Feeds

Post-BT crypto guru Schneier gets new gig at startup

Securo-boffin to join incidents response firm

3 Big data security analytics techniques

Famed cryptographer and security guru Bruce Schneier has moved on from his seven years at BT. Just one month later, he has accepted the role of CTO at incident response startup Co3 Systems.

Schneier left BT last month following a seven-year association with the telco giant by mutual consent. Both parties were keen to stress that the working relationship had come to its natural end, dismissing suggestions that Schneier's recent criticism of the NSA's dragnet surveillance programmes had precipitated his departure.

Co3 Systems makes co-ordination software for incident response. Schneier had previously served on Co3 Systems' advisory board and by joining the firm full time he will be reunited in a working partnership with people he worked with at Counterpane Internet Security prior to the security services firm's purchase by BT in October 2006. John Bruce, Co3's chief exec, formerly served as executive vice president of marketing at Counterpane.

"I'm pretty excited about this," Schneier told El Reg in an email. "It's good to be back at a startup. Plus, John Bruce and I worked together at Counterpane, so we both know exactly what we're getting ourselves into.

"Remember protection, detection, and response?  Counterpane was about the second.  Co3 is about the third.  It's something we should have done at Counterpane, and probably would have had BT not purchased us in 2006," he added.

More details about the move can be found in a post on Schneier's personal blog here.

In a statement, Co3 Systems said Schneier role in the startup "will be to inform and guide Co3's technology and business strategy, evangelizing the 'responsive security' model that he has advocated for many years."

Schneier's a busy guy. As well as writing numerous books on information security and cryptography over the past few years, Schneier also currently serves as a fellow at the Berkman Center for Internet and Society at Harvard Law School; is a program fellow at the New America Foundation's Open Technology Institute; a board member of the Electronic Frontier Foundation; and an Advisory Board Member of the Electronic Privacy Information Center. ®

3 Big data security analytics techniques

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.