what to trust.

Read More →

Future of U.S. Surveillance

  • CBC News
  • January 17, 2014

Security expert Bruce Schnier comments on U.S. President Barack Obama's proposed changes to surveillance programs.

Watch the Video on CBC.ca

Read More →

Snowden, the NSA, and Free Software

  • Columbia Law School
  • December 12, 2013

Renowned security expert Bruce Schneier talks with Eben Moglen about what we can learn from the Snowden documents, the NSA's efforts to weaken global cryptography, and how we can keep our own free software tools from being subverted.

Snowden, the NSA, and Free Software

Read More →

Why We Need a Magna Carta for the Internet: Motherboard Meets Bruce Schneier

  • Motherboard TV
  • November 27, 2013

Since Edward Snowden's disclosures about widespread NSA surveillance, Americans and people everywhere have been presented with a digital variation on an old analog threat: the erosion of freedoms and privacy in exchange, presumably, for safety and security.

Bruce Schneier knows the debate well. He's an expert in cryptography and he wrote the book on computer security; Applied Cryptography is one of the field's basic resources, "the book the NSA never wanted to be published," raved Wired in 1994. He knows the evidence well too: lately he's been helping the Guardian and the journalist Glenn Greenwald review the documents they have gathered from Snowden, in order to help explain some of the agency's top secret and highly complex spying programs.

Read More →

NSA "Probably Can Read Your E-mails"—the Key Questions

  • Channel 4 News
  • November 1, 2013

Following the row over claims German chancellor Angela Merkel's phone was hacked by the US, Channel 4 News speaks to security expert Bruce Schneier and asks if the NSA has gone too far.

Watch the Video on Channel4.com

Read More →

What Are the Implications of Spying?

  • CCTV America
  • October 26, 2013

International cyber security expert, Bruce Schneier weighs in on the U.S recent spying scandal.

Watch the Video on YouTube

Read More →

How to Protect Phones from Infiltration

  • CNN
  • October 25, 2013

Rumours of the NSA hacking Angela Merkel’s encrypted phone have got the world wondering how it would even be possible.

Becky Anderson talks to security technologist Bruce Schneier about protecting phones from infiltration by third parties and how the German Chancellor's phone may have been vulnerable.

Watch the Video on CNN.com

Read More →

Interview with Bruce Schneier—Internationally Renowned Security Technologist

Maria Xynou interviewed Bruce Schneier on privacy and surveillance. View this interview and gain an insight on why we should all "have something to hide"!

  • The Centre For Internet & Society
  • October 17, 2013

The Centre for Internet and Society (CIS) interviewed Bruce Schneier on the following questions:

  1. Do you think India needs privacy legislation? Why/ Why not?

  2. The majority of India's population lives below the line of poverty and barely has any Internet access. Is surveillance an elitist issue or should it concern the entire population in the country?

Read More →

Mobile Security with Bruce Schneier

  • Pocket Sized Podcast
  • October 7, 2013

Scott and Peter speak with special guest cryptographer and security expert Bruce Schneier about Touch ID, biometrics, and general mobile phone security and privacy issues. Bruce is an outstanding speaker on these topics – you don’t want to miss this.

Listen to the Audio on PocketSizedPodcast.com

Read More →

Virtually Speaking with Jay Ackroyd

  • Blog Talk Radio
  • October 4, 2013

Security and crytography expert Bruce Schneier, author of Secrets and Lies and most recently, Liars and Outliers, discusses the recent NSA revelations.

Listen to the Audio on BlogTalkRadio.com

Read More →

Trust and the Surveillance State

  • The Agenda with Steve Pikin
  • September 25, 2013

Trust is an invisible yet essential force in our lives, the great stabilizer of human relations. How do we create it? How do we lose it? Bruce Schneier, author of Liars & Outliers: Enabling the Trust that Society Needs to Thrive, joins Steve Paikin to discuss the essential role of trust in society and the threat the "surveillance state" may pose to it.

Read More →

NSA Working with Tech Companies to Insert Weaknesses Into Code

  • The Matthew Filipowicz Show
  • September 17, 2013

Bruce Schneier discusses the latest NSA revelations including the NSA working with tech companies to insert weaknesses into their code.

Watch the Video on YouTube

Read More →

Removing Yourself from the Public-Private Surveillance Web

  • This Is Hell (WNUR 89.3FM Chicago)
  • September 14, 2013

You signed up for government surveillance when you signed up for your email address. Not knowingly perhaps, (although who actually reads the user agreement?) but NSA spying is only possible with the help of the same private companies you trust with your data in the first place. The individual/government/corporate relationship has never been so exposed and so (hopefully) up for debate. Security technologist Bruce Schneier should be one of the voices you listen to in that debate.

