<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Posts on Guy Barnhart-Magen</title>
    <link>https://productsecurity.info/posts/</link>
    <description>Recent content in Posts on Guy Barnhart-Magen</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Fri, 10 Jun 2022 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://productsecurity.info/posts/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Pwrful Presentations</title>
      <link>https://productsecurity.info/posts/pwrfulpresentations/</link>
      <pubDate>Fri, 10 Jun 2022 00:00:00 +0000</pubDate>
      <guid>https://productsecurity.info/posts/pwrfulpresentations/</guid>
      <description>&lt;h1 id=&#34;making-powerful-presentations&#34;&gt;Making Powerful Presentations&lt;/h1&gt;
&lt;p&gt;I recently gave a small talk to the 2022 BSidesTLV speakers on how to make powerful presentations, unfortunately i did not record the session but i am sharing the PDF here for everyone&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;Cover&#34; loading=&#34;lazy&#34; src=&#34;https://productsecurity.info/posts/pwrfulpresentations/cover.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;PwerfulPresentations.pdf&#34;&gt;PDF&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Keto</title>
      <link>https://productsecurity.info/posts/keto/</link>
      <pubDate>Mon, 14 Feb 2022 23:16:40 +0200</pubDate>
      <guid>https://productsecurity.info/posts/keto/</guid>
      <description>&lt;h1 id=&#34;my-keto-journey&#34;&gt;My Keto Journey&lt;/h1&gt;
&lt;p&gt;I have been on a Keto diet for the most part of the last two years (starting at February, 2020).
While this has not always been easy, and I did occasionally fall og the wagon - i am happy with the journey and the results.&lt;/p&gt;
&lt;p&gt;In the past, when i first tried the keto diet, i failed. I could not find the time and effort required to be prepared for a fully ketogenic diet, and as such, failed to adhere to the principals.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Hamagen App</title>
      <link>https://productsecurity.info/posts/moh/</link>
      <pubDate>Tue, 24 Mar 2020 00:00:00 +0000</pubDate>
      <guid>https://productsecurity.info/posts/moh/</guid>
      <description>&lt;p&gt;Well, that blew up&amp;hellip;&lt;/p&gt;
&lt;p&gt;I decided to write a blog post to describe what we&amp;rsquo;ve done at Profero with the &amp;ldquo;Hamagen&amp;rdquo; (shield in hebrew) application, and I ended up writing an article. I translated it, and I am including it below.&lt;/p&gt;
&lt;p&gt;We also gave some &lt;a href=&#34;#talks&#34;&gt;talks&lt;/a&gt;, &lt;a href=&#34;#talks&#34;&gt;webinars&lt;/a&gt; and &lt;a href=&#34;#posts&#34;&gt;posts&lt;/a&gt; relating to the app, organizing them all &lt;a href=&#34;#resources&#34;&gt;below&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This article is also cross-posted on &lt;a href=&#34;https://medium.com/proferosec-osm/a-million-downloads-in-4-days-how-was-the-hamagen-application-developed-73515d1ab5b2&#34;&gt;Medium&lt;/a&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;h3 id=&#34;a-million-downloads-in-4-days-how-was-the-hamagen-application-developed&#34;&gt;A million downloads in 4 days: How was the “Hamagen” application developed&lt;/h3&gt;
&lt;p&gt;Nothing about the development process of the “Hamagen” application looks like a development process in a government agency, starting with fast, agile development, including well-known privacy and security experts or ending with releasing the application as an open-source project. Guy Barnhart-Magen, The CTO who took part in the development process, talks about the path to a million downloads in less than a week.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Messaging</title>
      <link>https://productsecurity.info/posts/messaging/</link>
      <pubDate>Fri, 31 Jan 2020 11:24:12 +0200</pubDate>
      <guid>https://productsecurity.info/posts/messaging/</guid>
      <description>&lt;p&gt;This is a rather funny example that Amazon sent out by mistake, but if you think about it - it is also a great example for a tempalte focusing on how to write great messaging format.&lt;/p&gt;
&lt;p&gt;I am pretty sure this was thoroughly A/B tested :-)&lt;/p&gt;
&lt;h2 id=&#34;components&#34;&gt;Components&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;Some banner with your logo&lt;/li&gt;
&lt;li&gt;600x200 pixel wide graphic, maybe including your headline buzzowrd&lt;/li&gt;
