schneier.com
The Future of Incident Response - Schneier on Security
https://www.schneier.com/blog/archives/2014/11/the_future_of_i.html
The Future of Incident Response. Security is a combination of protection, detection, and response. It's taken the industry a long time to get to this point, though. The 1990s was the era of protection. Our industry was full of products that would protect your computers and network. By 2000, we realized that detection needed to be formalized as well, and the industry was full of detection products and services. At a tactical level, security is both a product and a process. Really, it's a combination o...
schneier.com
Implicit Passwords - Schneier on Security
https://www.schneier.com/blog/archives/2012/07/implicit_passwo.html
Is a really interesting research paper (article here. On implicit passwords: something your unconscious mind remembers but your conscious mind doesn't know. The Slashdot post. Is a nice summary:. The system isn't very realistic - people aren't going to spend 45 minutes learning their passwords and a few minutes authenticating themselves - but I really like the direction this research is going. Posted on July 24, 2012 at 6:28 AM. 8226; 59 Comments. Bull; July 24, 2012 6:40 AM. Bull; July 24, 2012 6:42 AM.
schneier.com
"Hinky" in Action - Schneier on Security
https://www.schneier.com/blog/archives/2015/04/hinky_in_action.html
Trained officials recognizing "hinky" and how it differs from profiling:. This again in 2007:. The key difference is expertise. People trained to be alert for something hinky will do much better than any profiler, but people who have no idea what to look for will do no better than random. It's a guy, just a friend," he told the specialist, according to court documents. This is what works. Not profiling. Not bulk surveillance. Not defending against any particular tactics or targets. In the...2, others wil...
schneier.com
Meerkats that Look like Bruce Schneier - Schneier on Security
https://www.schneier.com/blog/archives/2015/08/meerkats_that_l.html
Meerkats that Look like Bruce Schneier. Of my surreal life. (No, I have no idea who did this.). Posted on August 7, 2015 at 1:04 PM. 8226; 26 Comments. Bull; August 7, 2015 1:31 PM. I have been away from here for far too long. If anyone can give me a quick brief, I'd be eternally grateful. Hope everyone here is okay. Bull; August 7, 2015 1:48 PM. Yet another example of my surreal life.". Bull; August 7, 2015 1:49 PM. So does this mean that Fridays will now be devoted to meerkats instead of squids? I've a...
schneier.com
Another New AES Attack - Schneier on Security
https://www.schneier.com/blog/archives/2009/07/another_new_aes.html
Another New AES Attack. A new and very impressive attack against AES. Has just been announced. Over the past couple of months, there have been. The second blogged about here. New cryptanalysis papers on AES. The attacks presented in the papers are not practical - they're far too complex, they're related-key attacks, and they're against larger-key versions and not the 128-bit version that most implementations use - but they are impressive pieces of work all the same. In this paper we describe several atta...
summit.issala.org
2015 Summit Sponsors – The Eighth Annual Information Security Summit
https://summit.issala.org/summit-7-sponsors
The Eighth Annual Information Security Summit. Coming together to proactively combat cyber threats to our businesses and lives. Healthcare Privacy and Security Forum. The ISSA-LA Executive Forum May 20. Application Security for Managers. Enterprise Threat Intelligence Workshop. Information Security Management Boot Camp for IT Professionals. Real World Red Team Attacks. Thanks to our sponsors, whose support of ISSA-LA’s Seventh Annual Information Security. Post-Summit Cocktail Party Sponsor.
schneier.com
Homomorphic Encryption Breakthrough - Schneier on Security
https://www.schneier.com/blog/archives/2009/07/homomorphic_enc.html
Last month, IBM made some pretty brash claims about homomorphic encryption and the future of security. I hate to be the one to throw cold water on the whole thing - as cool as the new discovery is - but it's important to separate the theoretical from the practical. Unfortunately - you knew that was coming, right? Gentry estimates that performing a Google search with encrypted keywords - a perfectly reasonable simple application of this algorithm - would increase the amount of computing time by about a tr...
schneier.com
Crypto-Gram: December 15, 1998 - Schneier on Security
https://www.schneier.com/crypto-gram/archives/1998/1215.html
December 15, 1998. Http:/ www.counterpane.com. A free monthly newsletter providing summaries, analyses, insights, and commentaries on cryptography and computer security. The Fallacy of Cracking Contests. How to Recognize Plaintext. The Doghouse: Iomega Zip Disks. Final Report from the Commerce Department Technical Advisory Committee on Key Recovery. The Fallacy of Cracking Contests. 1 The contests are generally unfair. Cryptanalysis assumes that the attacker knows everything except the secret. He has...
schneier.com
Crypto-Gram: August 15, 1998 - Schneier on Security
https://www.schneier.com/crypto-gram-9808.html
August 15, 1998. Http:/ www.counterpane.com. A free monthly newsletter providing summaries, analyses, insights, and commentaries on cryptography and computer security. A Hardware DES Cracker. KEA (Key Exchange Algorithm). Featured Research: Chosen Protocol Attack. Biometrics: Truths and Fictions. A Hardware DES Cracker. My comment was that the FBI is either incompetent or lying, or both. The EFF machine broke DES, but it could just as easily have been designed to break any other encryption algorithm....
schneier.com
Fighting Terrorism with Cupcakes - Schneier on Security
https://www.schneier.com/blog/archives/2011/06/fighting_terror.html
Fighting Terrorism with Cupcakes. MI6 hacked into an online al-Qaeda magazine and replaced bomb-making instructions with a cupcake recipe. It's a more polite hack than subtly altering the recipe so it blows up during the making process. (I've been told, although I don't know for sure, that the 1971 Anarchist's Cookbook. Has similarly flawed recipes.). Posted on June 6, 2011 at 2:59 PM. 8226; 50 Comments. Bull; June 6, 2011 3:11 PM. Bull; June 6, 2011 3:19 PM. Can I have lemon icing please. Just consider ...
SOCIAL ENGAGEMENT