Read More →

Bruce Schneier on the NSA, Cryptography and Trust

  • Threatpost
  • September 11, 2013

Dennis Fisher talks with cryptographer Bruce Schneier about the revelations of the NSA’s capabilities to subvert and weaken cryptographic algorithms, security products and standards, and what it will take to help defeat these capabilities.

Listen to the Audio on Threatpost.com

Read More →

Episode 253 of the Matthew Filipowicz Show

  • The Matthew Filpowicz Show
  • September 10, 2013

On today's show, we have encryption specialist and author Bruce Schneier here to discuss the latest NSA revelations including the NSA working with tech companies to insert weaknesses into their code.

Listen to the Audio on MatthewF.net

Transcript

Privacy PC published the following transcript of the interview.

- All right, joining me now here on the Matthew Filipowicz show is Bruce Schneier. Bruce is a security technologist and encryption specialist. He's written for the Guardian, the Economist, Wired and more.

Read More →

Industria del espionaje coludida en todos niveles: Bruce Schneier

  • Imagen Radio
  • September 9, 2013

En entrevista para Grupo Imagen Multimedia con Rodrigo Pacheco, Bruce Schneier, criptógrafo y experto en seguridad, dijo desconocer cuál es la implicación de las empresas en el escándalo de espionaje en Estados Unidos.

Lo cierto, indicó, “es que la industria está coludida a todos los niveles y entonces podríamos ver que ésta pelea porque hay mucha indignación en torno al tema”.

Acerca de los perjuicios que esta situación pudiera generar en los negocios que hacen esas empresas con otros países, manifestó que además de ellos las personas pudieran verse perjudicados, pero además indicó que no hay manera de protegerse por lo que habrá que confiar en los sistemas de protección de información porque “no hay ningún tipo de confianza”.

Agregó que los chinos tienen buenos hackers, pero Estados Unidos y Gran Bretaña tienen un sitio privilegiado porque buena parte del tráfico pasa por esos lugares.

Read More →

"Undermining the Very Fabric of the Internet": Bruce Schneier on NSA’s Secret Online Spying

  • Democracy Now!
  • September 6, 2013

In an effort to undermine cryptographic systems worldwide, the National Security Agency has manipulated global encryption standards, utilized supercomputers to crack encrypted communications, and has persuaded—sometimes coerced—Internet service providers to give it access to protected data. Is there any way to confidentially communicate online? We speak with security technologist and encryption specialist Bruce Schneier, who is a fellow at Harvard's Berkman Center for Internet and Society. He has been working with The Guardian on its recent NSA stories and has read hundreds of top-secret NSA documents provided by Edward Snowden.

Read More →

Bruce Schneier on NSA Surveillance

  • Inside Charlottesville
  • August 30, 2013

In America today, we find ourselves increasingly living in a new kind of country: where constant surveillance and paramilitary policing are normalized. Bruce Schneier is among the most insightful and important voices speaking out against unchecked government surveillance and the alarming lack of transparency among our democratic institutions.

Listen to the Audio on InsideCVille.com

Read More →

Bruce Schneier on Surveillance and Security

  • Radio Berkman
  • July 24, 2013

Revelations of the NSA’s data surveillance efforts have raised serious questions about the ethics and necessity of violating privacy that have been bubbling under the surface for some time. Efforts to monitor communication are nothing new, but electronically mediated communication has increased the amount of information being shared, and the possibilities for eavesdropping are endless. But there's a trade off. People tolerate incursions into privacy for greater security or even convenience: health care, transportation, public safety, or any number of web utilities we use on a daily basis.

Read More →

Consumer Benefits in Lack of Privacy?

  • Lou Dobbs Tonight
  • June 17, 2013

Liars and Outliers author Bruce Schneier on the impact on consumers of data mining by technology companies and the government.

Watch the Video on FoxBusiness.com

Read More →

Silicon Valley and the National Security State

  • All In with Chris Hayes
  • June 12, 2013

More than 10 years ago, NSA officials went to Silicon Valley to learn how to build a better data operation. Chris Hayes talks to Bruce Schneier, security expert, and Colleen Taylor, reporter for TechCrunch and TechCrunch TV.

