Pages: 1 3 4 5 ...6 ...7 8 9 10 11 12 ... 14

  2016-01-12

Bruce Schneier on Israeli export control

  22:09, by Hagai Bar-El   , 650 words
Categories: Security Policies, Counter-media

I usually agree with the opinions expressed by Bruce Schneier. Seldom do I think that he is dead wrong, and yet less often do I think that an essay of his is bluntly unsubstantiated. About a month ago, he published such a post, titled: How Israel Regulates Encryption. He quoted a research that sounds sensible, but ended up interpreting it entirely wrongly, in my opinion.

Full story »

  2016-01-10

Job: Embedded Security Specialist

  17:24, by Hagai Bar-El   , 225 words
Categories: Jobs

I have an opening for an Embedded Security Specialist position for the Security Group of the IoT business unit of ARM, in Israel. Please write me through the contact form or by e-mail if you would like to apply.

Full story »

  2015-11-30

The status of Truecrypt (2nd edition)

  18:22, by Hagai Bar-El   , 419 words
Categories: IT Security

It has been a while since Truecrypt was discontinued. While it still works on most platforms, including new Windows machines (except for the full-disk-encryption on some of them), and while there still is no evidence to indicate that it is insecure, users of Truecrypt find the situation bothersome; and for a good reason. By now it seems obvious than an alternative has to be found.

Full story »

  2015-11-27

Valuable pieces of personal information and how to protect them

  17:37, by Cassie Phillips   , 1268 words
Categories: Day-to-Day Security Advice

Hackers and legitimate companies share one thing in common: both want your personal information. Though the exact method of collection and type of information will vary, the results can often be the same. Loss of privacy and the compromise of your personal safety can all ensue when your data falls into the wrong hands.

But what information are they after? From your hair color to your bank account number, there’s a lot of stuff to learn about you. By knowing exactly what data to protect, you can better prevent breaches of your personal security. In addition, having the right tools on hand to protect your information will make your life a lot simpler.

Full story »

  2015-10-06

GSA Executive Forum

  16:18, by Hagai Bar-El   , 44 words
Categories: Personal News, Sources

I will be speaking at the GSA Israel Executive Forum on October 14,2015.

The keynote I will deliver is titled: "Security: the Key Challenge to IoT Adoption".

For more information visit the event website.

Added on 2015-10-15: You can find the keynote slide-deck attached to this post.

 

Attachments:

  2015-08-05

Unsafe IoT safes

  21:07, by Hagai Bar-El   , 154 words
Categories: Security Engineering, Cyber Security

I have been saying that one of the challenges with securing IoT is that IoT device makers don't have the necessary security background, and the security industry does not do enough to make cyber-security more accessible to manufacturers. We should therefore not be surprised that 150 years of experience in making robust safes and transferring money securely, did not help Brinks once they introduced a USB slot into one of their new models.

Full story »

  2015-07-30

Discretix Technologies is now part of ARM

  13:52, by Hagai Bar-El   , 144 words
Categories: Personal News

Discretix Technologies, a.k.a., Sansa Security, was acquired by ARM, as was now announced. I have been working with Discretix since its day of establishment, 15 years ago. I have been serving as its CTO and as the head of its CTO Office since January 2012.

Full story »

1 3 4 5 ...6 ...7 8 9 10 11 12 ... 14