Pages: 1 2 4 ...6 ...7 8 9 10 11 12 ... 16

  2015-11-30

The status of Truecrypt (2nd edition)

  By Hagai Bar-El   , 419 words
Categories: IT Security

It has been a while since Truecrypt was discontinued. While it still works on most platforms, including new Windows machines (except for the full-disk-encryption on some of them), and while there still is no evidence to indicate that it is insecure, users of Truecrypt find the situation bothersome; and for a good reason. By now it seems obvious than an alternative has to be found.

Read more »

  2015-11-27

Valuable pieces of personal information and how to protect them

  By , 1268 words
Categories: Day-to-Day Security Advice

Hackers and legitimate companies share one thing in common: both want your personal information. Though the exact method of collection and type of information will vary, the results can often be the same. Loss of privacy and the compromise of your personal safety can all ensue when your data falls into the wrong hands.

But what information are they after? From your hair color to your bank account number, there’s a lot of stuff to learn about you. By knowing exactly what data to protect, you can better prevent breaches of your personal security. In addition, having the right tools on hand to protect your information will make your life a lot simpler.

Read more »

  2015-10-06

GSA Executive Forum

  By Hagai Bar-El   , 44 words
Categories: Personal News, Sources

I will be speaking at the GSA Israel Executive Forum on October 14,2015.

The keynote I will deliver is titled: “Security: the Key Challenge to IoT Adoption”.

For more information visit the event website.

Added on 2015-10-15: You can find the keynote slide-deck attached to this post.

 

  2015-08-05

Unsafe IoT safes

  By Hagai Bar-El   , 154 words
Categories: Security Engineering, Cyber Security

I have been saying that one of the challenges with securing IoT is that IoT device makers don’t have the necessary security background, and the security industry does not do enough to make cyber-security more accessible to manufacturers. We should therefore not be surprised that 150 years of experience in making robust safes and transferring money securely, did not help Brinks once they introduced a USB slot into one of their new models.

Read more »

  2015-07-30

Discretix Technologies is now part of ARM

  By Hagai Bar-El   , 144 words
Categories: Personal News

Discretix Technologies, a.k.a., Sansa Security, was acquired by ARM, as was now announced. I have been working with Discretix since its day of establishment, 15 years ago. I have been serving as its CTO and as the head of its CTO Office since January 2012.

Read more »

  2015-07-29

CyberDay lecture on IoT security challenges

  By Hagai Bar-El   , 41 words
Categories: Personal News, Cyber Security

Today I attended CyberDay 2015, where I delivered a lecture titled “Challenges in Securing IoT”.

Read more »

  2015-07-22

Why secure e-voting is so hard to get

  By Hagai Bar-El   , 1708 words
Categories: Security Engineering, Security Policies, Cyber Security

A few days ago I gave a lecture about innovation and one topic that came up was the security of e-voting. It is widely accepted by the security community that e-voting cannot be made secure enough, and yet existing literature on the topic seems to lack high level discussion on the basis for this assumption.

Following is my opinion on why reliable fully digital e-voting cannot be accomplished given its threat and security models.

Read more »

1 2 4 ...6 ...7 8 9 10 11 12 ... 16


Form is loading...

  XML Feeds

Search

License

All contents are licensed under the Creative Commons Attribution license.