&lt;li&gt;headline summary if this email&lt;/li&gt;
&lt;li&gt;3 paragraph, detailing how many words in each sentence - very finely calibrated for user engagement&lt;/li&gt;
&lt;li&gt;call to action, with a high contrast focus for the user&lt;/li&gt;
&lt;li&gt;various links and legal lingo&lt;/li&gt;
&lt;li&gt;footer to cleanly seprate the body of the messaging from the page itself&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Can&amp;rsquo;t wait to try this myself&amp;hellip;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Which security conferences do you recommend?</title>
      <link>https://productsecurity.info/posts/sec_confs/</link>
      <pubDate>Fri, 31 Jan 2020 11:24:12 +0200</pubDate>
      <guid>https://productsecurity.info/posts/sec_confs/</guid>
      <description>&lt;p&gt;Every once in a while i am asked which security conference I recommend to attend, so I thought I would try to create a little guide that can help guide your decisions. I am somewhat biased, but feel free to take the principals here and rework the results based on your own data.&lt;/p&gt;
&lt;h2 id=&#34;ranking&#34;&gt;Ranking&lt;/h2&gt;
&lt;p&gt;You can find a lot of information in the online &lt;a href=&#34;https://docs.google.com/spreadsheets/d/1Nt0n-Ya0eEbAaCyR1jri_bucb4UL5W_lks3JFX4A7Fs/edit&#34;&gt;google spread sheet&lt;/a&gt; maintained by &lt;a href=&#34;https://x.com/inbarraz&#34;&gt;Inbar Raz&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;These ranking are based on my own personal experience, and the ranking is hugely biased toward my prefrences.&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>DC9723: Crypto Fails – from basics to advanced stuff</title>
      <link>https://productsecurity.info/posts/dc9723_crypto/</link>
      <pubDate>Thu, 30 Jan 2020 13:09:37 +0200</pubDate>
      <guid>https://productsecurity.info/posts/dc9723_crypto/</guid>
      <description>&lt;p&gt;It was a lot of fun to return to DC9723 again as a speaker. I think i fulfilled my goal - to reach the younger, less experienced audience - at least if you measure the amount of questions i recieved&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://productsecurity.info/talks/talk_crypto/&#34;&gt;crypto talks&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://productsecurity.info/posts/dc9723_crypto/IMG_20200128_223117.jpg&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://productsecurity.info/posts/dc9723_crypto/IMG-20200128-WA0025.jpg&#34;&gt;
&lt;img loading=&#34;lazy&#34; src=&#34;https://productsecurity.info/posts/dc9723_crypto/IMG-20200128-WA0024.jpg&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>5 Years in Cyber</title>
      <link>https://productsecurity.info/posts/5yearincyber/</link>
      <pubDate>Sun, 26 Jan 2020 12:59:06 +0200</pubDate>
      <guid>https://productsecurity.info/posts/5yearincyber/</guid>
      <description>&lt;p&gt;I had the oppurtunity to give a talk and participate in the panel at the recent HFN event hosting a delegation from Denemark, it was my pleasure to discuss the threats is see in the next 5 years for our field.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://productsecurity.info/posts/5yearincyber/0.jpeg&#34;&gt;&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://productsecurity.info/posts/5yearincyber/WhatsAppImage2020-01-26at17.37.48(1).jpeg&#34;&gt;&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://productsecurity.info/posts/5yearincyber/WhatsAppImage2020-01-26at17.37.48(2).jpeg&#34;&gt;&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://productsecurity.info/posts/5yearincyber/WhatsAppImage2020-01-26at17.37.47(2).jpeg&#34;&gt;&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://productsecurity.info/posts/5yearincyber/WhatsAppImage2020-01-27at05.45.37.jpeg&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Lessons Learned from the NotPetya Cyber-Attack</title>
      <link>https://productsecurity.info/posts/maersk_ciso/</link>
      <pubDate>Mon, 10 Jun 2019 00:00:00 +0000</pubDate>
      <guid>https://productsecurity.info/posts/maersk_ciso/</guid>
