Categories: "Analysis"

About the Analysis category

  03:20, by Hagai Bar-El   , 48 words
Categories: Analysis

The Analysis category contains articles that discuss security analysis of requirements and analysis of solutions. This category is further divided into sub-categories that address cybersecurity (critical infrastructure and homeland security), IT security (deployment of IT security tools and operations), security engineering (the development of security tools), and policy.

Pages: 1 2 ...3 ... 5 ...7 ...8 9 10 11 12

  2013-09-15

How risky to privacy is Apple's fingerprint reader?

  22:11, by Hagai Bar-El   , 964 words
Categories: IT Security, Security Engineering
Congratulations to Apple for featuring a fingerprint reader as part of its new iPhone. It was reported by The Wall Street Journal here, in the blog of Bruce Schneier here, by Time Tech here, and in dozens of other places. Very much expectedly, this reve… more »

  2013-09-13

Protecting private data: with law or with technology?

  13:54, by Hagai Bar-El   , 954 words
Categories: Security Policies, Security, Counter-media
There is an ongoing debate on the need for new regulations that protect individuals' personal data. Regulation is said to be required to protect the personal data of citizens, consumers, patients, etc., both against corporate service providers… more »

  2013-07-06

The difference between Cyber Security and just Security

  19:24, by Hagai Bar-El   , 637 words
Categories: IT Security, Security Policies, Cyber Security, Counter-media
The concept of "Cyber Security" is surely the attention grabber of the year. All security products and services enjoy a boost in their perception of importance, and sales, by merely prepending the word "cyber" to their description. But how is cyber secu… more »

  2013-02-05

My new patent on a secure execution environment

  23:32, by Hagai Bar-El   , 119 words
Categories: Personal News, Security Engineering
I recently got a US patent application granted by the Patent and Trademark Office. The patent bears the title "Device, System, and Method of Securely Executing Applications". more »

  2012-03-08

Against the collection of private data: The unknown risk factor

  23:48, by Hagai Bar-El   , 734 words
Categories: Security Policies, Counter-media
I bet there are thousands of blog posts advocating privacy and explaining why people should resist governments and companies collecting personal data. I dare to write yet another one because I would like to make a couple of points that I have never seen… more »

  2012-03-02

Improving the security provided by Yubikey for local encryption

  23:47, by Hagai Bar-El   , 697 words
Categories: IT Security
In the previous post, I discussed the use of Yubikey for local encryption. I noted that Yubikey can store a long string that can be used as an encryption key, or a password. It provides no extra protection against key-loggers, but still allows to use… more »

  2012-02-26

Using Yubikey with constant keys

  23:46, by Hagai Bar-El   , 322 words
Categories: IT Security
Yubikey is the first one-time password generator I saw that can also emit a static password. When you press the button, a constant pre-defined string is entered, just as if it was typed on the keyboard. Is it more secure than typing the password on the… more »

1 2 ...3 ... 5 ...7 ...8 9 10 11 12