News in the Category "Recorded Interviews"

Page 23 of 33

Video: UO Today #583 Bruce Schneier

  • UO Today
  • June 25, 2014

Bruce Schneier, cyber-security expert and author of Liars and Outliers: Enabling the Trust Society Needs to Thrive, talks about corporate and governmental data collection and surveillance. Schneier gave a lecture, “Internet, Security, and Power” on May 28, 2014 at the UO in Eugene and at the UO in Portland on May 29, 2014.

Watch the Video on The UO Channel

Audio: Incident Response Redux

  • Security Advisor Alliance Podcast
  • April 22, 2014

Bruce Schneier is the special guest on Episode 11 of the Security Advisor Alliance, on Incident Response.

Listen to the Podcast on Security Advisor Alliance

Audio: Bruce Schneier, NSA and Toaster Hacking

  • Occupy Radio
  • April 9, 2014

In G-Force, the 2009 Disney movie, a group of secret agent rodents stops a kitchen gadget robot apocalypse. In the real world, we’re in no danger from weaponized blenders, but our toasters just might be used in a denial of service attack.

Rivera Sun and Getch talk with computer security, and privacy specialist, Bruce Schneier. We get the scoop on the latest from the NSA, as well as the security vulnerabilities in the vast internet of things, this week on Occupy Radio.

Listen to the Audio on Archive.org

Audio: Bruce Schneier talks about the Shift of Power on the Internet

  • Trusted Software Alliance
  • April 9, 2014

‘’It’s only metadata’ is a mischaracterization that plays into goverment hands.’—Bruce Schneier

At the 2014 Source Conference in Boston, I was able to sit down with Bruce Schneier after his keynote to clarify his position on several topics he brought up. The Twitter stream was on fire during his presentation as he described how the power of government and large corporations affects the internet. Where are the boundaries between personal data and corporate/government usage of that data? What is our responsibility in the equation?

An interesting observation from Bruce is that despite the government’s insistence that they are only collecting metadata, which according to them has no intrinsic value, that presupposes  metadata is somehow less important or less personal when it comes to interrogating the data. This despite that it can be used to generate a network of contacts such as …

Audio: Google Moves to Take Back the Net from Spying Eyes

  • 2ser's The Daily
  • March 18, 2014

News emerged this week that web giant Google is routinely encrypting web searches conducted in China in a move designed to offset the national government’s ability to censor the Internet and track what individuals are viewing. The Google move is part of a global expansion of privacy technology to counter surveillance by government intelligence agencies, police and hackers and is seen as a direct consequence of whistleblower, Edward Snowden’s release last year of US National Security Agency (NSA) documents exposing the extent of government surveillance of the Internet…

Video: Bruce Schneier on Incident Response and His Next Book

  • eSecurity Planet
  • March 13, 2014

Few figures in the IT security landscape command the respect and admiration of so many people as does Bruce Schneier. The well-regarded expert recently changed jobs, moving from BT to become the CTO of Co3 Systems in January of this year.

In a video interview with eSecurity Planet, Schneier explains why the incident response technology that Co3 Systems builds is an important part of the modern IT security lifecycle. A key part of what Co3 does is to automate the details of incident response, he said.

“When you’re under attack, the last thing you want to do is worry about all the details,” he said. “You want someone to do that for you; otherwise you’ll forget something.”…

Audio: Josh Corman Talks to Bruce about His Upcoming Keynote at SOURCE

  • SOURCE Security Conference
  • March 13, 2014

Josh Corman talks to Bruce about his keynote at the 2014 SOURCE Security Conference.

Watch the Video at SourceConference.com

Audio: Delving into the Security of an Internet of Things

  • Science Friday
  • March 7, 2014

If your car, your thermostat, and your refrigerator are all online and communicating with the world, is enough attention being given to who might be listening—or talking—to your networked things? And what happens if there’s a security flaw in the networking component of, say, your toaster? Security expert Bruce Schneier says that the world is at a crisis point regarding embedded network security, and that an Internet of Things could mean ubiquitous surveillance.

Listen to the Audio on ScienceFriday.com

Video: Next Future Terrifying Technology Will Blow Your Mind

  • CoolTechNews
  • March 4, 2014

Bruce Schneier appeared on an episode of Inventing the Future with Robert Tercek about the collision between open society and surveillance.

Watch the Video on YouTube

Video: Bruce Schneier Hints at New Snowden Documents, Analysis Techniques

  • SearchSecurity
  • March 4, 2014

Think the Edward Snowden-NSA storyline is played out? Think again.

“I think this story is going to keep going for at least a year, probably longer,” said Bruce Schneier, chief technology officer with Co3 Systems, who is working with The Intercept‘s Glenn Greenwald to analyze and report on the NSA documents allegedly stolen and leaked by former contractor Edward Snowden. “There’s an enormous pile of documents; they’re very technical [and] hard to understand, and as you go through them, you find stories.”

In this interview recorded at the 2014 RSA Conference…

1 21 22 23 24 25 33

Sidebar photo of Bruce Schneier by Joe MacInnis.