Pages: 1 ... 3 4 5 6 7 8 ...9 ...10 12 14


Last Major Label Plans to Ditch DRM Restrictions

  22:00, by Hagai Bar-El   , 240 words
Categories: Security Policies
No one who follows on DRM news could have missed this: Report: RIP DRM, as Last Major Label Plans to Ditch Restrictions: In a move certain to rock the distribution of digital music, Sony BMG is in the midst of finalizing plans to begin offering at least… more »


Making Standardization Committees Build More Secure Products

  21:58, by Hagai Bar-El   , 976 words
Categories: Security Policies
Lately I have been occupied once again with the specification of a security system as part of a standards committee. The identity of this standards body really does not matter. What does matter is that the process, just like its outcome, never improved.… more »


File Wiping and Disk-on-Key

  21:57, by Hagai Bar-El   , 522 words
Categories: Security Engineering
Most vendors selling security software that deals with removable devices or with flash storage mediums such as Disk-On-Key (DoK) provide the functionality of file wiping (often called shredding) from the removable medium. This feature allows the user to… more »


Survey About DRM Acceptance

  21:54, by Hagai Bar-El   , 384 words
Categories: Security Policies
About a month late I got to see this news item about a survey that results in a conclusion that people are finally getting used to DRM. Among other things, it says that: The overall messages from these studies are: higher-priced DRM-free downloads… more »


Countermeasures That Can't Be Modeled

  21:53, by Hagai Bar-El   , 800 words
Categories: Security Policies
A couple of nights ago I drove back from some family event and got pulled over by a cop. Okay, I agree that this for itself is not worth a blog post. The cop asked me to open the window, he looked at me, asked me where I come from and where I am going… more »


Rights Management Systems Versus "Simple" Data Encryption

  21:47, by Hagai Bar-El   , 156 words
Categories: Security Engineering
Here is a question that was raised in a discussion forum, along with my response to it. I figured it is interesting enough to post it here. Question: Why not just deploy a Enterprise Right Management solution instead of using various encryption tools to… more »


DHS wants DNSSEC keys -- so what?

  21:43, by Hagai Bar-El   , 369 words
Categories: Security Policies
The Department of Homeland Security (DHS) wants to have the root master keys of DNSSEC. This will allow them to fake DNS responses at will. Read all about it at: Homeland Security grabs for net's master keys Department of Homeland and Security wants… more »

1 ... 3 4 5 6 7 8 ...9 ...10 12 14