Category: "IT Security"

About the IT Security category

  22:30, by Hagai Bar-El   , 57 words
Categories: IT Security

The IT Security category contains essays that discuss security aspects of corporate and personal information systems. Also included are personal and corporate security policy issues, as well as operations security. Examples for topics that fall into this category are: malware detection, network firewalls and attacks prevention, deployment of encryption technologies, protection of privacy in deployed systems, etc.

Pages: 1 2 4 5

  2010-03-24

InZero provides some security

  22:25, by Hagai Bar-El   , 826 words
Categories: IT Security, Counter-media
I was just made aware of InZero, a new physical device that you connect to your PC, and your browsing becomes secure. I find it amazing that some people treat it as among the most revolutionary of security solutions. I think the InZero device is cool.… more »

  2009-09-02

A business model based on people making bad security trade-offs

  22:24, by Hagai Bar-El   , 483 words
Categories: IT Security, Counter-media
From time to time I am exposed to a new service, sometimes security-related, that promises something new. More often than not, the new security service is novel, but only because either no one really needs it, or because it does not form a good balance… more »

  2006-09-11

PDAs in highly classified environments

  21:40, by Hagai Bar-El   , 820 words
Categories: IT Security
For a while IT security professionals are warning against the impacts of Personal Digital Assistants (PDAs) on corporate security. A PDA can be lost or stolen and lead to undesired disclosure of the information that is on it. The emerging of… more »

  2006-05-07

Is E-mail encryption really too complex?

  21:32, by Hagai Bar-El   , 567 words
Categories: IT Security
Every once in a while we read yet another article revealing the level to which e-mail encryption is uncommon. The last one I saw is here. Whenever the debate is raised about how come e-mail encryption is so seldom used, we hear the common opinion that… more »

  2005-11-12

Evaluating Commercial Counter-Forensic Tools

  21:30, by Hagai Bar-El   , 548 words
Categories: IT Security, Sources
I have just enjoyed reading "Evaluating Commercial Counter-Forensic Tools" by Matthew Geiger from Carnegie Mellon University. The paper presents failures in commercially-available applications that offer covering the user's tracks. These applications… more »

  2005-10-24

Anonymity -- great technology but hardly used

  21:27, by Hagai Bar-El   , 581 words
Categories: IT Security
It's hard not to appreciate the long way we did in studying anonymity and pseudonymity. We know a lot and can do a lot. Each time I read on a zero-knowledge scheme or on another untraceable digital cash I am amazed by the amount of knowledge that the… more »

  2005-06-04

Trojan-Horse Espionage in Israel -- A Tip of an Iceberg

  21:22, by Hagai Bar-El   , 661 words
Categories: IT Security
About one week ago, a serious commercial espionage system was discovered in Israel. For years, several large-scale companies in Israel enjoyed inside information about their competitors using private investigators who were using a Trojan horse… more »

1 2 4 5