      <description>&lt;h2 id=&#34;my-personal-take-on-the-maersk-case-study&#34;&gt;My Personal Take on the Maersk Case Study&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;Some images of Mr. Banks presentation were recently shared by Alon Refali from &lt;a href=&#34;http://cybertogether.org/&#34;&gt;CyberTogether&lt;/a&gt;. I didn&amp;rsquo;t get to see the actual presentation, and I am not sure that a video will follow - so I took the liberty of writing down the slides so I could better comment on them.&lt;/em&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;The threat landscape has changed fundamentally&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;ul&gt;
&lt;li&gt;the risk of us being caught up in Nation State activity is real&lt;/li&gt;
&lt;li&gt;these sort of cyber weapons are orders of magnitude more damaging than traditional malware&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Prevention is unlikely to be an effective strategy, automated detection and response is key
Online back up (standard) is no longer a safe approach
Patching is necessary but insufficient
Privileged access management takes on an even higher importance&lt;/p&gt;</description>
    </item>
    <item>
      <title>Singapore 2019</title>
      <link>https://productsecurity.info/posts/sas19/</link>
      <pubDate>Wed, 10 Apr 2019 00:00:00 +0000</pubDate>
      <guid>https://productsecurity.info/posts/sas19/</guid>
      <description>Travel to Singapore was more fun than just giving a talk&amp;hellip;</description>
    </item>
    <item>
      <title>SW Architecture 2017</title>
      <link>https://productsecurity.info/posts/swarch2017/</link>
      <pubDate>Thu, 16 Nov 2017 00:00:00 +0000</pubDate>
      <guid>https://productsecurity.info/posts/swarch2017/</guid>
      <description>My impressions from the ILTAM SW Architecture 2017 conference day</description>
    </item>
    <item>
      <title>Value Added Presentations</title>
      <link>https://productsecurity.info/posts/vayomer/</link>
      <pubDate>Fri, 03 Nov 2017 00:00:00 +0000</pubDate>
      <guid>https://productsecurity.info/posts/vayomer/</guid>
      <description>My notes from a session on &amp;ldquo;Value Added Presentations&amp;rdquo;</description>
    </item>
    <item>
      <title>DC9723 October Meeting</title>
      <link>https://productsecurity.info/posts/dc9723/</link>
      <pubDate>Tue, 24 Oct 2017 00:00:00 +0000</pubDate>
      <guid>https://productsecurity.info/posts/dc9723/</guid>
      <description>My impressions from the DC9723 October 2017 meeting where I gave a talk on the 2015 Ukraine Power Grid Attack</description>
    </item>
    <item>
      <title>AppSecIL 2017 (OWASP IL)</title>
      <link>https://productsecurity.info/posts/appsecil2017/</link>
      <pubDate>Thu, 19 Oct 2017 00:00:00 +0000</pubDate>
      <guid>https://productsecurity.info/posts/appsecil2017/</guid>
      <description>&lt;h2 id=&#34;my-impressions&#34;&gt;My Impressions&lt;/h2&gt;
&lt;p&gt;This is my first time speaking at OWASP and I found the experience exhiliirating :-)&lt;/p&gt;
&lt;p&gt;The venue was familiar from recent years (this was not the first time I attended OWASPs conference in Israel) but this year everything seemed to be much better organized.&lt;/p&gt;
&lt;p&gt;I volunteered at the &amp;ldquo;CV Review&amp;rdquo; workshop to assist people in reviewing and improving their CVs from my experience as a hiring manager, and I also gave talk - which unfortunately was the last talk of the day.&lt;/p&gt;</description>
    </item>
    <item>
      <title>BIU Hackathon</title>
      <link>https://productsecurity.info/posts/biuhackathon/</link>
      <pubDate>Mon, 29 May 2017 00:00:00 +0000</pubDate>
      <guid>https://productsecurity.info/posts/biuhackathon/</guid>
      <description>I was asked to mentor at the BIU Cyber/Crypto Hackathon, these are some of my insights&amp;hellip;</description>
    </item>
    <item>
      <title>BlueHatIL 2017</title>
      <link>https://productsecurity.info/posts/bluehatil2017/</link>
      <pubDate>Tue, 31 Jan 2017 00:00:00 +0000</pubDate>
      <guid>https://productsecurity.info/posts/bluehatil2017/</guid>
      <description>&lt;p&gt;UPDATE: I just learned today that Microsoft shared some of the decks and videos from BlueHat IL. They can be found &lt;a href=&#34;http://microsoftrnd.co.il/bluehat/Pages/Presentations.aspx&#34;&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Microsoft Israel has successfully launched the BlueHat IL conference in Israel for the first time. Unexpectedly, this conference was not focused on marketing or pushing their agenda but rather on security related topics from excellent speakers.&lt;/p&gt;
&lt;p&gt;I attended the first day, and I am kind of sorry I missed the second day.