Watch the Video on MSNBC.com

Read More →

Schneier on Power, the Internet, and Security

  • Library of Economics and Liberty
  • June 10, 2013

Bruce Schneier, author and security guru, talks with EconTalk host Russ Roberts about power and the internet. Schneier argues that the internet enhances the power of the powerless but it also enhances the power of the powerful. He argues that we should be worried about both corporate and government uses of the internet to enhance their power. Recorded before news of the PRISM system and the use of Verizon's customer information by the NSA (National Security Agency), Schneier presciently worries about government surveillance that we are not aware of and explains how governments--democratic and totalitarian--can use the internet to oppress their citizens.

Read More →

Bruce Schneier on Technology and Power

  • The Command Line
  • June 3, 2013

This is a feature cast, an episode of The Command Line Podcast.

The feature this week is an interview with Bruce Schneier. The catalyst for this conversation is a post on his blog that frames out some of the themes he has been considering for his next book. Among other things, we refer to Rebecca Mackinnon’s book and Kevin Kelly’s most recent book in the course of the conversation.

Read More →

M-Unition Podcast Series: Bruce Schneier Discusses the Advanced Persistent Threat, Cyberwar and Feudalism

  • M-Unition
  • May 13, 2013

With news outlets flooded with talk of advanced targeted threats and Mandiant's recently released APT1 report, we wanted to know what industry experts thought of the security industry today.

We sat down and spoke with Bruce Schneier about his thoughts on where the security industry is going and to get insight into his new book he is working on. "Cyberwar is based on fear and rhetoric", according to Schneier, "and it is damaging for us to push war rhetoric because it makes us feel helpless." He goes on to say that if we feel a sense of helplessness we naturally can't do anything to protect our systems. It requires a shift in how we view the situation.

Read More →

IT, Security and Power

Bruce Schneier & Jonathan Zittrain in Conversation

  • Berkman Center for Internet & Society
  • April 4, 2013

From Bruce Schneier:

What I've Been Thinking About

I have been thinking about the Internet and power: how the Internet affects power, and how power affects the Internet. Increasingly, those in power are using information technology to increase their power. This has many facets, including the following:

1. Ubiquitous surveillance for both government and corporate purposes -- aided by cloud computing, social networking, and Internet-enabled everything -- resulting in a world without any real privacy.

Read More →

Bruce Schneier Explains Why There Is No Privacy on the Internet

  • SearchSecurity
  • March 14, 2013

Big data is a phrase that means a lot of things to a variety of people. For marketers, it means being able to target ads at certain segments of the population more accurately than ever before; for security pros, it means detecting and responding to incidents more quickly; and for every user connected to the Internet, big data means personal privacy on the Internet is gone.

In this video interview, recorded at the 2013 RSA Conference, security industry luminary and author Bruce Schneier uses three high-profile examples to explain why there is currently no privacy on the Internet. Among those examples is the Mandiant APT1 report, which he uses to show how easily even the most disciplined of Internet users can slip up and expose their identities to the world.

Read More →

Bruce Schneier at RSA

  • CSO Blogs
  • March 8, 2013

Each year at RSA Conference, David Spark does a series of video interviews for the blog of security vendor Tripwire.  In this installment, Spark and Bruce Schneier discuss "Feudal Security."

Watch the Video on CSOOnline.com

Read More →

Bruce Schneier on Breaking Free from "Feudal Security"

  • Tripwire
  • March 7, 2013

"We live in a world where we're ceding a lot of our power to other companies," said Bruce Schneier (@schneierblog), security blogger and author of "Liars and Outliers" in our conversation at the 2013 RSA Conference in San Francisco.

Schneier was referring to companies such as Google and Facebook that control our data as well as companies that control our devices, such as Apple.

"These companies are in charge of our security and we have no choice but to trust them and in many cases their interests don't align with ours," said Schneier. "It's not that these companies are evil.

Read More →

Live from RSA—Richard Bejtlich Interviews Bruce Schneier

  • M-Unition Podcast Series
  • March 5, 2013

As part of an ongoing series from RSA USA 2013, Richard Bejtlich sits down with industry luminary, Bruce Schneier to discuss his latest book, Liars and Outliers and Mandiant's new APT1 report.

During the podcast, Schneier looks back at his "monitor first" advice from 2001 and discusses its impact today, "We are learning from the recent attacks in the news," said Schneier. "The lesson hasn't changed." On the cusp of an early cyber arms race, Schneier digs into the Mandiant report and shares his concerns on the future of cybersecurity.

Listen to the Audio on Mandiant.com

Read More →

Bruce Schneier on Data Privacy and Google's Feudal Model of Security

  • SearchSecurity
  • March 1, 2013

Like the rest of the world, the day-to-day function of the Internet relies on trust, according to author and security luminary Bruce Schneier. However, that trust is being frequently and seriously violated by many of companies that dominate the Internet.

