Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
Schneier on Security
Page 9
Schneier on Security
Schneier on Security
How Attorneys Are Harming Cybersecurity Incident Response – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier New paper: “Lessons Lost: Incident Response in the Age of...
Schneier on Security
Snowden Ten Years Later – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Snowden Ten Years Later In 2013 and 2014, I wrote...
Schneier on Security
The Software-Defined Car – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Developers are starting to talk about the software-defined car. For...
Schneier on Security
Friday Squid Blogging: Squid Chromolithographs – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier About Bruce SchneierI am a public-interest technologist, working at the...
Schneier on Security
Open-Source LLMs – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Open-Source LLMs In February, Meta released its large language model:...
Schneier on Security
On the Catastrophic Risk of AI – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Earlier this week, I signed on to a short group...
Schneier on Security
Chinese Hacking of US Critical Infrastructure – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Chinese Hacking of US Critical Infrastructure Everyone is writing...
Schneier on Security
Brute-Forcing a Fingerprint Reader – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier It’s neither hard nor expensive: Unlike password authentication, which requires...
Schneier on Security
Friday Squid Blogging: Online Cephalopod Course – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Friday Squid Blogging: Online Cephalopod Course Atlas Obscura has...
Schneier on Security
Expeditionary Cyberspace Operations – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Cyberspace operations now officially has a physical dimension, meaning that...
Schneier on Security
On the Poisoning of LLMs – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Interesting essay on the poisoning of LLMs—ChatGPT in particular: Given...
Schneier on Security
Indiana, Iowa, and Tennessee Pass Comprehensive Privacy Laws – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Indiana, Iowa, and Tennessee Pass Comprehensive Privacy Laws It’s...
Schneier on Security
Credible Handwriting Machine – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier In case you don’t have enough to worry about, someone...
Schneier on Security
Google Is Not Deleting Old YouTube Videos – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Google Is Not Deleting Old YouTube Videos Google has...
Schneier on Security
Friday Squid Blogging: Peruvian Squid-Fishing Regulation Drives Chinese Fleets Away – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier A Peruvian oversight law has the opposite effect: Peru in...
Schneier on Security
Security Risks of New .zip and .mov Domains – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Comments Hauke • May 19, 2023 8:11 AM I...
Schneier on Security
Microsoft Secure Boot Bug – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Microsoft is currently patching a zero-day Secure-Boot bug. The BlackLotus...
Schneier on Security
Micro-Star International Signing Key Stolen – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Micro-Star International—aka MSI—had its UEFI signing key stolen last month....
Schneier on Security
Upcoming Speaking Engagements – Source: www.schneier.com
Source: www.schneier.com - Author: Schneier.com Webmaster About Bruce SchneierI am a public-interest technologist, working at the...
Schneier on Security
Friday Squid Blogging: Giant Squid Video – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Comments MarkH • May 13, 2023 12:45 AM While...
Schneier on Security
Ted Chiang on the Risks of AI – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Ted Chiang has an excellent essay in the New Yorker:...
Schneier on Security
Building Trustworthy AI – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Building Trustworthy AI We will all soon get into the...
Schneier on Security
FBI Disables Russian Malware – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Reuters is reporting that the FBI “had identified and disabled...
Schneier on Security
PIPEDREAM Malware against Industrial Control Systems – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Another nation-state malware, Russian in origin: In the early stages...
Schneier on Security
AI Hacking Village at DEF CON This Year – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog AI Hacking Village at DEF CON This Year At...
Schneier on Security
Friday Squid Blogging: “Mediterranean Beef Squid” Hoax – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Friday Squid Blogging: “Mediterranean Beef Squid” Hoax The viral...
Schneier on Security
Large Language Models and Elections – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Earlier this week, the Republican National Committee released a video...
Schneier on Security
SolarWinds Detected Six Months Earlier – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier New reporting from Wired reveals that the Department of Justice...
Schneier on Security
NIST Draft Document on Post-Quantum Cryptography Guidance – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog NIST Draft Document on Post-Quantum Cryptography Guidance NIST has...
Schneier on Security
Friday Squid Blogging: More Squid Camouflage Research – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier vas pup • April 28, 2023 5:29 PM I am...
Posts navigation
1
…
8
9
10
…
16
Latest News
The Register Security
Stifling Beijing in cyberspace is now British intelligence’s number-one mission – Source: go.theregister.com
16/05/2024
The Register Security
NCSC CTO: Broken market must be fixed to usher in new tech – Source: go.theregister.com
16/05/2024
The Register Security
FBI takes down BreachForums ransomware website and Telegram channel – Source: go.theregister.com
16/05/2024
The Register Security
Crook brags about US Army and $75B defense biz pwnage – Source: go.theregister.com
16/05/2024
Data Breach Today
Bipartisan Senators Endorse $32M Annually for AI Research – Source: www.databreachtoday.com
16/05/2024
Data Breach Today
Help Safeguard Retailers Against Social Engineering Attacks – Source: www.databreachtoday.com
16/05/2024