News in the Category "Written Interviews"

Page 16 of 18

"Life is Insecurity"

  • SAP Info International
  • March 27, 2006

Which IT security issues are really important? Which are the main topics enterprises are dealing with in 2006? What is the role of encryption? – When people want to know how security really works, they often turn to Bruce Schneier, internationally-renowned security technologist and author. The “security guru” is Co-Founder and CTO of Counterpane Internet Security, Inc. Schneier is best known as a security critic and commentator, his free monthly security newsletter explains the news in a common sense. In conversation with SAP INFO online, Schneier talks candidly about his own fascination for IT security and names the actual and future challenges concerning this topic…

Interview with Bruce Schneier

  • Marc Ruef
  • SCIP
  • February 2006

German translation

Bruce Schneier is an expert for cryptography and computer security, developer of popular crypto algorithms, author of many books and co-founder of Counterpane Internet Security.

scip AG: Hello Bruce. Thank you very much for your time. How is it going? Your assistant told me you were on a trip? Working off your speaking schedule (http://www.schneier.com/ schedule.html)?

Bruce Schneier: Most of my travel involves some speaking these days. I’ve just come back from participating in a seminar called “The Politics of Fear” at Tufts University. Next week I am speaking to staffers in Congress about data mining, and giving a lecture at “The Politics of Fear”. Later in the month, I head to Europe for a series of conferences. Quite a bit of my working life is like that these days…

Bruce Schneier: Questions & Answers

  • Agatino Grillo
  • Isacaroma Newsletter
  • October 28, 2005

(Italian version)

IsacaRoma: Who are you? Your biography says you are an author, technologist and a “security guru.”  What is your cultural background?  How did you arrive at cryptography and security as a profession?

Bruce Schneier: Security is a mindset, and the best security experts come by the profession naturally.  They constantly go about the world looking at how to get around security: how to vote twice, how to shoplift, how to sneak in and out.  They probably won’t do any of these things, but they’re always thinking about them.

My background is physics and computer science, and I started working in cryptography first for the U.S. government and then as a consultant.  The interesting thing about being a consultant is that you get to work on a wide variety of different problems.  Many of these problems suggested avenues of research, which further broadened my interests…

Does Trusted Computing provide security for users or from them?

  • Scott M. Fulton, III
  • TG Daily
  • October 6, 2005

Mountain View (CA) – Throughout the past two decades, Bruce Schneier has provided one of the most well-reasoned, clear, and unbiased perspectives regarding the broad and complex topic of implementing security and trust in computer systems and networks. Schneier co-developed the widely used Twofish encryption algorithm, authored 1995’s ground-breaking Applied Cryptography – which defined how crypto could be used reliably for authentication and communication – and founded network security provider Counterpane, where he currently serves as CTO. But his life’s mission of late has been to cast a skeptical eye upon any and every measure that purports to solve the overall problem of security, even from a personal vantage point…

On the Record

  • Jim McKay, Justice and Public Safety Editor
  • Government Technology
  • July 27, 2005

You call “identity theft” a misnomer, saying that the fight against fraud might be more effective if we thought of it as impersonation rather than ID theft. Could you elaborate on why?

“Identity theft” doesn’t make sense as a term. Your identity is the only thing about you that cannot be stolen. The real crime is fraud due to impersonation. Even worse, by calling it “identity theft,” we naturally focus on the wrong solution: making personal information harder to steal.

We need to make personal information less valuable, harder to use. By calling the crime what it really is, it’s more obvious where the solutions lie…

An Interview with Bruce Schneier

  • Claudia Grinnell
  • Turnrow
  • December 2004

BRUCE SCHNEIER is an internationally renowned security technologist and author. Described by The Economist as a “security guru,” Schneier is best known as a candid and lucid security critic and commentator. He has written articles for, among other publications, Boston Globe, San Francisco Chronicle, Sydney Morning Herald, International Herald Tribune, The Baltimore Sun, Newsday, Salon.com, Wired Magazine, and San Jose Mercury News. He is also the founder and CTO of Counterpane Internet Security, Inc., the world’s leading protector of networked information—the inventor of outsourced security monitoring and the foremost authority on effective mitigation of emerging IT threats…

Schneier: Microsoft still has work to do

  • Bill Brenner
  • SearchSecurity
  • October 4, 2004

Part 1

Bruce Schneier is founder and chief technology officer of Mountain View, Calif.-based MSSP Counterpane Internet Security Inc. and author of Applied Cryptography, Secrets and Lies and Beyond Fear. He also publishes Crypto-Gram, a free monthly newsletter, and writes op-ed pieces for various publications. Schneier spoke to SearchSecurity.com about the latest threats, Microsoft’s ongoing security struggles and other topics in a two-part interview that took place by e-mail and phone last month. In this installment, he talks about the “hype” of SP2 and explains why it’s “foolish” to use Internet Explorer…

Beyond Fear

Security expert Bruce Schneier talks with CIO Update about how CIOs can best meet the security challenge.

  • Jeanette James
  • CIO Update
  • September 10, 2004

Bruce Schneier, one of the country’s leading computer-security experts, is the author of the highly acclaimed Beyond Fear. This no-nonsense look at security—both in the real-world and on corporate networks—dissects security in such a way as to help readers become better consumers of it.

Schneier certainly knows his way around such questions. He is the founder of Counterpane Internet Security, a global provider of outsourced security monitoring services. With a suite of services—including firewall and IDS device management, vulnerability scanning and consulting—Counterpane monitors security on more than 400 networks in 32 countries…

Survival Guide: Bruce Schneier, cofounder of Counterpane Internet Security Inc

  • Roseanne Gerin
  • WashingtonTechnology
  • August 30, 2004

f

Bruce Schneier, an international security expert and author

The Sept. 11 Commission’s recommendation that Congress create a national intelligence director to oversee the country’s 15 information-gathering agencies has been gaining support in recent weeks. But Bruce Schneier, an international security expert and author of numerous books on security technology, said the government should focus more on changing the culture of U.S. intelligence agencies.

The cofounder and chief technical officer of Counterpane Internet Security Inc., a Mountain View, Calif., provider of managed security-monitoring services, Schneier takes a skeptical view of centralized security efforts such as the Homeland Security Department and its U.S. Visit program to track foreign visitors…

Neowin Interview : Bruce Schneier

  • Neowin
  • August 30, 2004

Described by The Economist as a “security guru”, Bruce Schneier is a well known security analyst who has gained notoriety from his popular security mailing list, Cryptogram, and his 3 books on various security subjects. Bruce was kind enough to take the time to have a chat with Neowin, and talk about himself, security, Microsoft, and much more.

Bruce, thanks for taking the time to talk to Neowin; could you start by giving us a brief history of yourself, what you’ve done, and what you’re doing at the moment?

My security career seems to have been a continuing process of becoming more generalized. First cryptography, then computer security, and now general security. You can see the progression in my books. Applied Cryptography was my attempt to explain cryptography to programmers. Secrets and Lies was my attempt to explain computer security to IT people. And my latest book, Beyond Fear, explains security and security technology to anyone interested; in today’s world, that should be everyone…

Sidebar photo of Bruce Schneier by Joe MacInnis.