In this video interview, Schneier, chief technology security officer with BT Counterpane, discusses the ways in which trust -- and, in turn, data privacy -- is threatened on the Internet, and explains how Google, Apple and others have adopted a feudal model of security, in which their customers have little, if any, recourse to ever reclaim data that rightfully belongs to them.

Watch the Video on TechTarget.com

Read More →

Virtually Speaking with Jay Ackroyd

  • Blog Talk Radio
  • February 22, 2013

Bruce Schneier returns to talk about his new book, Liars and Outliers.  He and host Jay Ackroyd discuss the nature of trust and its relationship to a well functioning and stable society.

Listen to the Audio on BlogTalkRadio.com

Read More →

Surveillance Technology

  • Inventing the Future with Robert Tercek
  • February 17, 2013

The digital technologies that so delight us also have a dark side. On this Episode of Inventing the Future with Robert Tercek, the topic of discussion is the future of surveillance technologies. Whether it be the government, big business, organized crime, or even your next door neighbor, chances are you're being tracked and analyzed.

Joining Robert Tercek in asking whether or not privacy is dead are BT Managed Security Solutions' Chief Security Technology Officer, Bruce Schneier and Research Fellow at The Cato Institute, Julian Sanchez.

Read More →

Privacy, Security, & the Future

  • Winter Intelligence / AGI 12 Conference
  • January 13, 2013

Adam Ford interviewed Bruce Schneier at the Winter Intelligence / AGI 12 conference in Oxford.

Watch the Video on YouTube

Read More →

Keynote Guests discuss Technology Evolution Preparedness & Risk Management

  • HP Protect 2012
  • September 10, 2012

Paul Muller (@xthestreams), Chief Evangelist, HP Software speaks with two of the HP Protect 2012 keynote speakers about security and risk management.

Paul speaks with Bruce Schneier, Security Technologist - Author of Liars and Outliers - How societies can use security to enable the trust the need to survive. Paul and Bruce discuss:
- How can security technologists get in front of the security risks resulting from new technologies and general evolutions?
- The importance of swift reaction to inevitable breaches and exploitation tactics.
- Thinking about security in the terms of decision cycles to best anticipate and mitigate risk.

Watch the Video on YouTube

Read More →

Bruce Schneier on the State of Encryption Today

  • InternetNewsBlog
  • August 7, 2012

Bruce Schneier talks to Sean Michael Kerner about what's wrong with encryption today and provides insight into what the best browser and operating system to use might be.

Watch the Video on YouTube

Read More →

Bruce Schneier Talks about the Morality of Security

  • InternetNews
  • August 2, 2012

Bruce Schneier gives us his views on why morality might well be the key ingredient for better Internet security.

Watch the Video on YouTube

Read More →

Bruce Schneier Answers Your Questions

  • DEF CON
  • July 28, 2012

Bruce Schneier takes audience questions at the DEF CON 20 hacker convention in Las Vegas.

Watch the Video or Listen to the Audio on DEFCON.org

Read More →

Liars and Outliers

  • Skeptically Speaking
  • June 3, 2012

This week, we’re talking about trust and cooperation, and the implications these social values have for security in the era of global networking. We’re joined by security technologist and author Bruce Schneier, to talk about his book Liars and Outliers: Enabling the Trust Society Needs to Survive. And anthropologist/blogger Greg Laden returns to discuss speculation about cognitive limits on the use of social networks.

For more on the debate between Bruce Schneier and Sam Harris over the effectiveness of profiling in airport security, check out Harris’s essay, Schneier’s response, and the resulting debate.

Listen to the Audio on ScienceForThePeople.ca

Read More →

An Interview with Bruce Schneier

  • Cigital Silver Bullet
  • May 30, 2012

On the 74th episode of The Silver Bullet Security Podcast, Gary talks for a second time with Bruce Schneier. They revisit Bruce’s prediction in episode 9 that insight into economics and security would help vendors sell their products more efficiently. In addition, they discuss Bruce’s new book Liars and Outliers: Enabling the Trust that Society Needs to Thrive, how far behind the government is in terms of security, cloud computing, and Uncle Milton’s ant farm.

Listen to the Audio on Cigital.com

Read More →

Layers of Security

  • Radio New Zealand
  • May 21, 2012

How secure do you feel - on a personal level or even at a national level? Revealing the cracks in the systems is American cryptographer and security guru Bruce Schneier.

