Bruce Schneier

Type: Person
Name: Bruce Schneier
First reported Jul 27 2014 - Updated Jul 27 2014 - 1 reports

Quick – to the Blackphone!

My colleague, Jim Rapoza , is much smarter than I am. I know this because as he was completing his thoughts on The Next (and Possibly Last) Generation of Smartphones , he asked me if I would like to write something on the availability of the latest gadget ... [Published Business 2 Community - Jul 27 2014]
First reported Jul 24 2014 - Updated Jul 25 2014 - 1 reports

Understanding Trust and How to Defend It in the Digital Age

Trust is arguably the most important component of any functioning society on the planet. Since nearly all who will read this blog are information security professionals, you likely know that Bruce Schneier even wrote an insightful book about it. With ... [Published Security Bloggers Network - Jul 24 2014]
First reported Jul 23 2014 - Updated Jul 23 2014 - 2 reports

Auto Industry Continues To Grapple With Challenges Of Cyber Threats

A telephone is not a telephone. It's a computer that makes phone calls. A refrigerator is not a refrigerator. It's a computer that keeps food cold. And a car is no longer a car. It's a computer with wheels and an engine.Everyday items are no longer what ... [Published AOL.com - Jul 23 2014]
First reported Jul 18 2014 - Updated Jul 19 2014 - 1 reports

Auto industry continues to grapple with challenges of cyber threats

Filed under: Safety , Technology A car is no longer a car. It's a computer with wheels and an engine. A telephone is not a telephone. It's a computer that makes phone calls. A refrigerator is not a refrigerator. It's a computer that keeps food ... [Published Autoblog - Jul 18 2014]
First reported Jul 16 2014 - Updated Jul 16 2014 - 1 reports

Survey - IT Security and Government in EU CEE

Survey: IT Security and Government in EU CEEAn odd juxtaposition exists in the IDC IT security event survey data for the government sector in the Central and Eastern Europe (CEE) region of the European Union (EU). Viruses are viewed as the top threat ... [Published MarketResearch.com - Jul 16 2014]
First reported Jul 08 2014 - Updated Jul 09 2014 - 5 reports

NSA-created Digital Security Gaps Frustrate Tech Experts

Washington, DC - infoZine - Scripps Howard Foundation Wire - NSA whistleblower Edward Snowden revealed that the NSA has purposely allowed vulnerabilities, or security gaps, in digital devices consumers use every day. These gaps allow broad surveillance, ... [Published Kansas City Infozine - Jul 09 2014]
First reported Jul 08 2014 - Updated Jul 08 2014 - 1 reports

Co3 Systems Update Addresses Latest Global Regulatory Mandates

Continually Updated Knowledgebase Keeps Customers Compliant With New Requirements Across the U.S., EU and Middle EastCAMBRIDGE, MA--(Marketwired - Jul 8, 2014) - Co3 Systems , the leader in Incident Response Management Systems (IRMS), today announced ... [Published MarketWired - Jul 08 2014]
First reported Jul 08 2014 - Updated Jul 08 2014 - 2 reports

Edward Snowden 2.0: Is There Another NSA Leaker at Work?

Recent leaks which seem to come from within the NSA may not originate from Edward Snowden, suggesting there is a second leaker at work.GettyJust over a year ago Edward Snowden began revealing the breadth and depth of government surveillance around the ... [Published International Business Times UK - Jul 08 2014]
First reported Jul 04 2014 - Updated Jul 05 2014 - 3 reports

Bruce Schneier: ‘I Think There’s a Second NSA Leaker’

Security expert says a new whistleblower has emerged, Greenwald agreesPrison Planet.comSecurity expert Bruce Schneier reacted to yesterday’s new revelations about the NSA by asserting that there’s probably a second leaker in addition to Edward Snowde ... [Published PrisonPlanet - Jul 04 2014]
First reported Jul 04 2014 - Updated Jul 04 2014 - 2 reports

Experts Speculate On Existence of Another NSA Leaker

MOSCOW, July 4 (RIA Novosti) – The NSA’s XKeyscore surveillance software leak may come from a second source, not fugitive whistleblower Edward Snowden, the Forbes magazine reported on Friday.“Another expert said that s/he believed that this leak may come ... [Published Russia Profile - Jul 04 2014]
First reported Jul 03 2014 - Updated Jul 04 2014 - 2 reports

Is there a second leaker at NSA?

