updated Mon. February 20, 2023
-
ComputerWeekly.com
March 29, 2018
Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
Security Boulevard
March 29, 2018
In the wake of the Cambridge Analytica scandal, news articles and commentators have focused on what Facebook knows about us. A lot, it turns out. It collects data from our posts, our likes, our photos, things we type and delete without posting, and things we do while not on Facebook and even when we'reÃâà...
Security Boulevard
March 29, 2018
by Bruce Schneier on March 29, 2018. When Spectre and Meltdown were first announced earlier this year, pretty much everyone predicted that there would be many more attacks targeting branch prediction in microprocessors. Here's another one: In the new attack, an attacker primes the PHT and running branchÃâà...
Christian Science Monitor
March 29, 2018
By the end of the weekend, all 25 machines had been hacked – some in as little as an hour and a half. Even hackers with no experience on voting machines were successful. “These are bored teenagers between parties,” said security technologist Bruce Schneier in a series of expert discussions before theÃâà...
Money Magazine
March 29, 2018
If you're one of the millions of Americans feeling like it's time to start better protecting your personal data, you're pretty much out of luck, according to cybersecurity experts. The recent data-sharing controversy surrounding Facebook and its failure to prevent improper data harvesting by Cambridge AnalyticaÃâà...
Civicist
March 28, 2018
“For every article about Facebook's creepy stalker behavior, thousands of other companies are breathing a collective sigh of relief that it's Facebook and not them in the spotlight,” Bruce Schneier writes for CNN. “Because while Facebook is one of the biggest players in this space, there are thousands ofÃâà...
Harvard Law School News
March 27, 2018
To assess the internet landscape, the Gazette interviewed cybersecurity expert Bruce Schneier, a fellow with the Berkman Klein Center for Internet & Society and the Belfer Center for Science and International Affairs at Harvard Kennedy School. Schneier talked about government and corporate surveillance, and about whatÃâà...
CNN
March 27, 2018
Bruce Schneier is the author of "Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World." The opinions expressed in this commentary are his. (CNN) In the wake of the Cambridge Analytica scandal, news articles and commentators have focused on what Facebook knows about usÃâà...
The Cipher Brief
March 26, 2018
... the market-place often rewards low quality,” said security expert Bruce Schneier in 2003. Attacker initiative: An “attacker must find but one of possibly multiple vulnerabilities in order to succeed; the security specialist must develop countermeasures for all,” according to the 1991 report Computers at Risk.
Security Intelligence (blog)
March 22, 2018
Sedman: I'm very excited to be leading our first ever Security Summit in London. We're bringing together CISOs and security leaders along with their teams to meet and hear from experts in the security field, both from within and outside of IBM. Our speakers include Keren Elazari, Bruce Schneier and IBM'sÃâà...
Security Boulevard
March 15, 2018
One of the effects of GDPR — the new EU General Data Protection Regulation — is that we're all going to be learning a lot more about who collects our data and what they do with it. Consider PayPal, that just released a list of over 600 companies they share customer data with. Here's a good visualizationÃâà...
CIO
March 14, 2018
Truly effective solutions will come from platforms like AI2 that blend human and machine intelligence. “You can only automate what you're certain about, and there is still an enormous amount of uncertainty in cybersecurity,” says longtime security expert and author Bruce Schneier. “Automation has its place,Ãâà...
ComputerWeekly.com
March 14, 2018
Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
ComputerWeekly.com
March 14, 2018
Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London. Start Download.
Security Boulevard
March 7, 2018
DDoS vandals have long intensified their attacks by sending a small number of specially designed data packets to publicly available services. The services then unwittingly respond by sending a much larger number of unwanted packets to a target. The best known vectors for these DDoS amplificationÃâà...
ComputerWeekly.com
March 7, 2018
Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
The Hill
February 23, 2018
Cybersecurity experts like Bruce Schneier, who has testified before Congress on botnets, have challenged this. Schneider has argued that past market failures in preventing botnets suggest that companies should be regulated to prevent future attacks. "We really need to starting thinking about intervention,Ãâà...
Slate Magazine
February 22, 2018
As Bruce Schneier puts it, “The U.S. against Russia is a fair fight. Fifty separate states against Russia—that's not a fair fight.” Six U.S. senators—three Republicans and three Democrats—are sponsoring a bill they call the Secure Elections Act, which would set uniform cybersecurity standards for the electionÃâà...
Infosecurity Magazine
February 15, 2018
The letter is signed by Bruce Schneier, Paul Kocher, Steven Bellovin, and Martin Hellman — who won the 2015 Turing Award for inventing public key cryptography. “We understand and sympathize with the frustration that law enforcement has to deal with when evidence may exist but cannot be accessedÃâà...
The Register
February 14, 2018
The four are: Stanford professor Martin Hellman, of Diffie-Hellman fame and who helped invent the foundations of today's crypto systems; Columbia professor and USENET co-creator Steve Bellovin; top cryptographer Paul Kocher; and information security guru Bruce Schneier. All four this week signed aÃâà...