Schneier is a man whose security credentials are impeccable, who's probably the world's top security technologist. At the same time, he can talk about security concepts to a teenager - and the kid will understand exactly what he's saying.
When you realise that this same man is an inventor of the Blowfish, Twofish and Yarrow algorithms, then you begin to understand what the word intellectual means.
In his mid-forties, Schneier is a much less phsyically imposing presence than I thought he would be. But once he starts talking, he just grabs your attention.
He spoke to iTWire soon after he had delivered his keynote, "Reconceptualising Security", on day one of the LCA.
iTWire: Let's begin with a bit of geography and history. Which part of the US are you from? Where were you born, where did you study?
Bruce Schneier: I'm from New York, which you can probably tell by my style. I live in Minneapolis. My undergraduate degree is in physics, from the University of Rochester, New York. And my post-graduate degree is in Computer Science from American University in Washington DC. So that's sort of my academic resume. I started working at the US department of defence in security cryptography and security deployment. Then I worked for a start-up in the Chicago area and then for AT&T Bell Labs, and then in 1991 I set out on my own with Counterpane Consulting which became Counterpane Internet Security in 1999, and was purchased by BT in 2006.
What were you like as a little boy, in primary school?
I don't even know how to answer that question. I was regular, we were the smart kids. I mean, when you grow up in New York City, there are always programmes for smart kids. So they'll put them all in one class or two classes. I always had the benefit of being able to be put in classes for smart kids all through high school.
How did you come to take up physics?
That was in college, and I think I took it because it was what I liked, because it was math, but had real world applications. And that's what I got my degree in. But I always enjoyed it. In security, it was like more of a mindset than anything else. And back then there were hardly any computer science departments. So it was still very, very new.
ITWIRE SERIES - REVENUE-CRITICAL APPS UNDERPERFORMING?Avoid War Room Scenarios and improve handling of critical application problems:
• Track all transactions, end-to-end, all the time and know what your users experience 24/7
• View code level details with context and repair problems quickly
• Fix problems in minutes before they wreak havoc
• Optimize your most important applications, Java, .NET, PHP, C/C++ and many more
Start your free trial today!
ITWIRE SERIES - IS YOUR BACKUP STRATEGY COSTING YOU CLIENTS?Where are your clients backing up to right now?
Is your DR strategy as advanced as the rest of your service portfolio?
What areas of your business could be improved if you outsourced your backups to a trusted source?
Read the industry whitepaper and discover where to turn to for managed backup
A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.