Categories: "Endorsement"

Pages: 1 2

  2015-10-06

GSA Executive Forum

  16:18, by Hagai Bar-El   , 44 words
Categories: Personal News, Sources

I will be speaking at the GSA Israel Executive Forum on October 14,2015.

The keynote I will deliver is titled: "Security: the Key Challenge to IoT Adoption".

For more information visit the event website.

Added on 2015-10-15: You can find the keynote slide-deck attached to this post.

 

  2015-05-24

Book review: "Creativity, Inc." by Ed Catmull

  23:50, by Hagai Bar-El   , 190 words
Categories: Sources

This is an untypical management book. Aside of the fact that it is very well written, it is full of insights that you can actually relate to and use. It makes sense, and unlike other management books that "make sense" because they preach obvious trivialities, this one brings up points that are truly insightful.

Full story »

  2015-02-16

Book review: "Why Privacy Matters" by Glenn Greenwald

  07:50, by Hagai Bar-El   , 324 words
Categories: Security Policies, Sources

TED published an excellent talk: Why Privacy Matters, by Glenn Greenwald.

Seldom do I call an online lecture "a must for all audience", but the TED lecture by Glenn Greenwald is worth such an enforcement. Glenn Greenwald is one of the key reporters who published material based on the leaks of Edward Snowden. He also wrote a good book about it called "No Place to Hide"; a book on which I wrote a review about 6 months ago.

If you know that privacy is important, but cannot explain why people who've done nothing wrong need it, or worse yet, if you really do not see why a surveillance state is bad also for law-abiding citizens, then you must listen to this. It packs hours of social, psychological, and public policy discussions into a few minutes.

Full story »

  2014-09-06

Book review: "No place to hide" by Glenn Greenwald

  21:14, by Hagai Bar-El   , 411 words
Categories: Sources

I just finished reading the book "No Place to Hide", by the journalist Glenn Greenwald. The book talks about the revelations from Edward Snowden on the actions taken by the NSA, as well as about their implications. It is not the  book you can't take your hands off, but it is certainly a worthy read and conveys a very well elaborated message.

Full story »

  2014-07-24

TrueCrypt alternatives?

  22:23, by Hagai Bar-El   , 660 words
Categories: IT Security, Products

It has been a while since the announcement of the demise of TrueCrypt (which I reported), and an equivalent replacement for all those people who rely on it is not yet evident. TrueCrypt did not revive yet, but the situation is not time-wise critical as it may have seemed. There are a few options, for the time being.

Full story »

  2014-05-30

The status of TrueCrypt

  07:40, by Hagai Bar-El   , 564 words
Categories: IT Security, Products

I wish I knew where TrueCrypt stands now, but I don't. I follow TrueCrypt and regularly endorse it  ever since I discovered it and wrote this post nine years ago. TrueCrypt was, and may still be, the most sensible and presumably-secure volume and full-disk encryption software for Windows; also supporting Linux and Mac. A few days ago the project discontinued, and users were directed to alternative, non-open-source solutions.

Full story »

  2014-02-01

CyberTech 2014

  21:10, by Hagai Bar-El   , 438 words
Categories: IT Security, Cyber Security, Events, Counter-media

I attended CyberTech 2014 on January 27th-28th. CyberTech is a respectable conference for technologies related to cyber-security. The conference consisted of lectures and an exhibition. The lectures were most given by top notch speakers from the security space, both from the public sector and from the private sector; most being highly ranked executives. The exhibition sported companies ranging from the largest conglomerates as IBM and Microsoft, to garage start-ups.

I am easy to disappoint by cyber-security conferences. Simply put, there are more cyber-security conferences than what the security industry really has to say. This implies that for the security architect or practitioner, most cyber-security conferences lack sufficient substance. I take CyberTech 2014 with mixed emotions too. The exhibition showed interesting ideas, especially by start-ups, while the lectures left more to wish for.

Full story »

1 2