Category: "Counter-media"

About the Counter-Media category

  21:11, by Hagai Bar-El   , 172 words
Categories: Counter-media

One of the main objectives of this blog is to put security related facts and events in the correct perspective.  This is needed in cases where the traditional media has its own objective of blowing news out of proportion. The security media, often sponsored either by advertisers or by product vendors, has an occasional tendency of disseminating FUD (fear, uncertainty, and doubt) more than necessary. For example, they can take a single unattributed compromise of a web-server and shout that "cyberwar is here".

Without arguing who is right, many of the posts in this blog bring forward the other side of the coin. They show a different perspective than that shown by other sources. The goal is never controversy in its own right; it is to make the reader truly informed, by showing the angle that doesn't get the headlight.

The counter-media category consists of such posts that present perspectives, insights, and opinions, that may differ substantially from those typically presented by the media, and by that provide food for independent thought.

 

Pages: 1 3

  2017-10-13

For and against security checklists, frameworks, and guidelines

  18:03, by Hagai Bar-El   , 636 words
Categories: Security Engineering, Security, Cyber Security, Counter-media
We have seen many of those by now. Starting with old ones like FIPS 140, and concluding with more recent additions as the NIST CSF (Cyber Security Framework). The question is: are whose worth my time? What are they good for? Do we need to adhere to them? In a nutshell, I think they have their value, and need to be consulted, but not worshiped. more »

  2016-01-12

Bruce Schneier on Israeli export control

  22:09, by Hagai Bar-El   , 650 words
Categories: Security Policies, Counter-media
I usually agree with the opinions expressed by Bruce Schneier. Seldom do I think that he is dead wrong, and yet less often do I think that an essay of his is bluntly unsubstantiated. About a month ago, he published such a post, titled: How Israel Regulates Encryption. He quoted a research that sounds sensible, but ended up interpreting it entirely wrongly, in my opinion. more »

  2014-04-09

OpenSSL "Heartbleed" bug: what's at risk on the server and what is not

  22:56, by Hagai Bar-El   , 1223 words
Categories: IT Security, Cyber Security, Counter-media
A few days ago, a critical bug was found in the common OpenSSL library. OpenSSL is the library that implements the common SSL and TLS security protocols. These two (similar) protocols facilitate the encrypted tunnel feature that secure services -- over… more »

  2014-04-03

Bitcoin does not provide anonymity

  22:22, by Hagai Bar-El   , 762 words
Categories: Security Engineering, Security Policies, Security, Counter-media
When people discuss Bitcoin, one of its properties that is often considered is its presumable anonymity. In this respect, it is often compared to cash. However, it shall be recognized and understood that Bitcoin is not as anonymous as cash; far from it,… more »

  2014-02-01

CyberTech 2014

  21:10, by Hagai Bar-El   , 438 words
Categories: IT Security, Cyber Security, Events, Counter-media
I attended CyberTech 2014 on January 27th-28th. CyberTech is a meaningful conference for technologies related to cyber security. There were both lectures and an exhibition. more »

  2013-09-13

Protecting private data: with law or with technology?

  13:54, by Hagai Bar-El   , 954 words
Categories: Security Policies, Security, Counter-media
There is an ongoing debate on the need for new regulations that protect individuals' personal data. Regulation is said to be required to protect the personal data of citizens, consumers, patients, etc., both against corporate service providers… more »

  2013-07-06

The difference between Cyber Security and just Security

  19:24, by Hagai Bar-El   , 637 words
Categories: IT Security, Security Policies, Cyber Security, Counter-media
The concept of "Cyber Security" is surely the attention grabber of the year. All security products and services enjoy a boost in their perception of importance, and sales, by merely prepending the word "cyber" to their description. But how is cyber secu… more »

1 3