Following are the talks I saw with some slides I took during the talks.&lt;/p&gt;</description>
    </item>
    <item>
      <title>33C3 (CCC)</title>
      <link>https://productsecurity.info/posts/33c3/</link>
      <pubDate>Sun, 01 Jan 2017 00:00:00 +0000</pubDate>
      <guid>https://productsecurity.info/posts/33c3/</guid>
      <description>&lt;h2 id=&#34;personal-experience&#34;&gt;Personal Experience&lt;/h2&gt;
&lt;p&gt;This is the 5th year that I&amp;rsquo;ve attended the CCC&amp;rsquo;s major event. I spent 4 days at the 33rd CCC conference in Hamburg (Germany), where a somewhat over 60,000 people attended this year, Other than an opportunity to catch up with old friends, and learn what&amp;rsquo;s new in the hacking scene - there were awesome talks (just like any year).&lt;/p&gt;
&lt;p&gt;I thought to dedicate this blog post to the best talks I saw, obviously this is very subjective (and suffers from a selection bias).&lt;/p&gt;</description>
    </item>
    <item>
      <title>8200 EISP - Meet the Investors</title>
      <link>https://productsecurity.info/posts/meettheinvestors/</link>
      <pubDate>Tue, 22 Nov 2016 00:00:00 +0000</pubDate>
      <guid>https://productsecurity.info/posts/meettheinvestors/</guid>
      <description>&lt;p&gt;Yesterday I attended a &amp;ldquo;Meet the investors&amp;rdquo; meetup in Tel-Aviv. The meeting was held at a bar (which was nice). The meetup followed a non-conventional format, where the investors gave a short introduction about themselves and the answered some warm-up questions from &lt;a href=&#34;https://www.facebook.com/groups/1773557789564007&#34;&gt;Facebook&lt;/a&gt; and then opened the floor to questions from the crowd.&lt;/p&gt;
&lt;p&gt;I wanted to share my impressions and thoughts about their viewpoints and how that differed from the crowd&amp;rsquo;s expectations.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Docker in Production: A History of Failure (retort)</title>
      <link>https://productsecurity.info/posts/docker_in_production_a_history_of_failure_retort/</link>
      <pubDate>Sun, 20 Nov 2016 00:00:00 +0000</pubDate>
      <guid>https://productsecurity.info/posts/docker_in_production_a_history_of_failure_retort/</guid>
      <description>&lt;p&gt;In a recent post (&lt;a href=&#34;https://productsecurity.info/docker-in-production/&#34;&gt;Docker in Production: A History of Failure&lt;/a&gt; ) I shared my thoughts about using Docker in production, based mainly on a widely spread blog post by the HFT guy.&lt;/p&gt;
&lt;p&gt;His post really brought up a storm of responses, where i think the best captured one is the following &lt;a href=&#34;https://patrobinson.github.io/2016/11/05/docker-in-production/&#34;&gt;post&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;TL;DR: Docker can be used in production, if you take precautions and keep on top of tooling.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;I think this the main issue of the two approaches - would you prefer to be &amp;ldquo;cutting edge&amp;rdquo; and have the most recent tooling (with all of their disadvantages) in your production? or would you prefer to have the most stable production environment around?&lt;/p&gt;</description>
    </item>
    <item>
      <title>AllDayDevOps 2016</title>
      <link>https://productsecurity.info/posts/alldaydevops2016/</link>
      <pubDate>Sat, 19 Nov 2016 00:00:00 +0000</pubDate>
      <guid>https://productsecurity.info/posts/alldaydevops2016/</guid>
      <description>&lt;p&gt;I &amp;ldquo;attended&amp;rdquo; the online &lt;a href=&#34;http://www.alldaydevops.com/&#34;&gt;AllDayDevOps&lt;/a&gt; conference today. This was a new experience for me as the entire conference was given remotely.