A German site has published an analysis of the National Security Agency’s XKEYSCORE code that does not appear to have come from Edward Snowden, fuelling speculations among experts that there may be another leaker at the US spy agency. German public broadcaster ... [Published Press tv - Jul 04 2014]
First reported Jun 29 2014 - Updated Jun 29 2014 - 2 reports

The character assassination of Keith Alexander

According to these stories, a Congressman wants to know if former NSA chief Gen. Keith Alexander is selling classified info to banks. There is nothing to this story. It’s gossip based on upon rumor based on speculation based on innuendo. It’s such ... [Published Errata Security - Jun 29 2014]

Quotes

"you have to assume everything is being collected" said Bruce Schneier, who has been studying and writing about cryptography and computer security for two decades

More Content

All (399) | News (256) | Reports (0) | Blogs (143) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Time for digital emancipation [Published Doc Searls Weblog - 20 hours ago]
Quick – to the Blackphone! [Published Business 2 Community - Jul 27 2014]
Acronis True Image [DISCOUNT: 10% OFF] 2014 17.... [Published Softpedia - Jul 25 2014]
Soft4Boost Secure Eraser 2.4.2.145 (Freeware) [Published Softpedia - Jul 25 2014]
'You have to assume everything is being collected' [Published WA Today - Jul 24 2014]
Creating a Fake Person Shows How Digital Anonym... [Published Mashable - Jul 24 2014]
Understanding Trust and How to Defend It in the... [Published Security Bloggers Network - Jul 24 2014]
Auto Industry Continues To Grapple With Challen... [Published AOL.com - Jul 23 2014]
Auto industry continues to grapple with challen... [Published Dealer Communications - Jul 23 2014]
Cigital Releases One Hundredth Episode of The S... [Published Industrial Info Financials - Jul 23 2014]
How to Invent a Person Online [Published Yahoo! Finance - Jul 23 2014]
GCHQ furor, Snowden, keep NSA in the snooping s... [Published FOXNews.com - Jul 22 2014]
Auto industry continues to grapple with challen... [Published Autoblog - Jul 18 2014]
How the NSA’s surveillance programs undermine I... [Published People's Blog for the Constitution - Jul 17 2014]
Should You Trust Tor? [Published Dissident Voice - Jul 17 2014]
Peeling the onion: Almost everyone involved in ... [Published PandoDaily - Jul 16 2014]
Survey - IT Security and Government in EU CEE [Published MarketResearch.com - Jul 16 2014]
Tel Aviv University to host leading internation... [Published EurekAlert! - Jul 15 2014]
Is a second Snowden spilling more NSA secrets? [Published Crikey Media - Jul 15 2014]
Greenwald: There is 2d NSA leaker [Published GlobalSecurity.org - Jul 14 2014]
33 gov'ts help NSA to monitor internet data [Published GlobalSecurity.org - Jul 14 2014]
Co3 Systems Updates Privacy Module [Published Individual.com - Jul 11 2014]
Glenn Greenwald says there is a second NSA whis... [Published TweakTown - Jul 11 2014]
Remedies: Prevention is better than cure [Published The Economist - Jul 10 2014]
Former NSA Chief Will Work for Wall Street-back... [Published Common Dreams - Jul 09 2014]
NSA-created Digital Security Gaps Frustrate Tec... [Published Kansas City Infozine - Jul 09 2014]
NSA Spying Hurts Cybersecurity for All of Us Sa... [Published Austin American Statesman - Jul 08 2014]
NSA Spying Hurts Cybersecurity for All of Us Sa... [Published Time - Jul 08 2014]
NSA Spying Hurts Cybersecurity for All of Us Sa... [Published Swampland - Jul 08 2014]
NSA Spying Hurts Cybersecurity for All of Us Sa... [Published TIME.com - Jul 08 2014]
1 2 3 4 5 6 7 8 9 10 ...
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Time for digital emancipation [Published Doc Searls Weblog - 20 hours ago]
Civilization is a draft. Provisional. Scaffolded. Under construction. For example: That’s Thomas Jefferson ‘s  rough draft  of the  Declaration of Independence . The Declaration hasn’t changed since July 4, 1776, but the Constitution built on it ...
Understanding Trust and How to Defend It in the... [Published Security Bloggers Network - Jul 24 2014]
Trust is arguably the most important component of any functioning society on the planet. Since nearly all who will read this blog are information security professionals, you likely know that Bruce Schneier even wrote an insightful book about it. With ...
Auto industry continues to grapple with challen... [Published Autoblog - Jul 18 2014]
Filed under: Safety , Technology A car is no longer a car. It's a computer with wheels and an engine. A telephone is not a telephone. It's a computer that makes phone calls. A refrigerator is not a refrigerator. It's a computer that keeps food ...
How the NSA’s surveillance programs undermine I... [Published People's Blog for the Constitution - Jul 17 2014]
Over the last year, nearly all the news and outrcy about the National Security (NSA) has focused on its programs to collect phone records and spy on Internet communications.  However, the NSA is also engaging in secretly undermining essential encryption ...
NSA Spying Hurts Cybersecurity for All of Us Sa... [Published Swampland - Jul 08 2014]
Privacy advocates Monday slammed the National Security Agency for conducting surveillance in a way they say undermines cybersecurity for everyone and harms U.S. tech companies. More Dubai to Build World’s First Temperature-Controlled Indoor ‘City’ Google’s ...
1 2 3 4 5 6 7 8 9 10 ...
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.