Bruce Schneier is an internationally renowned cryptographer, security technologist and author. Described by the Economist as a "security guru," he is best known as a refreshingly candid and lucid security critic and commentator. Bruce is the author of 14 books — including the New York Times best-seller Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World — as well as hundreds of articles, essays, and academic papers. His influential newsletter "Crypto-Gram" and blog "Schneier on Security" are read by over 250,000 people. He has also testified before the U.S. Congress, is a frequent guest on television and radio, served on several government technical committees, and is regularly quoted in the press. In addition, Bruce is a Fellow at the Berkman Klein Center for Internet & Society at Harvard University; a Lecturer in Public Policy at the Harvard Kennedy School; and Chief of Security Architecture at Inrupt, Inc.
Board Member, Electronic Frontier Foundation
Board Member, AccessNow
Board Member, The Tor Project
Advisory Board Member, Electronic Privacy Information Center
Advisory Board Member, VerifiedVoting.org
MEDIA & APPEARANCES
His articles and op-eds have appeared in many major publications, including The New York Times, The Guardian, Forbes, Wired, and Nature.
His insights have also appeared in The Bulletin of the Atomic Scientists, The Sydney Morning Herald, The Boston Globe, The San Francisco Chronicle, and The Washington Post.
Crypto-Gram, a free monthly newsletter, has over 150,000 readers.
In its 10+ years of regular publication, Crypto-Gram has become one of the most widely read forums for free-wheeling discussions.
We Have Root: Even More Advice from Schneier on Security
Click Here to Kill Everybody: Security and Survival in a Hyper-connected World
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
Carry On: Sound Advice from Schneier on Security
Liars and Outliers: Enabling the Trust that Society Needs to Thrive
Cryptography Engineering: Design Principles and Practical Applications
Schneier on Security
Beyond Fear: Thinking Sensibly about Security in an Uncertain World
Secrets & Lies: Digital Security in a Networked World
The Electronic Privacy Papers: Documents on the Battle for Privacy in the Age of Surveillance
Applied Cryptography: Protocols, Algorithms, and Source Code in C
The Twofish Encryption Algorithm: A 128-Bit Block Cipher
EMail Security: How to Keep Your Electronic Messages Private
Protect Your Macintosh
Applied Cryptography (1st Edition)