This was interesting both from a logistical point of view as well as an academic one. The conference itself was massive (over 12,000 attendees) sharing three simultaneous tracks through live youtube streaming.&lt;/p&gt;
&lt;p&gt;The track which i followed was security related (unsurprisingly). There were interesting conversations on slack as well as the chat feature of youtube, which helped keep people interested and focused on the conference itself.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Docker in Production: A History of Failure</title>
      <link>https://productsecurity.info/posts/docker_in_production_a_history_of_failure/</link>
      <pubDate>Sat, 05 Nov 2016 00:00:00 +0000</pubDate>
      <guid>https://productsecurity.info/posts/docker_in_production_a_history_of_failure/</guid>
      <description>&lt;p&gt;&lt;img alt=&#34;https://thehftguy.wordpress.com/2016/11/01/docker-in-production-an-history-of-failure/&#34; loading=&#34;lazy&#34; src=&#34;https://thehftguy.files.wordpress.com/2016/11/header-medium-large.jpg&#34;&gt;
I recently encountered a &lt;a href=&#34;https://thehftguy.wordpress.com/2016/11/01/docker-in-production-an-history-of-failure/&#34;&gt;blog&lt;/a&gt; post about the troubles of usage of docker in a production environment.
I have done some study into the meaning of using docker in a production environment and while it is very easy to get lost in the hype, glamour and overall excitement, the bottom line is that this post resonated well with me and my recent forays into the world of containers.
I think the TL;DR of his blog post is:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Story Telling With Data</title>
      <link>https://productsecurity.info/posts/storytellingwithdata/</link>
      <pubDate>Mon, 24 Oct 2016 00:00:00 +0000</pubDate>
      <guid>https://productsecurity.info/posts/storytellingwithdata/</guid>
      <description>&lt;p&gt;I have recently read a great book by Cole Nussbaumer Knaflic, named (&lt;a href=&#34;https://www.amazon.com/Storytelling-Data-Visualization-Business-Professionals/dp/1119002257/ref=sr_1_1?ie=UTF8&amp;amp;qid=1477302393&amp;amp;sr=8-1&amp;amp;keywords=storytelling+with+data&#34;&gt;amazon&lt;/a&gt;). what i liked most about this book is the scientific approach towards structuring visual data, if it&amp;rsquo;s for presentations, marketing, UI or anything else. i learned a lot from this book and reccomend to follow her &lt;a href=&#34;http://www.storytellingwithdata.com/&#34;&gt;blog&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://images-na.ssl-images-amazon.com/images/I/416HXZyG8AL._SX399_BO1,204,203,200_.jpg&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cybersecurity for Smart Buildings Podcast</title>
      <link>https://productsecurity.info/posts/psdcast/</link>
      <pubDate>Wed, 21 Sep 2016 00:00:00 +0000</pubDate>
      <guid>https://productsecurity.info/posts/psdcast/</guid>
      <description>&lt;p&gt;&lt;img alt=&#34;PSDcast&#34; loading=&#34;lazy&#34; src=&#34;https://productsecurity.info/posts/psdcast/logo.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;ve been interviewed for the PSDCast podcast today by Alix Paultre of Power System Design.&lt;/p&gt;
&lt;p&gt;Today, billions of smart devices interconnected through the Internet of Things (IoT). Smart buildings are facing significant threats that are exacerbated by two major factors: Firstly, the intricacy and interconnectedness of critical functions in smart buildings can possibly create a disastrous “domino effect” if attacked. Secondly, these risks are still not receiving enough attention or funding since they fall outside the scope of traditional IT.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Keeping Informed</title>
      <link>https://productsecurity.info/posts/keepinginformed/</link>
      <pubDate>Sun, 11 Sep 2016 00:00:00 +0000</pubDate>
      <guid>https://productsecurity.info/posts/keepinginformed/</guid>
      <description>&lt;p&gt;I wanted to outline a list of the different channels I use everyday to keep informed (some of these blogs are in hebrew). I use &lt;a href=&#34;https://theoldreader.com/&#34;&gt;the old reader&lt;/a&gt; to keep track of my RSS feeds.&lt;/p&gt;
&lt;h1 id=&#34;security-and-cryptography&#34;&gt;Security and Cryptography&lt;/h1&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://securitybaron.com/blog/cryptography-and-coding-information/&#34;&gt;Cryptography And Coding Information&lt;/a&gt; - Thank you for Ava for pointing this out!