Bruce Schneier

Internationally-renowned security technologist and author Bruce Schneier is both a Founder and the Chief Technical Officer of Counterpane Internet Security, Inc. He established the Company with Tom Rowley to address the critical need for strong, cost-effective, and resilient network security. Counterpane Internet Security, Inc. provides Managed Security Monitoring services to organizations world-wide. Outsourced security monitoring provides a level of security unattainable through conventional security products.Schneier is responsible for maintaining the Company's technical lead in world-class information security technology and its practical and effective implementation. Schneier's security experience makes him uniquely qualified to shape the direction of the company's research endeavors, as well as to act as a spokesperson to the business community on e-commerce issues and solutions.While president of Counterpane Systems, Schneier designed and analyzed hardware and software cryptographic systems, advised sophisticated clients on products and markets, and taught technical as well as business courses related to the field of cryptography. Concerns as diverse as Microsoft, Citibank, and the National Security Agency, have all relied upon Schneier's unique expertise. Schneier designed the popular Blowfish encryption algorithm. And Schneier's Twofish was a finalist for the new Federal Advanced Encryption Standard (AES).Schneier is the author of six books, including Secrets &, Lies: Digital Security in a Networked World. Published in October 2000, ",Secrets &, Lies", has already sold 70,000 copies. One of his earlier books, Applied Cryptography, now in its second edition, is the seminal work in its field and has sold over 130,000 copies worldwide. He currently writes the free email newsletter ",Crypto-Gram,", which has over 60,000 readers. He has presented papers at many international conferences, and he is a frequent writer, contributing editor, and lecturer on the topics of cryptography, computer security, and privacy. Schneier served on the board of directors of the International Association for Cryptologic Research, and is an Advisory Board member for the Electronic Privacy Information Center.Schneier holds an MS degree in computer science from American University and a BS degree in physics from the University of Rochester.

Digital Information Rights Need Tech-Savvy Courts

For at least seven months last year, a hacker had access to T-Mobiles customer network. He is known to have accessed information belonging to 400 customers—names, Social Security numbers,...

Desktop Google Finds Holes

Last month, Google released a beta version of its desktop search software: Google Desktop Search. Install it on your Windows machine, and it creates a searchable index of your...

We Owe Much to DES

It was a historic moment when, last month, the National Institute of Standards and Technology proposed withdrawing the Data Encryption Standard as an encryption standard. DES has been the most...

US-VISIT Is No Bargain

In the wake of the U.S. Department of Homeland Securitys awarding of its largest contract, for a system to fingerprint and to keep tabs on foreign visitors in the...

Latest Posts

Masergy Performance Edge Solves the Unsolvable Middle Mile Problem

SD-WANs and SASE are red hot today and they should be, as they are the most transformative technologies for the WAN since, well, maybe...

The Konftel C2070: Green Huddle Room Video Solution

Thanks to the pandemic, I’m getting in many Huddle Room solutions to test, and one of them that stands out is the Konftel C2070. ...

Oracle Cloud’s Ross Brown on Oracle and Multicloud Computing

Ross Brown, VP of Product Marketing for Oracle Cloud, discusses trends in multicloud, and points out key differentiators for Oracle Cloud. There are a...

Microsoft Integrates Dynamic 365 And Teams Even More

Last week, Microsoft held its annual Inspire conference and announced many new features and collaborations. My first blog of the Inspire event covered Microsoft's...

Six Tenets of Modern Cybersecurity Training

Classroom training is rarely able to address the needs of all students. Some students will require extra time and instruction, while others may grasp...