Pages: 1 2 4 ...6 ...7 8 9 10 11 12 ... 15

  2015-04-28

ARM Taiwan Security Seminar

  By Hagai Bar-El   , 205 words
Categories: Personal News
I will be speaking in the ARM Security Seminar in Taipei, Taiwan. The title of the talk is "Future proofing your security architecture". Following is the talk abstract: more »

  2015-03-01

My blog's 10th anniversary

  By Hagai Bar-El   , 287 words
Categories: Personal News
Today it is ten years since the first post on this blog was published. This blog superseded an email bulletin that I maintained for seven years beforehand. I am not the best blogger ever. I write much less frequently than I planned and wanted. Writing… more »

  2015-02-16

TEDTalk review: "Why Privacy Matters" by Glenn Greenwald

  By Hagai Bar-El   , 324 words
Categories: Security Policies, Sources
TED published an excellent talk: Why Privacy Matters, by Glenn Greenwald. Seldom do I call an online lecture “a must for all audience", but the TED lecture by Glenn Greenwald is worth such an enforcement. Glenn Greenwald is one of the key… more »

  2015-02-15

Top challenges of securing IoT

  By Hagai Bar-El   , 917 words
Categories: Security Engineering
As much as there is hype about the Internet of Things (IoT) and protecting it, there is no such thing as "IoT Security" per se. There is just the usual security engineering that is applied to IoT. Security engineering is about determining assets,… more »

  2015-02-11

Data about you is never thrown away

  By Hagai Bar-El   , 114 words
Categories: Personal News, Security Policies
I was quoted by The Enquirer saying that we shall all assume that data (from wearables and otherwise) that is collected by service providers will never be deleted. The data collected by wearables is only as protected as the network that holds it – and… more »

  2015-01-05

Shodan makes us all more secure

  By Hagai Bar-El   , 792 words
Categories: IT Security, Security Policies
Shodan is a search engine for computers.It allows to search for hosts on the Internet not by the text they serve but by their technical properties as they reflect in responses to queries. So is Shodan bad? Not at all. These are exactly the forces that make us all more secure. more »

  2014-12-06

The ease of hacking surveillance cams

  By Hagai Bar-El   , 30 words
Categories: Personal News, Security Engineering
An article and interview with me by Byron Acohido of ThirdCertainty about why surveillance cams are trivial to hack. The discussion also moves towards IoT in general. more »

1 2 4 ...6 ...7 8 9 10 11 12 ... 15

Search

  XML Feeds

License

All contents licensed under the Creative Commons Attribution license.