Listen to the Audio on RadioNZ.co.nz

Read More →

Liars and Outliers

  • Wisconsin Public Radio
  • April 9, 2012

Society runs on trust. We have no choice but to trust that the random people, institutions, and systems we interact with will cooperate and be trustworthy. Join Ben Merens and his guest Bruce Schneier as they discuss how security can protect us from defectors; and what enables us to trust strangers at the local, national, and global scale.

Listen to the Audio on WPR.org

Read More →

Dresser After Dark with Michael Dresser

  • Dresser After Dark
  • March 30, 2012

Bruce Schneier discussed issues of trust on Dresser After Dark with host Michael Dresser.

Listen to the Audio on BlogTalkRadio.com

Read More →

Bruce Schneier on the Importance of Trust in Society

  • Surprisingly Free
  • March 27, 2012

Bruce Schneier, internationally renowned security expert and author, discusses his new book entitled, “Liars & Outliers: Enabling the Trust That Society Needs To Thrive.” Schneier starts the discussion by looking at society and trust and explains why he thinks the two are necessary for civilization. According to Schneier, two concepts contribute to a trustful society: first, humans are mostly moral; second, informal reputation systems incentivize trustworthy behavior. The discussion turns to technology and trust, and Schneier talks about how the information society yields greater consequences when trust is breached. He then describes how society deals with technology and trust and why he thinks the system is not perfect but working well overall.

Read More →

Interview: Liars and Outliers

  • RSA Conference 2012
  • March 5, 2012

Davi Ottenheimer, President of flyingpenguin, interviews Bruce Schneier on his latest book.

We don't demand a background check on the plumber who shows up to fix the leaky sink. We don't do a chemical analysis on food we eat. In the absence of personal relationships, we have no choice but to substitute confidence for trust, compliance for trustworthiness.

Read More →

Interview: The Meaning of Trust in Today's Digital World

  • RSA Conference 2012
  • March 2, 2012

Bruce Schneier discussed his book Liars and Outliers at the RSA Conference 2012.

Watch the Video on Youtube

Read More →

Bruce Schneier Tackles Sociology of Trust and Security

  • TechTarget
  • March 1, 2012

Bruce Schneier's latest book, Liars and Outliers, is a departure from his previous landmark books on cryptography and information security. In Liars and Outliers, Schneier pulls back from technology and looks at trust and security and how those very human concepts have evolved in concert with  the development of cooperative societies to build the trust and security mechanisms we have today.

In this interview conducted at RSA Conference 2012, Schneier explains his interest in the sociology of security and trust and how today's online interactions are changing the trust dynamic. He paints a not-so-bleak picture of why the Internet remains a trustworthy and viable platform for communication and ecommerce, and talks about whether social networking and technical feedback mechanisms comprise the new trust going forward.

Read More →

Bruce Schneier on Liars and Outliers

  • Threatpost
  • February 27, 2012

Dennis Fisher talks with cryptographer and author Bruce Schneier about his new book, Liars and Outliers, the role of trust in society and security, the ways in which technology helps promote trust and how various groups and actors defect the norm and take advantage of that trust.

Listen to the Audio on Threatpost.com

Read More →

Bright Ideas with Bruce Schneier

  • MPR News
  • February 27, 2012

Stephen Smith spoke with security expert Bruce Schneier about the importance of security in maintaining a flourishing society.

Lisen to the Audio on MPRNews.org

Read More →

Interview: New Threats to the Internet Infrastructure

  • RSA Conference 2012
  • February 24, 2012

Jean Friedman interviewed Bruce Schneier about his talk at RSA 2012.

Listen to the Audio on EdgeBoss.net

Read More →

Guarding Without Guardians

Bruce Schneier is concerned that without trust, society itself may be impossible

  • IEEE Spectrum
  • February 9, 2012

Socrates famously asked if a person could lead a just life in an unjust society. A new book, Liars & Outliers, by Bruce Schneier doesn’t in so many words raise the question, Can a person lead a secure life in an insecure society? but it does answer it. There’s only so much we can do without there being a framework of trust: There have to be moral codes; peer pressures are needed; institutions have to have their own codes of conduct, and so on.

Read More →

Ten Years Later, Are We Safer?

  • KQED Forum with Michael Krasny
  • August 19, 2011

As the 10th anniversary of the Sept. 11 terror attacks nears, many are asking if we're safer now than we were before the attacks. Has heightened security and extra screening at the airport -- including removing your shoes and belt -- made you feel safer?

