Talks in the Category “Text”

Testimony on “Understanding the Role of Connected Devices in Recent Cyber Attacks”

  • U.S. House of Representatives Joint Hearing
  • November 17, 2016

Bruce Schneier testified before two U.S. House of Representatives subcommittes at a joint hearing on "Understanding the Role of Connected Devices in Recent Cyber Attacks." Other witnesses were Dale Drew of Level 3 Communications and Kevin Fu of Virta Labs and the University of Michigan.

Watch the Video or Read the Text on

Read the Testimony on

Read More →

Surveillance: The Hidden Ways You’re Tracked

  • BBC
  • October 28, 2014

Watch the Video on

Do you have secrets? Security expert Bruce Schneier has little patience for those who say they don't.

When asked about government and corporate surveillance, there are some who shrug their shoulders and say they have nothing to fear because they have nothing to hide. Schneier's response?

Read More →

Privacy in the Age of Big Data: What's Going On Out There?

  • Privacy in the Age of Big Data Forum
  • June 5, 2012

On a panel at the Privacy in the Age of Big Data Forum in New Zealand, Bruce Schenier spoke about trends in personal data collection and usage.

Watch the Video on YouTube: Parts 1, 2, and 3

Read the Transcript on

Read More →

New Threats to the Internet Infrastructure

  • RSA Conference 2012
  • March 25, 2012

Today's Internet threats are not technical; they're social and political. They aren't criminals, hackers, or terrorists. They're the government and corporate attempts to mold the Internet into what they want it to be, either to bolster their business models or facilitate social control. Right now, these two goals coincide, making it harder than ever to keep the Internet free and open.

Read More →

The State of Incident Response

  • Black Hat USA 2014
  • August 11, 2004

The last of the protection-detection-response triad to get any real attention, incident response is big business these days. In this talk, Bruce Schneier steps back and looks at the economic and psychological forces that affect incident response as both a business and a technical activity. Nothing seems to be able to keep sufficiently skilled and motivated attackers out of a network. Can incident response save the day?

Read More →

Photo of Bruce Schneier by Per Ervland.

Schneier on Security is a personal website. Opinions expressed are not necessarily those of IBM Resilient.