Attacks/Breaches
1/5/2014
01:31 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Bruce Schneier Departs BT For Startup Co3 Systems

Schneier says new gig at incident response management vendor a natural progression for him

Famed security expert Bruce Schneier has left BT and is now CTO of incident response (IR) management startup Co3 Systems.

Schneier, who previously had served on Co3 Systems' advisory board and has helped shape the look and feel of the software-as-a-service firm's architecture, says the time had come for him to make a change and leave BT. He had been the security futurologist for BT since it purchased his network monitoring services firm Counterpane Internet Security in October 2006.

Word that Schneier was leaving BT leaked publicly last month, and speculation arose that it had to do with his outspoken criticism of surveillance by the NSA and Britain's GCHQ.

But Schneier says BT never tried to censor his high-profile analysis of the Snowden leaks. "BT never tried to force me to toe the party line. And while my opinions on the NSA might not have been the same as their opinions, they never once stopped me from saying or publishing something," Schneier told Dark Reading in an interview. "Independent thinking was one of the things BT valued of me."

He says the timing was right for him to try something new, and Cambridge, Mass.-based Co3 was "the cool 'something new' that I found." His new role is mainly as "an external-facing evangelist," he says.

The Guardian in August reported that BT was a major partner with the GCHQ in its surveillance programs, as were Vodafone and Verizon Business, providing the spy agency with passing information on their customers' phone calls, emails, and Facebook posts, according to documents leaked by former NSA contractor Edward Snowden. Schneier, who worked with former Guardian writer Glenn Greenwald to analyze the Snowden documents, concluded that the NSA in its controversial surveillance operations was breaking most encryption on the Internet, and that it was time for the Internet to retool its security architecture with "open protocols, open implementations, open systems -- these will be harder for the NSA to subvert," he wrote.

[Renowned security icon Bruce Schneier shares food for thought on security, fine dining, and disclosing and eating bugs. See Schneier On Schneier.]

Schneier says he was eager to return to the startup scene. "Being in a startup is fun. It's really fun in ways that being with a big company is not," Schneier says. "Being in a big company has advantages ... I was just about ready to swap back" to the startup model, he says.

Co3 offers a software-as-a-service platform for automating IR that assigns tasks, logs, tracks, and monitors elements of responding to an attack, including regulatory requirements. The platform replaces manual tracking via spreadsheets or other less coordinated, error-prone manual approaches today.

Schneier has close ties with John Bruce, Co3's CEO: The two worked together at Counterpane 15 years ago when Bruce was CMO and executive vice president of marketing there. Bruce said he is pleased that Schneier is joining Co3. "I've known Bruce for quite a while," he says. "What we represent is what he's been professing for the longest time ... you're going to get attacked at some point, so what do you do when you become subject to that?"

Bruce says Schneier's joining the firm is a validation of the company's SaaS offering. "What we're doing is equipping people with the tool to execute processes to efficiently grapple with [attacks]," he says. The platform provides a "playbook" for what to do when a breach occurs, according to Cambridge, Mass.-based Co3.

Schneier says Co3 was the next logical step from Counterpane. "After detection comes response," he says. He describes Co3's platform as a social networking tool for IR. Co3's system assigns tasks and coordinates any regulatory requirements for disclosure, for example. It can be linked to threat intelligence feeds and to IR services a firm would employ in the event of a breach. "You get on, put your people on it, what their jobs are," for example, he says. "It's taking manual incident response and automating and documenting it.

"We don't change how incident response happens; we make sure it happens according to the way it's supposed to," he says. And it's an external site, so IR isn't performed on your network, which is a risky approach, he says.

Schneier says the security industry has invested a lot of money in prevention and detection of breaches. "There are response [providers] ... you can call in Mandiant, and they can parachute people in and make it better," for example, he says. But there's a lack of IR product investment in the industry today, he says.

"Everyone agrees in this post-breach society that you're breached, whether you know it or not," says Ted Julian, chief marketing officer at Co3 Systems. "So [incident] response is more important than ever."

Schneier is also a fellow at the Berkman Center for Internet and Society at Harvard Law School, a program fellow at the New America Foundation's Open Technology Institute, a board member of the Electronic Frontier Foundation, and an Advisory Board Member of the Electronic Privacy Information Center. He has authored 12 books, including "Applied Cryptography" and "Liars and Outliers," and his Schneier on Security blog is well-known in the industry.

Bruce Schneier

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-3304
Published: 2014-10-30
Directory traversal vulnerability in Dell EqualLogic PS4000 with firmware 6.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the default URI.

CVE-2013-7409
Published: 2014-10-30
Buffer overflow in ALLPlayer 5.6.2 through 5.8.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in a .m3u (playlist) file.

CVE-2014-3446
Published: 2014-10-30
SQL injection vulnerability in wcm/system/pages/admin/getnode.aspx in BSS Continuity CMS 4.2.22640.0 allows remote attackers to execute arbitrary SQL commands via the nodeid parameter.

CVE-2014-3584
Published: 2014-10-30
The SamlHeaderInHandler in Apache CXF before 2.6.11, 2.7.x before 2.7.8, and 3.0.x before 3.0.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted SAML token in the authorization header of a request to a JAX-RS service.

CVE-2014-3623
Published: 2014-10-30
Apache WSS4J before 1.6.17 and 2.x before 2.0.2, as used in Apache CXF 2.7.x before 2.7.13 and 3.0.x before 3.0.2, when using TransportBinding, does properly enforce the SAML SubjectConfirmation method security semantics, which allows remote attackers to conduct spoofing attacks via unspecified vect...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.