Israeli software innovation
Saw this item on the Israeli Export Institute Web site – unfortunately the article quoted on redorbit.com doesn’t exist anymore. Someone didn’t pay their advertising bill? As a special tribute to the Israeli software industry, while the state of Israeli celebrates its 60th anniversary, the redorbit.com website sums up some of the major achievements of […]
Myths, Bugs, and Ephemeral Limitations
Pop quiz – what is the limit on a HTTP GET request or HTTP PUT request? Does it have to do with the server/browser or RFC2086? Check this
Digital Terrestrial TV in Japan
A year ago, I worked with Joel Isaacson on a VOD / IPTV project – and I’m still pretty interested in whats happening in digital media – especially since we got to say “I told you so”. (we predicted the death of Blu-Ray and the rise of video download two years ago). This note is from […]
A buyer’s guide to network DLP
My friend David Etue, who is VP Product Management over at Fidelis Security Systems has been writing a work in progress over the past couple years called A buyer’s guide to network DLP As David writes – Network data leakage prevention (network DLP) is the process of stopping the unauthorized disclosure of digital assets out […]
Using threat modeling to select and justify security purchases
Hot humint straight in from the field of data security. I don’t have Symantec’s marketing budget and head count or Gartner reports telling me that enterprise concerns about high impact data loss events are up. By my clients, data security awareness is up, but budgets are down and out. I think that vendors with strong […]
Preventing intellectual property abuse
One of my pet peeves with security vendors like Symantec, Vontu, Websense and Checkpoint is marketing collateral that totally disregards the basics of security – it’s like they hired an English major straight out of school and told them to start writing. Sensitive assets, confidential assets, proprietary assets – you can make a total mishmash […]
Orange Israel customer service sucks
I have been an Orange mobile subscriber for over 10 years – since they launched and I’m generally very happy with the operation of the network but it’s clear that if they managed their mobile network with the same incompetence that they manage their online services – Partner would have gone bankrupt years agao. Orange […]
Microsoft browser vulnerabilities and the police
The Polish Police did an IT modernization project in 2008 for installing mobile terminals in police cars. The software in the mobile terminal uses Microsoft IE. Since the mobile terminals use Microsoft IE – it should be possible to attack the mobile terminal using one of the known IE software vulnerabilities
Invisibility cloak
DIdn’t you want one of those invisibility cloaking devices back when you were in High School? I sure did – but I grew up on Star Trek According to the Discovery Channel – we’re within 6 months of a cloaking device – the only catch is that it will only be good for 2D surfaces. […]
Cloud computing, buzz-word du-jour
The buzzword du-jour in the current economic crash of 2008 is “Cloud Computing”. There are several interesting question around cloud computing – why now, how are people building it, what are people doing with it and what about security. 1) Why now? Back in 2001 after the dot com crash, On-demand / SaaS started picking […]