Categories: "Analysis"

About the Analysis category

  03:20, by Hagai Bar-El   , 48 words
Categories: Analysis

The Analysis category contains articles that discuss security analysis of requirements and analysis of solutions. This category is further divided into sub-categories that address cybersecurity (critical infrastructure and homeland security), IT security (deployment of IT security tools and operations), security engineering (the development of security tools), and policy.

Pages: 1 2 3 4 5 ...6 ... 8 ...10 ...11 12

  2010-05-19

Automobile hack: we should have known better

  22:28, by Hagai Bar-El   , 776 words
Categories: Security Engineering, Counter-media
No one in the automotive security industry could miss the recently published news article titled “Beware of Hackers Controlling Your Automobile”, published here, and a similar essay titled “Car hackers can kill brakes, engine, and more”, which can be… more »

  2010-03-24

InZero provides some security

  22:25, by Hagai Bar-El   , 826 words
Categories: IT Security, Counter-media
I was just made aware of InZero, a new physical device that you connect to your PC, and your browsing becomes secure. I find it amazing that some people treat it as among the most revolutionary of security solutions. I think the InZero device is cool.… more »

  2009-09-02

A business model based on people making bad security trade-offs

  22:24, by Hagai Bar-El   , 483 words
Categories: IT Security, Counter-media
From time to time I am exposed to a new service, sometimes security-related, that promises something new. More often than not, the new security service is novel, but only because either no one really needs it, or because it does not form a good balance… more »

  2009-07-24

Companies collect data on us --- so what?

  22:22, by Hagai Bar-El   , 865 words
Categories: Security Policies, Counter-media
It is very common among security people to take privacy issues seriously. When we hear that a particular service collects personal data on us, we get extremely anxious. We will not use services that collect personal data that are not necessary to render… more »

  2009-04-04

On the Purpose of Security Standards

  22:21, by Hagai Bar-El   , 960 words
Categories: Security Policies, Counter-media
An interesting article was published in Information Security Resources, titled: “Payment Card Industry Swallows Its Own Tail”. The author seems to claim that PCI DSS may not survive for long, because the various stakeholders are too busy blaming each… more »

  2009-03-06

Right, the kernel can access your encrypted volume keys. So what?

  22:19, by Hagai Bar-El   , 717 words
Categories: Security Engineering, Counter-media
On January 15th, TechWorld published an article called Encryption programs open to kernel hack. Essentially, it warns that the key to encrypted volumes, that is, to volumes of software-encrypted virtual drives, is delivered by the encryption application… more »

  2008-10-26

Twitter Terrorists -- Come On...

  02:00, by Hagai Bar-El   , 184 words
Categories: Security Policies
I could not miss this one in Wired.com. Then the presentation launches into an even-more theoretical discussion of how militants might pair some of these mobile applications with Twitter, to magnify their impact. After all, “Twitter was recently used a… more »

1 2 3 4 5 ...6 ... 8 ...10 ...11 12