Pages: 1 3 5 ...6 ...7 8 9 10 11 12 ... 14

  2015-04-28

ARM Taiwan Security Seminar

  05:06, by Hagai Bar-El   , 205 words
Categories: Personal News
I will be speaking in the ARM Security Seminar in Taipei, Taiwan. The title of the talk is "Future proofing your security architecture". Following is the talk abstract: more »

  2015-03-01

My blog's 10th anniversary

  06:35, by Hagai Bar-El   , 287 words
Categories: Personal News
Today it is ten years since the first post on this blog was published. This blog superseded an email bulletin that I maintained for seven years beforehand. I am not the best blogger ever. I write much less frequently than I planned and wanted. Writing… more »

  2015-02-16

Book review: "Why Privacy Matters" by Glenn Greenwald

  07:50, by Hagai Bar-El   , 324 words
Categories: Security Policies, Sources
TED published an excellent talk: Why Privacy Matters, by Glenn Greenwald. Seldom do I call an online lecture "a must for all audience", but the TED lecture by Glenn Greenwald is worth such an enforcement. Glenn Greenwald is one of the key reporters who… more »

  2015-02-15

Top challenges of securing IoT

  22:03, by Hagai Bar-El   , 917 words
Categories: Security Engineering
As much as there is hype about the Internet of Things (IoT) and protecting it, there is no such thing as "IoT Security" per se. There is just the usual security engineering that is applied to IoT. Security engineering is about determining assets,… more »

  2015-02-11

Data about you is never thrown away

  11:01, by Hagai Bar-El   , 114 words
Categories: Personal News, Security Policies
I was quoted by The Enquirer saying that we shall all assume that data (from wearables and otherwise) that is collected by service providers will never be deleted. The data collected by wearables is only as protected as the network that holds it – and… more »

  2015-01-05

Shodan makes us all more secure

  05:46, by Hagai Bar-El   , 792 words
Categories: IT Security, Security Policies
Shodan is a search engine for computers.It allows to search for hosts on the Internet not by the text they serve but by their technical properties as they reflect in responses to queries. So is Shodan bad? Not at all. These are exactly the forces that make us all more secure. more »

  2014-12-06

The ease of hacking surveillance cams

  20:43, by Hagai Bar-El   , 30 words
Categories: Personal News, Security Engineering
An article and interview with me by Byron Acohido of ThirdCertainty about why surveillance cams are trivial to hack. The discussion also moves towards IoT in general. more »

1 3 5 ...6 ...7 8 9 10 11 12 ... 14