{"id":27593,"date":"2019-07-01T15:00:08","date_gmt":"2019-07-01T15:00:08","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\/"},"modified":"2019-07-01T15:00:08","modified_gmt":"2019-07-01T15:00:08","slug":"dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\/","title":{"rendered":"Don&#8217;t tell Alice and Bob: Security maven Bruce Schneier is leaving IBM"},"content":{"rendered":"<p>Infosec veteran Bruce Schneier has said he&#8217;ll step down as a &#8220;special advisor&#8221; to IBM&#8217;s security business to, in part, focus his time on teaching the next generation of security pros.<\/p>\n<p>Schneier said he also wanted to focus on work with nonprofit projects including Tor and the Electronic Frontier Foundation (EFF), where he is a board member.<\/p>\n<p>The cryptographer, formerly BT&#8217;s <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2013\/12\/16\/bruce_schneier_leaves_bt\/\" rel=\"noopener noreferrer\">chief security technology officer<\/a>, has been writing about security since 1998 and has produced more than a dozen books, as well as hundreds of articles, essays and academic papers.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2019\/03\/07\/bruce.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"bruce\"><\/p>\n<h2 title=\"'Everything we do has a moral dimension ... we are responsible for the world we create with our technologies'\">Schneier: Don&#8217;t expect Uncle Sam to guard your web privacy \u2013 it&#8217;s Europe riding to the rescue<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2019\/03\/07\/policy_technology_schneier\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>Schneier started working at IBM <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2016\/02\/29\/confirmed_ibm_slurps_up_bruce_schneier_with_resilient_purchase\/\" rel=\"noopener noreferrer\">in 2016<\/a> after Big Blue snapped up his startup, Resilient Systems (previously called Co3), where he served as CTO, for a rumoured <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2016\/02\/24\/big_blue_slurps_resilient_systems\/\" rel=\"noopener noreferrer\">$100m<\/a>.<\/p>\n<p>Resilient developed an incident-response platform, which was eventually integrated with IBM&#8217;s Security Event and Incident Management (SEIM) system, called QRadar.<\/p>\n<p>The partnership started well enough. &#8220;Everything I&#8217;ve seen so far indicates that this will be a good home for me. They know what they&#8217;re getting, and they&#8217;re still keeping me on. I have no intention of changing what I write about or speak about \u2013 or to whom,&#8221; Schneier said <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.schneier.com\/blog\/archives\/2016\/04\/ibm_officially_.html\">at the time<\/a>.<\/p>\n<p>Three years later, he&#8217;s tossed his blue IBM blazer. For comparison, Schneier spent seven years as the CTO of another startup, Counterpane Internet Security. When Counterpane was acquired by BT, he spent another seven years as its security expert.<\/p>\n<p>Schneier describes himself as a public-interest technologist \u2013 which points to one of the potential reasons he might not continue working for a global corporations past his contract obligations.<\/p>\n<p>&#8220;I will continue to write and speak, and do the occasional consulting job,&#8221; <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.schneier.com\/blog\/archives\/2019\/06\/im_leaving_ibm.html\">he said<\/a> of his future plans. &#8220;I will continue to teach at the Harvard Kennedy School. I will continue to serve on boards for organizations I believe in: EFF, Access Now, Tor, EPIC, Verified Voting. And I will increasingly be an advocate for public-interest technology.&#8221;<\/p>\n<p>We&#8217;ll finish this post with a quote from the website <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.schneierfacts.com\/\">SchneierFacts<\/a>, which compares him to Chuck Norris: &#8220;Bruce Schneier only smiles when he finds an unbreakable cryptosystem. Of course, Bruce Schneier never smiles.&#8221;<\/p>\n<p>As Schneier himself has said: any person can invent a security system so clever that he or she can&#8217;t imagine a way of breaking it. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1842\/-7432\/balancing-consumerization-and-corporate-control?td=wptl1842\">Balancing consumerization and corporate control<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/07\/01\/dont_tell_alice_and_bob_security_guru_schneier_is_leaving_ibm\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Says bye to Big Blue Infosec veteran Bruce Schneier has said he&#8217;ll step down as a &#8220;special advisor&#8221; to IBM&#8217;s security business to, in part, focus his time on teaching the next generation of security pros.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":27594,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-27593","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Don&#039;t tell Alice and Bob: Security maven Bruce Schneier is leaving IBM 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Don&#039;t tell Alice and Bob: Security maven Bruce Schneier is leaving IBM 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-01T15:00:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Don&#8217;t tell Alice and Bob: Security maven Bruce Schneier is leaving IBM\",\"datePublished\":\"2019-07-01T15:00:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\\\/\"},\"wordCount\":423,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\\\/\",\"name\":\"Don't tell Alice and Bob: Security maven Bruce Schneier is leaving IBM 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm.jpg\",\"datePublished\":\"2019-07-01T15:00:08+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Don&#8217;t tell Alice and Bob: Security maven Bruce Schneier is leaving IBM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Don't tell Alice and Bob: Security maven Bruce Schneier is leaving IBM 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\/","og_locale":"en_US","og_type":"article","og_title":"Don't tell Alice and Bob: Security maven Bruce Schneier is leaving IBM 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-07-01T15:00:08+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Don&#8217;t tell Alice and Bob: Security maven Bruce Schneier is leaving IBM","datePublished":"2019-07-01T15:00:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\/"},"wordCount":423,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\/","url":"https:\/\/www.threatshub.org\/blog\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\/","name":"Don't tell Alice and Bob: Security maven Bruce Schneier is leaving IBM 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm.jpg","datePublished":"2019-07-01T15:00:08+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/dont-tell-alice-and-bob-security-maven-bruce-schneier-is-leaving-ibm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Don&#8217;t tell Alice and Bob: Security maven Bruce Schneier is leaving IBM"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=27593"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27593\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/27594"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=27593"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=27593"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=27593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}