Host: Mark Trautwein

Guests:

  • Barry Glassner, president of Lewis and Clark College and author of "The Culture of Fear: Why Americans Are Afraid of the Wrong Things"
  • Bruce Schneier, security technologist and author of "Beyond Fear: Thinking Sensibly About Security in an Uncertain World"
  • Steve Weber, professor of political science at UC Berkeley and author of "The End of Arrogance: America in the Global Competition of Ideas"

Listen to the Audio on KQED.org

Read More →

False Sense of Security?

  • Fox News
  • November 26, 2010

Are new enhanced TSA procedures a waste of resources?

Watch the Video on FoxNews.com

Read More →

Fear of Flying

  • Countdown with Keith Olbermann
  • November 24, 2010

Bruce Schneier appeared on Countdown with Keith Olbermann to discuss full-body scanners and the TSA.

Fear of Flying

Read More →

RSA Conference Europe: Hugh Thompson and Bruce Schneier

  • RSA Conference Europe
  • October 13, 2010

Two RSA Conference Europe 2010 Keynote speakers discuss Bruce Schneier's session on Security, Privacy and the Generation Gap.

Watch the Video on YouTube

Read More →

Scott Horton Interviews Bruce Schneier

  • Antiwar Radio
  • June 26, 2010

Bruce Schneier discusses Joe Lieberman's proposal for an internet "kill switch," why shutting down the internet during a crisis would cause more harm than good, and how controversial websites like WikiLeaks use data redundancy spread out in different countries to prevent being shut down.

Listen to the Audio on AntiWar.com

Read More →

Bruce Schneier on Security for Cloud Computing

  • Information Security
  • April 9, 2010

In part one of this interview with Bruce Schneier, he discusses the impending shift in how security will be delivered. Schneier expects security to be embedded in Web-based services and sold directly to service providers, rather than to enterprises and end users. This is a radical transformation for the security industry that security professionals must prepare for. Schneier also discusses consumerization and how traditional security technologies and services must adjust as more untrusted devices connect to trusted networks.

Read More →

Bruce Schneier on Cryptography and Government Information Security

  • Information Security
  • April 9, 2010

Author and leading security expert Bruce Schneier digs into the topics of the current state of cryptography and whether or not companies should care about the U.S. government's release of portions of the CNCI.

Watch the Video or Read the Transcript on TechTarget.com

Read More →

Virtually Speaking with Jay Ackroyd

  • Blog Talk Radio
  • March 25, 2010

Bruce Schneier and James Fallows of The Atlantic appeared on Virtually Speaking with Jay Ackroyd.

Listen to the Audio on BlogTalkRadio.com

Read More →

RB2: Q&A with Bruce Schneier

  • Risky.biz
  • November 13, 2009

In this podcast you'll hear a Q&A with Bruce Schneier of BT Counterpane, as moderated by Risky Business host Patrick Gray at the recent GovCERT Symposium in Rotterdam, Netherlands.

Topics covered include cloud computing, privacy, software manufacturer liability for defects, two factor authentication and more!

Listen to the Audio on Risky.biz

Read More →

Bruce Schneier on Outsourcing and Awareness Training

  • Information Security
  • October 29, 2009

At 2009's Information Security Decisions conference, security expert Bruce Schneier sat down to answer some of readers' security questions, which range from the trustworthiness of outsourced security services to the usefulness of awareness training in securing new technologies.

Watch the Video or Read the Transcript on TechTarget.com

Read More →

Q & A with Bruce Schneier

  • DEFCON 17
  • July 31, 2009

Bruce Schneier answered audience questions at the DEFCON hacking conference.

Watch the Video or Listen to the Audio on DEFCON.org

Read More →

Cryptography, Security Theater, and the Psychology of Fear

  • Digital Underground
  • May 11, 2009

Dennis Fisher talks with security expert Bruce Schneier about the usefulness of cryptography, the psychology of security and fear and the war on the unexpected after 9/11.

Listen to the audio on Threatpost.com

Read More →

Insider Threats

  • Federal News Radio
  • March 26, 2009

The government spends billions to prevent criminals worldwide from breaking into its computer systems, but what about the inside threat - the danger from people you trust?

Listen to the Audio on FederalNewsRadio.com

Read More →

Schneier on Security

  • Paul Harris, WLS/Chicago
  • February 1, 2009

Bruce Schneier joined Paul Harris to talk about whether we are in fact safer with current airport procedures than those before 9/11 and whether government and private industry are doing enough to harden security at possible terrorist targets like nuclear and chemical plants. They also talked about technology's role in global security (e.g. whether Google Earth deserved the criticism after investigators found that the terrorists who shot up Mumbai in November had used the imaging information to plan their attack), and about the restrictions on taking liquids onto commercial flights -- the 3.5-ounce rule -- and whether there is any proof that a terrorist could construct a bomb from two liquids they mixed in an airplane lavatory.

