Bruce Schneier

Former Contributor|Tech
I think of myself a security technologist, and have been called a "security guru" by The Economist. I've written 12 books, and my latest is Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. I've also written hundreds of articles and essays, and
SOCIAL
article image
Feb 2, 2016

The Internet Of Things Will Be The World's Biggest Robot

The Internet now senses, thinks, and acts. We’re building a world-sized robot, and we don’t even realize it. Whatever changes it means for society, we don’t want it to take us by surprise.

article image
Sep 29, 2015

The Era Of Automatic Facial Recognition And Surveillance Is Here

(Photo: ROBYN BECK/AFP/Getty Images) ID checks were a common response to the terrorist attacks of 9/11, but they'll soon be obsolete. You won't have to show your ID, because you'll be identified automatically. A security camera will capture your face, and it'll be matched with your name and a whole lot [...]

Feb 23, 2015

Everyone Wants You To Have Security, But Not From Them

In December Google's Executive Chairman Eric Schmidt was interviewed at the CATO Institute Surveillance Conference. One of the things he said, after talking about some of the security measures his company has put in place post-Snowden, was: "If you have important information, the safest place to keep it is in Google. And I [...]

article image
Aug 23, 2013

Our Decreasing Tolerance To Risk

We’re afraid of risk.  It’s a normal part of life, but we’re increasingly unwilling to accept it at any level.  So we turn to technology to protect us.  The problem is that technological security measures aren’t free.  They cost money, of course, but they cost other things as well.  They [...]

May 30, 2012

The Vulnerabilities Market and the Future of Security

Recently, there have been several articles about the new market in zero-day exploits: new and unpatched computer vulnerabilities. It's not just software companies, who sometimes pay bounties to researchers who alert them of security vulnerabilities so they can fix them. And it's not only criminal organizations, who pay for vulnerabilities [...]