The death of the anti-virus

Does anti-virus really protect your data?   Additional security controls do not necessarily reduce risk. Installing more security products is never a free lunch and tends to increase the total system risk and cost of ownership, as a result of the interaction between the elements. We use the quantitative threat analysis tool – PTA that enables […]

What is your take on anti-virus in medical devices?

A check-box IT requirement for medical devices on the hospital network is installation of anti-virus software even though most devices don’t have network connectivity and as a result are running outdated AV engine and  signatures.  What is your take? Should device vendors continue to install anti-virus even though it’s not effective? Would you considering using […]

How to remove malware from a Windows PC

We provide software security, threat modeling and threat mediation in the medical device and healthcare space working with technology developers in Israel. How does this work? We evaluate your healthcare software system or medical device from an attacker point of view, then from the management team point of view, and then recommend specific detailed action steps […]

Why Stuxnet was developed by the Israelis

Who developed Stuxnet?  Was Stuxnet developed by the Israeli Sigint unit 8200 or was it a group of Americans, Germans and Israelis working in collaboration? There has been a flurry of articles  about Stuxnet in the Israeli papers, speculating on the source of the Stuxnet virus and discussing if this is the beginning of cyber […]

How to improve your data security in 3 steps

How to protect your systems, your most sensitive data, avoid malware  infections and never have  a single minute of downtime due to malware. Run Ubuntu Get your services in the cloud Practice safe computing.

Data security in the cloud

It seems that with amorphous and rapidly evolving trend of storing data in cloud providers and social media like Twitter and Facebook, that social media and cloud computing is the next frontier of data security breaches. And – here, we have not even solved the problem of trusted insiders. The letter of the law is […]

Choosing endpoint DLP agents

There is a lot to be said for preventing data loss at the point of use but if you are considering endpoint DLP (data loss prevention), I recommend against buying and deploying an integrated DLP/Anti-virus end-point security agent.  This is for 4 reasons: Bloatware/system resource consumption – if you’re concerned with anti-virus system resource usage, […]

Dissonance is bad for business

In music, dissonance is  sound quality which seems “unstable”, and has an aural “need” to “resolve” to a “stable” consonance. Leading up to the Al Quaeda attack on the US in 9/11, the FBI investigated, the CIA analyzed but no one bothered to discuss the impact of Saudis learning to fly but not land airplanes. […]

The death of Google Adwords

I don’t really understand why anyone would want to pay Google money for Adwords. I ran a little experiment recently to promote our web sites using Google Adwords and Twitter. Here are the results: The results of my little online marketing experiment show a huge advantage for Twitter with focused search phrases in bios over […]

USDA bans non IE browsers

The new Israeli administration has invited Microsoft to head a government IT steering comittee – the item caused a bit of a ruckus in the Israeli Open Source community a few months ago – although I personally feel that as the world’s largest software vendor – they have a lot to contribute. Now I think […]