Listen to the Audio on PaulHarrisOnline.BlogSpot.com

Read More →

Screening the TSA

  • 60 Minutes
  • December 18, 2008

Excerpt

But the question is: is everything we go through at checkpoints actually making us safer? Security expert Bruce Schneier says no. He says much of it is just "security theater."

"It's a phrase I coined for security measures that look good, but don't actually do anything," he explained.

Schneier, who has been an adviser to TSA but also its most persistent thorn-in-the-side, says there are too many silly rules.

Read More →

3 Qüestions: Bruce Schneier

  • Universitat Autònoma de Barcelona
  • November 3, 2008

Bruce Schneier és considerat internacionalment com un gurú de la seguretat informàtica. Va fundar, i actualment dirigeix, la divisió tecnològica de la companyia BT Counterpane, especialitzada en serveis de seguretat informàtica. Citat habitualment als mitjans de comunicació, Schneier ha escrit nombrosos articles a la premsa i ha testificat diverses vegades sobre seguretat al Congrés dels Estats Units.

Note: in this video, the questions are in Spanish but Bruce Schneier's responses are in English.

Watch the Video on YouTube

Read More →

Security Experts Bruce Schneier and Ray Stanton on the Human Side of Security

  • ComputerWeekly
  • April 30, 2008

BT's Bruce Schneier and Ray Stanton talk security with ComputerWeekly.com's security blogger David Lacey at Infosecurity 2008.

Watch the Video on ComputerWeekly.com

Read More →

Scott Horton Interviews Bruce Schneier

  • Antiwar Radio
  • April 11, 2008

Bruce Schneier, cryptographer, computer security specialist, writer, and author, discusses the Justice Department’s bogus prosecutions of barely-terrorists in the JFK, Ft. Dix, Lackawanna, Miami and other cases, the increasing danger to Americans’ liberties due to the large numbers of new Joint Terrorism Task Forces across the country and their temptation to entrap the innocent, the rise of the domestic security industrial complex, the economics of airline security, information as the answer to the problem of consolidated power, the government’s data mining programs and the death of the Real ID.

Listen to the Audio on Antiwar.com

Read More →

Session Preview with Bruce Schneier: Reconceptualizing Security

  • RSA Conference 2008
  • April 7, 2008

Bruce Schneier, CTO, BT Counterpane, is an internationally renowned security technologist and author, and a frequent speaker at RSA Conference. His session at RSA Conference 2008 is called Reconceptualizing Security.

Listen to the Audio on Archive.org

Read More →

Does the Security Industry Have a Future?

  • ebizQ
  • March 20, 2008

Bruce Schneier and Peter Schoof of ebizQ discuss current vulnerabilities, what the future of the security industry will look like, security industry consolidation, encryption, and finally, the time frame for changes in the industry to come about.

Listen to the Audio on ebizQ.net

Transcript

First, what threats do you see that companies need to be most concerned with at this point?

The biggest threat right now is crime. About five years ago, criminals discovered the internet in a big way and whether it's identity theft which is fraud or denial of service extortion or other attempts to make money, crime is the primary threat on the net and when we're worried about internet threats, we're worried about crime.

I've read some of your general comments about, essentially, in a perfect world, the security industry would be unneeded.

Read More →

The Halfway House Between Science and Secrets

  • Science Progress
  • March 19, 2008

A recent National Research Council report recognizes that the 9/11 attacks provoked counter-productive security measures that stifle access to fruitful scientific research. Security expert Bruce Schneier talks with Science Progress about the science that makes us smarter and the security that makes us safer.

Listen to the Audio on ScienceProgress.org

Transcript

Earlier this month the National Research Council released a Congressionally-mandated report, 'Science and Security in a Post 9/11 World,' which recognizes that the 9/11 attacks provoked a misallocation of United States security resources and led to counter-productive security measures. The NRC warns that the widespread practice of labeling scientific research as 'sensitive but unclassified' has had grave consequences for our security and our economy.

Read More →

Schneier: Bad News Is Good News, Not So for Security

  • ZDNet
  • February 15, 2008

While the media bombards consumers with frightening stories, discussions about security are thwarted by the failure of language to separate the "feeling" and "reality" of security, says security guru Bruce Schneier.

Schneier, author of Applied Cryptography and his most recent book Beyond Fear, reckons there is a fundamental problem with the way humans think about security. And its roots can be drawn back to a failure of language.

"'Security' is a complicated word," Schneier told ZDnet.com.au at linuxconf08.

