Talking Points

Sausner, Rebecca
September 2006
Bank Technology News;Sep2006 Supplement, Vol. 19, p13
Trade Publication
The article presents an interview with Bruce Schneider, founder and chief technical officer of Counterpane Internet Security in the U.S. Schneider was asked about the remote authentication over the Internet and that financial institutions spend millions of investment in information technology but negligible drops in fraud and identity theft.


Related Articles

  • Feel insecure? Give outsourcing a go. Berinato, Scott; Petersen, Scot // eWeek;05/22/2000, Vol. 17 Issue 21, p14 

    Reports that several computer-security technology vendors in the United States are expanding their offerings to accommodate managed security services. Axent Technologies Inc.'s launch of its overarching managed security services model under the ServiceShield brand; Components of Axent's...

  • Of Firewalls, Consultants And, Yes, Hacker Insurance. Albright, Peggy // Wireless Week;07/24/2000, Vol. 6 Issue 30, p30 

    Reports on the hacker insurance policy for wireless operators offered by Conterpane Internet Security of San Jose, California. Coverage of the insurance policy; Cost of coverage for Counterpane clients; Perpetrators of security violations. INSET: A Second Look At Hacker Insurance.

  • Humans on Watch. Desmond, Paul H.; Hardling, Elizabeth U.; Waters, John K. // Software Magazine;Jun/Jul2000, Vol. 20 Issue 3, p12 

    Focuses on managing computer security systems. Comment from Bruce Schneider, chief technical officer of Counterpane Internet Security Inc., on security as a process; Information on human interface offered by Counterpane; Statement issued by David Trapper, research analyst, on the demand for...

  • DynTeck and Counterpane partner to provide network security for homeland defense. McHale, John // Military & Aerospace Electronics;Sep2002, Vol. 13 Issue 9, p3 

    Reports the partnership between DynTek company and Counterpane Internet Security Inc. in California. Efforts of the partners to provide network security for homeland defense; Prevention against cyber terrorism; Details on the agreed terms and conditions.

  • ID cards are a waste, says security guru. Goodwin, Bill // Computer Weekly;3/8/2005, p16 

    The article presents information according to which identification cards, ID cards are of no importance. Security author and chief technology officer of Internet security group Counterpane, Bruce Schneier tells "Computer Weekly," why ID cards could exacerbate crime and why the only way to beat...

  • OnGuard >> Counterpane monitors activity logs. Duvall, Mel // Inter@ctive Week;04/17/2000, Vol. 7 Issue 15, p57 

    Presents news briefs on the Internet industry in the United States as of April 17, 2000. Security monitoring service launched by Counterpane Internet Security; EDoctor service introduced by Trend Micro; Participation of Baltimore Technologies in a program for the Federal Bridge Certification...

  • Security needs spawn services. Messmer, Ellen // Network World;04/03/2000, Vol. 17 Issue 14, p1 

    Reports on the growing popularity of managed security services that can identify denial-of-service attacks or other threats to computer networks. Monitoring of customers' internal servers and network traffic; Offerings from such firms as Internet Security Systems, Counterpane Systems and Pilot...

  • Custom-fit security apps. Fisher, Dennis // eWeek;03/19/2001, Vol. 18 Issue 11, p1 

    Reports on the evolution of managed security services from one-size-fits-all services into unique, proactive offerings tailored to the individual customer. Focus on gathering real-time intelligence on attacks, vulnerabilities and exploits; Use of data mining and artificial intelligence...

  • The insider.  // ComputerWorld Hong Kong;1/10/2008, Vol. 25 Issue 1, p12 

    An interview with Bruce Schneier, founder and chief technology officer (CTO) of Counterpane, is presented. He offers his view on the computer security problem. He believes that law enforcement officials should improve on prosecuting criminals in order to prevent computer crimes. When asked about...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics