Categories: "Analysis"

About the Analysis category

  03:20, by Hagai Bar-El   , 48 words
Categories: Analysis

The Analysis category contains articles that discuss security analysis of requirements and analysis of solutions. This category is further divided into sub-categories that address cybersecurity (critical infrastructure and homeland security), IT security (deployment of IT security tools and operations), security engineering (the development of security tools), and policy.

Pages: 1 2 4 5 ...6 ...7 8 9 10 11 12

  2015-07-29

CyberDay lecture on IoT security challenges

  13:03, by Hagai Bar-El   , 41 words
Categories: Personal News, Cyber Security
Today I attended CyberDay 2015, where I delivered a lecture titled "Challenges in Securing IoT". more »

  2015-07-22

Why secure e-voting is so hard to get

  23:07, by Hagai Bar-El   , 1708 words
Categories: Security Engineering, Security Policies, Cyber Security
Following is my opinion on why reliable fully digital e-voting cannot be accomplished given its threat and security models. more »

  2015-05-16

Running an effective security research team

  02:46, by Hagai Bar-El   , 2263 words
Categories: Management
I never bothered to publish any post about how to run an effective security research team. So here is a first post on this topic, with an anticipation for writing additional installments in the future. more »

  2015-02-16

Book review: "Why Privacy Matters" by Glenn Greenwald

  07:50, by Hagai Bar-El   , 324 words
Categories: Security Policies, Sources
TED published an excellent talk: Why Privacy Matters, by Glenn Greenwald. Seldom do I call an online lecture "a must for all audience", but the TED lecture by Glenn Greenwald is worth such an enforcement. Glenn Greenwald is one of the key reporters who… more »

  2015-02-15

Top challenges of securing IoT

  22:03, by Hagai Bar-El   , 917 words
Categories: Security Engineering
As much as there is hype about the Internet of Things (IoT) and protecting it, there is no such thing as "IoT Security" per se. There is just the usual security engineering that is applied to IoT. Security engineering is about determining assets,… more »

  2015-02-11

Data about you is never thrown away

  11:01, by Hagai Bar-El   , 114 words
Categories: Personal News, Security Policies
I was quoted by The Enquirer saying that we shall all assume that data (from wearables and otherwise) that is collected by service providers will never be deleted. The data collected by wearables is only as protected as the network that holds it – and… more »

  2015-01-05

Shodan makes us all more secure

  05:46, by Hagai Bar-El   , 792 words
Categories: IT Security, Security Policies
Shodan is a search engine for computers.It allows to search for hosts on the Internet not by the text they serve but by their technical properties as they reflect in responses to queries. So is Shodan bad? Not at all. These are exactly the forces that make us all more secure. more »

1 2 4 5 ...6 ...7 8 9 10 11 12