Pages: 1 2 3 ...4 ... 6 ...8 ...9 10 11 12 ... 14

  2014-04-03

My new patent on secure key provisioning

  12:02, by Hagai Bar-El   , 151 words
Categories: Personal News, Security Engineering
I recently got a US patent application granted by the Patent and Trademark Office. The patent bears the title "Methods Circuits Devices and Systems for Provisioning of Cryptographic Data to One or More Electronic Devices". more »

  2014-02-01

CyberTech 2014

  21:10, by Hagai Bar-El   , 438 words
Categories: IT Security, Cyber Security, Events, Counter-media
I attended CyberTech 2014 on January 27th-28th. CyberTech is a meaningful conference for technologies related to cyber security. There were both lectures and an exhibition. more »

  2014-01-29

SnapChat and client authentication

  21:37, by Hagai Bar-El   , 25 words
Categories: Security Engineering
I have written a post about the SnapChat hack, and what it can teach us on the need for secure execution and secure client authentication. more »

  2013-12-28

Book review: Little Brother

  11:25, by Hagai Bar-El   , 336 words
Categories: Security Policies, Sources, Security
I have just finished reading Little Brother by Cory Doctorow. more »

  2013-09-15

How risky to privacy is Apple's fingerprint reader?

  22:11, by Hagai Bar-El   , 964 words
Categories: IT Security, Security Engineering
Congratulations to Apple for featuring a fingerprint reader as part of its new iPhone. It was reported by The Wall Street Journal here, in the blog of Bruce Schneier here, by Time Tech here, and in dozens of other places. Very much expectedly, this reve… more »

  2013-09-13

Protecting private data: with law or with technology?

  13:54, by Hagai Bar-El   , 954 words
Categories: Security Policies, Security, Counter-media
There is an ongoing debate on the need for new regulations that protect individuals' personal data. Regulation is said to be required to protect the personal data of citizens, consumers, patients, etc., both against corporate service providers… more »

  2013-07-06

The difference between Cyber Security and just Security

  19:24, by Hagai Bar-El   , 637 words
Categories: IT Security, Security Policies, Cyber Security, Counter-media
The concept of "Cyber Security" is surely the attention grabber of the year. All security products and services enjoy a boost in their perception of importance, and sales, by merely prepending the word "cyber" to their description. But how is cyber secu… more »

1 2 3 ...4 ... 6 ...8 ...9 10 11 12 ... 14