Pages: 1 ... 5 6 7 ...8 ... 10 ...12 ...13 14 15 16

  2011-06-20

The Difference Between Content Protection and Cyber Security

  By Hagai Bar-El   , 1156 words
Categories: Security Engineering

A few days ago I was presented with an interesting question: What is the difference between Content Protection and Cyber Security? These domains of Information Security are so different and unrelated, that the difference in their definition is more or less the entire definition of both. This question, however, was asked in the context of the factors that make each of these problems hard to solve. Both problems are hard ones, and seem to require more than the state of the art in security can provide; yet they are hard problems for completely different reasons.

Read more »

  2011-04-28

CAcert as a certification alternative

  By Hagai Bar-El   , 1011 words
Categories: IT Security, Counter-media

A few months ago, I wrote about the problem that emerges from having to rely on digital certificates that are issued by Certification Authorities of which we, the relying parties, are not the paying customers. As a result, we rely on the CA (Certification Authority) certification process, while there is no economic incentive for the CA to actually maintain a robust certification mechanism and to justify our trust.

Unexpectedly, this post, titled “The Inevitable Collapse of the Certificate Model”, quickly became the favorite post on my blog, pulling more views than all other individual posts.

One alternative that was suggested is by CAcert.org, a community based certification organization. Here are my thoughts on the ability of such a mechanism to solve the certification problem.

Read more »

  2011-03-20

Understanding the Impact of the RSA SecurID Breach

  By Hagai Bar-El   , 849 words
Categories: IT Security

A few days ago, we were notified (e.g., here and here) that a hack into the network of RSA Security (the security division of EMC) has led to someone stealing something that is related to the SecurID token product.

We cannot determine the real impact of this security breach until RSA Security tells us what exactly got stolen. I believe that this information will be made available, as a result of legal or public pressure, if for no other reason. Until this data becomes available, let us examine the two most probable options, and how we may respond to each.

Read more »

  2011-03-05

Book review: The Myths of Innovation, by Scott Berkun

  By Hagai Bar-El   , 220 words
Categories: Sources

I have just finished reading The Myths of Innovation by Scott Berkun. This 248-pages book describes how the work on innovation, and innovation in general, deviate from how we often perceive it, and from how it is presented by the media. It essentially carries the message that innovation is not some “magic” happening, but rather it is a lot of hard work, often carried out by many people.

Read more »

  2011-02-15

The Future of Content Protection on Open Platforms, Such as Android

  By Hagai Bar-El   , 824 words
Categories: Security Engineering

The emergence of the Android Operating System for mobile devices is said to have put the content protection industry in trouble. This is probably true. However, for sake of accuracy, it has not introduced wholly new problems as it worsened existing ones, in an overall situation that was never easy to start with. Let us see what open Operating Systems such as Android have changed, and how the content protection industry may go about to overcome these new-old difficulties.

Read more »

  2011-02-07

Tips for Submitting Proposals to EU FP7 (now H2020) and Others

  By Hagai Bar-El   , 994 words
Categories: Security Policies

Among the work I do is the evaluation of research proposals for the Framework Program 7 (FP7), and now H2020, of the European Commission. I review research proposals that are submitted in response to calls that are related to information security. Truthfully, this work is among the more interesting of projects I am involved with.

On account of this occupation of mine, for a few years already, I consider myself authoritative to bring up the following tips to whoever intends to submit a research proposal for European, or other, funding.

Read more »

  2011-01-28

Cyber-war Risk Exaggerated?

  By Hagai Bar-El   , 700 words
Categories: Security Policies, Cyber Security, Counter-media

A ZDNet article, Cyber-war risk is exaggerated, says OECD study, points to what seems as a thorough study that concluded with the stated result. I never read this study, but from the article one can point one point in which it is probably right and one point in which it is probably wrong.

Read more »

1 ... 5 6 7 ...8 ... 10 ...12 ...13 14 15 16


Form is loading...

  XML Feeds

Search

License

All contents are licensed under the Creative Commons Attribution license.