"You can feel secure and there's the reality of security -- how secure you are.

Read More →

Interview with Bruce Schneier

  • EDUCAUSE 2007
  • November 1, 2007

In a 14 minute interview, BT Counterpane's Bruce Schneier shares some insightful words about privacy along with interesting commentary about ethics, cybersecurity and blogging.

Listen to the audio on EDUCAUSE.edu

Read More →

Q&A with Bruce Schneier

  • DEF CON 15
  • August 3, 2007

Bruce Schneier answered questions from the audience at DEF CON 15.

Watch the Video or Listen to the Audio on DEFCON.org

Read More →

Interview on Electronic Passports

  • Dave Birch
  • Digital Identity Blog
  • November 20, 2006

[Dave Birch] This week's podcast turned out to be rather timely. I happened to have a chat with noted security guru Bruce Schneier about e-passports a couple of days before the UK e-passports made the news. The topic of e-passports merits serious discussion and Bruce's perspective is very valuable.

Listen to the Audio on Archive.org

Read More →

Baron Dave and Brian interview Bruce Schneier

  • Shockwave Radio Theater
  • November 18, 2006

Baron Dave Romm and Brian Westley talk with guest Bruce Schneier. Topics range from terrorism to computer security to molecular gastronomy.

Listen to the Audio on Romm.org

Read More →

I Always Feel Like Somebody's Watching Me

  • MPR News
  • June 30, 2006

You used to only be able to find surveillance cameras in banks, or 24-hour convenience stores, or communist dictatorships.

But today they're virtually everywhere—from buses in London to restaurants in New Delhi to the Bridges of Madison County in central Iowa.

Security technology expert Bruce Schneier joins reporter Nikki Tundel for a surveillance walking tour of downtown Minneapolis.

Listen to the Audio on MPRNews.org

Read More →

Surveillance Society

  • The Diane Rehm Show
  • January 31, 2006

How recent disclosures regarding domestic surveillance, the Justice Department's requests for Google search histories, and advances in data mining are challenging conventional notions of privacy.

Guests

  • Robert O'Harrow, investigative reporter, Washington Post and author of "No Place To Hide"
  • Joe Whitley, attorney, Alston and Bird, and former general counsel, Department of Homeland Security
  • Bruce Schneier, Chief Security Technology Officer, Counterpane Internet Security

Listen to the Audio on TheDianeRehmShow.org

Read More →

Internet Security

  • The New York Times
  • January 12, 2005

John Markoff, a reporter for the New York Times, talks with Bruce Schneier.

Listen to the Audio on NYTimes.com

Read More →

Beyond Fear: Behind the Mic

  • IT Conversations
  • April 16, 2004

Host Doug Kaye says, "This is the one interview I hope everyone will hear."

In his latest book, Beyond Fear, security guru Bruce Schneier goes beyond cryptography and network security to challenge our post-9/11 national security practices. Here are some teasers:

  • "We're seeing so much nonsense after 9/11, and so many people are saying things about security, about terrorism that just makes no sense."
  • "Homeland security measures are an enormous waste of money."
  • "If the goal of security is to protect against yesterday's attacks, we're really good at it."
  • "The system didn't fail in the way the designers expected."
  • "Attackers exploit the rarity of failures."
  • "More people are killed every year by pigs than by sharks, which shows you how good we are at evaluating risk."
  • "Did you ever wonder why tweezers were confiscated at security checkpoints, but matches and cigarette lighters--actual combustible materials--were not?...If the tweezers lobby had more power, I'm sure they would have been allowed on board as well."
  • "When the U.S. Government says that security against terrorism is worth curtailing individual civil liberties, it's because the cost of that decision is not borne by those making it."
  • "...people make bad security trade-offs when they're scared."

Read or listen to this terrific interview in which Bruce also says what he thinks of the 9/11 hearings and answers questions from listeners regarding spam and biometrics. This is one of our best.

Read More →

Beyond Fear

  • The Kojo Nnamdi Show
  • September 11, 2003

Two years after 9/11, are we safer? Security expert Bruce Schneier brings his common sense approach to the idea of national security and explains why arming pilots and issuing national I.D.s only makes us less secure.

Listen to the Audio on TheKojoNnamdiShow.org

Read More →

Bruce Schneier Answers Questions

  • DEF CON 9
  • July 13, 2001

Bruce Schneier answered audience questions at the DEF CON hacking conference.

Watch the Video or Listen to the Audio on DEFCON.org

Read More →

Photo of Bruce Schneier by Per Ervland.

Schneier on Security is a personal website. Opinions expressed are not necessarily those of IBM Resilient.