News in the Category "Recorded Interviews"

Page 20 of 33

Video: Expert: TSA Airport Security Is "A Lot of Theater"

  • CNN
  • June 2, 2015

The “smart bad guys” figure out how to get around TSA, says security technologist and Harvard Law School fellow Bruce Schneier.

Watch the Video on CNN.com

Audio: Spy-wear?

  • BBC Tech Tent
  • May 15, 2015

Listen to the Audio on BBC.co.uk

Dr Chris Brauer from Goldsmiths, University of London, on how big brands want to sell us things via wearable devices. Bruce Schneier, security and privacy expert and author of the book “Data and Goliath”, warns of the threat of companies and governments misusing data about us. Emily Bell, from the Tow Centre for Digital Journalism, on Verizon’s buyout of AOL, and Facebook’s instant articles. And Zoe Kleinman spends a night alone in a house full of robots. Presented by Rory Cellan-Jones, with Fiona Graham and Dave Lee from the BBC Online tech desk…

Audio: Stuxnet, Sexism, CEOs and Surveillance

  • Cybersecurity Initiative
  • May 14, 2015

Listen to the Audio on NewAmerica.org

New America’s Peter Singer and Passcode’s Sara Sorcher chat with Bruce Schneier, prolific author and chief technology officer at Resilient Systems, about the challenges of publicly blaming countries for cyberattacks—and whose job it should be to defend private companies against sophisticated nation-state attacks. They also hear from Nate Fick, the CEO of Endgame, a venture-backed security intelligence software company, about how he’s leveraging cybersecurity solutions once produced just for the government into the private sector…

Audio: Data and Goliath: The Hidden Battles to Capture Your Data and Control Your World

  • Financial Sense Newshour
  • May 8, 2015

Listen to the Audio on YouTube.com

Cris Sheridan welcomes Bruce Schneier, Chief Technology Officer at Resilient Systems and author of Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. Bruce writes “we are living in the golden age of surveillance” where almost everything we do is now being tracked and used without our knowledge. Bruce speaks with Cris about how much data we produce, the way corporations are using it, the problems associated with ubiquitous surveillance, and why this is a defining issue of our time…

Audio: Schneier v. Baker Puts Mayweather v. Pacquiao in the Shade

  • Steptoe Cyberlaw Podcast
  • May 5, 2015

Listen to the Audio on SteptoeCyberblog.com

Episode 65 would be ugly if it weren’t so much fun. Our guest is Bruce Schneier, cryptographer, computer science and privacy guru, and author of the best-selling Data and Goliath—a book I annotated every few pages of with the words, “Bruce, you can’t possibly really believe this.” And that’s pretty much how the interview goes, as Bruce and I mix it up over hackbacks, whether everyone but government should be allowed to use Big Data tools, Edward Snowden, whether “mass surveillance” has value in fighting terrorism, and whether damaging cyberattacks are really infrequent and hard to attribute. We disagree mightily—and with civility…

Audio: Schneier on Security Resilience

Insights from Security Leader at GISEC Event in Dubai

  • Geetha Nandikotkur
  • InfoRisk Today
  • April 29, 2015

Listen to the Audio on InfoRiskToday.in

In developing markets such as Asia and the Middle East, how can security practitioners best prepare themselves to tackle the rapidly-changing threat landscape? Resilience is the key, says security leader Bruce Schneier.

The way to think about security is a combination of protection, detection and response, says Schneier, a fellow at the Berkman Center for Internet and Society at the Harvard Law School, USA. While there is a lot of prevention and detection technology, response is the missing piece, he says. The more you can look at response, the more effective you will be…

Video: Schneier: Incident Response Management Key to Surviving a Data Breach

  • SearchSecurity
  • April 27, 2015

SAN FRANCISCO—Between Target, Home Depot, Sony Pictures and many others, 2014 was undeniably the year of the data breach, and companies are finally realizing the likelihood that they could be next.

“Last year was being called the ‘year of the breach,’” said Bruce Schneier, CTO of Resilient Systems, formerly Co3 Systems. “Now, you and I know every year [has] been the year of the breach. But last year there were a bunch of really high-profile breaches where the companies involved did a terrible job of responding, that they were actually in chaos and it looked that way.”…

Video: Cloud Computing Trade-Offs

  • David Spark
  • Tenable Blog
  • April 24, 2015

“As a business or as an individual you have to make a choice. Should I do this thing—whatever it is—on my computer and on my network or on a cloud computer on a cloud network,” asked Bruce Schneier (@schneierblog), CTO of Resilient Systems, Inc., in our conversation at the 2015 RSA Conference in San Francisco.

Whatever you choose, you’re going to be making a trade-off. Schneier recommends you first look at who your adversaries are.

“If your adversaries are a cybercriminal, I bet Google can do a better job at securing your stuff than you can. If your adversary is the U.S. government, Google will respond to court orders and not tell you about it, so maybe you’re better keeping it. It’s going to depend on what you’re worrying about,” said Schneier, who runs his personal email on his own computers, not so much for security reasons, but for control. He doesn’t want Google looking at his email or sending him advertising…

Audio: What Does It Take To Feel Secure?

  • TED Radio Hour (NPR)
  • April 17, 2015

Listen to the Audio on NPR.org

Computer security expert Bruce Schneier says there’s a big difference between feeling secure and actually being secure. He explains why we worry about unlikely dangers while ignoring more probable risks.

Transcript

GUY RAZ, HOST:

It’s the TED Radio Hour from NPR. I’m Guy Raz. And on the show today, we’re exploring ideas about Maslow’s hierarchy of human needs, and ranked at number two, security – the second step on the pyramid.

BRUCE SCHNEIER: There’s no other place for it to come. Security is basic. Without security, worrying about anything else doesn’t matter…

Audio: The Hidden Struggles to Control Your Data

  • Late Night Live (Australian Broadcasting Corporation)
  • April 14, 2015

Listen to the Audio on ABC.net.au

Just how much of your life is being watched and tracked? Who has access to all this information and what are they doing with it?

Bruce Schneier, fellow at Harvard Law School, author of Data and Goliath, points out the danger is not only from corporations and governments, but also cybercriminals, when these institutions lose your details.

1 18 19 20 21 22 33

Sidebar photo of Bruce Schneier by Joe MacInnis.