People

Bruce Schneier

Bruce Schneier

Formal First Name
Bruce
Nick Name
Security Guru
Dates
1963 - present
Location

Bruce Schneier is an internationally renowned cryptographer, security technologist and author. Described by the Economist as a "security guru," he is best known as a refreshingly candid and lucid security critic and commentator. Bruce is the author of 14 books — including the New York Times best-seller Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World — as well as hundreds of articles, essays, and academic papers. His influential newsletter "Crypto-Gram" and blog "Schneier on Security" are read by over 250,000 people. He has also testified before the U.S. Congress, is a frequent guest on television and radio, served on several government technical committees, and is regularly quoted in the press. In addition, Bruce is a Fellow at the Berkman Klein Center for Internet & Society at Harvard University; a Lecturer in Public Policy at the Harvard Kennedy School; and Chief of Security Architecture at Inrupt, Inc.

Professional Experience


Academic History

CURRENT APPOINTMENTS

  • Board Member, Electronic Frontier Foundation

  • Board Member, AccessNow

  • Board Member, The Tor Project

  • Advisory Board Member, Electronic Privacy Information Center

  • Advisory Board Member, VerifiedVoting.org


MEDIA & APPEARANCES

  • His articles and op-eds have appeared in many major publications, including The New York Times, The Guardian, Forbes, Wired, and Nature.

  • His insights have also appeared in The Bulletin of the Atomic Scientists, The Sydney Morning Herald, The Boston Globe, The San Francisco Chronicle, and The Washington Post.


CRYPTO-GRAM

  • Crypto-Gram, a free monthly newsletter, has over 150,000 readers.

  • In its 10+ years of regular publication, Crypto-Gram has become one of the most widely read forums for free-wheeling discussions. 


BOOKS

  • We Have Root: Even More Advice from Schneier on Security

  • Click Here to Kill Everybody: Security and Survival in a Hyper-connected World

  • Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

  • Carry On: Sound Advice from Schneier on Security

  • Liars and Outliers: Enabling the Trust that Society Needs to Thrive

  • Cryptography Engineering: Design Principles and Practical Applications

  • Schneier on Security

  • Practical Cryptography

  • Beyond Fear: Thinking Sensibly about Security in an Uncertain World

  • Secrets & Lies: Digital Security in a Networked World

  • The Electronic Privacy Papers: Documents on the Battle for Privacy in the Age of Surveillance

  • Applied Cryptography: Protocols, Algorithms, and Source Code in C

  • The Twofish Encryption Algorithm: A 128-Bit Block Cipher

  • EMail Security: How to Keep Your Electronic Messages Private

  • Protect Your Macintosh

  • Applied Cryptography (1st Edition)