&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://ics-cert.us-cert.gov/monitors/monitors.xml&#34;&gt;ICS-CERT Monitor RSS Feed&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.corelan.be&#34;&gt;Corelan Team&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.imperialviolet.org/&#34;&gt;ImperialViolet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://blog.ivanristic.com/&#34;&gt;Blog: Ivan Ristić&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://security.googleblog.com/&#34;&gt;Google Online Security Blog&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://taosecurity.blogspot.com/&#34;&gt;TaoSecurity&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://roeerotman.wordpress.com&#34;&gt;Roee-geist&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.iamit.org/blog&#34;&gt;I Am Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://krebsonsecurity.com&#34;&gt;Krebs on Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://fail0verflow.com/blog/excerptsfeed.xml&#34;&gt;fail0verflow&amp;rsquo;s blog excerpts feed&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://nakedsecurity.sophos.com&#34;&gt;Naked Security - Sophos&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.filippo.io/&#34;&gt;Filippo.io&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://thehackernews.com/&#34;&gt;The Hacker News * [ THN ]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.schneier.com/blog/&#34;&gt;Schneier on Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://blog.whitehatsec.com&#34;&gt;WhiteHat Security Blog&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.halbheer.ch/security&#34;&gt;Roger Halbheer on Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://blog.ikotler.org/&#34;&gt;I hack, therefore I am&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://securelist.com&#34;&gt;Securelist / All Updates&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://cybergibbons.com&#34;&gt;Cybergibbons Limited&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://ritter.vg&#34;&gt;ritter.vg&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://blog.cr.yp.to&#34;&gt;cr.yp.to blog&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://blog.cryptographyengineering.com/&#34;&gt;A Few Thoughts on Cryptographic Engineering&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h1 id=&#34;management&#34;&gt;Management&lt;/h1&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://randsinrepose.com&#34;&gt;Rands in Repose&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://blogs.microsoft.co.il/vprnd&#34;&gt;הבלוג הפתוח למנהל הפיתוח&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h1 id=&#34;science&#34;&gt;Science&lt;/h1&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://www.storytellingwithdata.com/&#34;&gt;storytelling with data&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://trustmeimastatistician.wordpress.com&#34;&gt;Trust Me, I&amp;rsquo;m a Statistician&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://windowsontheory.org&#34;&gt;Windows On Theory&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.biostatistics.co.il&#34;&gt;‫המדריך לטרמפיסט בסטטיסטיקה‬&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.damninteresting.com&#34;&gt;Damn Interesting&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h1 id=&#34;software&#34;&gt;Software&lt;/h1&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://dankaminsky.com&#34;&gt;Dan Kaminsky&amp;rsquo;s Blog&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://blog.jeremiahgrossman.com/&#34;&gt;Jeremiah Grossman&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.joelonsoftware.com&#34;&gt;Joel on Software&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.hanselman.com/blog/&#34;&gt;Scott Hanselman&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.softwarearchiblog.com/&#34;&gt;Software Archiblog &amp;ndash; בלוג ארכיטקטורת תוכנה&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.troyhunt.com/&#34;&gt;Troy Hunt&amp;rsquo;s Blog&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h1 id=&#34;the-rest&#34;&gt;The rest&amp;hellip;&lt;/h1&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://geek-and-poke.com/&#34;&gt;Geek&amp;amp;Poke&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.csectioncomics.com&#34;&gt;C-Section Comics&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.catversushuman.com/&#34;&gt;cat versus human&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.commitstrip.com&#34;&gt;CommitStrip - Blog relating the daily life of web agencies developers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.darklegacycomics.com&#34;&gt;Most Recent Dark Legacy Comics&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.smbc-comics.com/&#34;&gt;Saturday Morning Breakfast Cereal (updated daily)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://spikedmath.com/&#34;&gt;Spiked Math&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://theoatmeal.com/&#34;&gt;The Oatmeal - Comics, Quizzes, &amp;amp; Stories&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://what-if.xkcd.com/feed.atom&#34;&gt;What If?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://xkcd.com/&#34;&gt;xkcd.com&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.codinghorror.com/&#34;&gt;Coding Horror&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Keeping your Head Above the Waves</title>
      <link>https://productsecurity.info/posts/keepingyourhead/</link>
      <pubDate>Sat, 10 Sep 2016 00:00:00 +0000</pubDate>
      <guid>https://productsecurity.info/posts/keepingyourhead/</guid>
      <description>&lt;p&gt;A colleague asked me today how do I manage to keep my head straight with all the different distraction and open issues I handle simultaneously on a daily basis. Although I have given this much thought over the years, when the question came up today I found a nice metaphor to explain this.&lt;/p&gt;
&lt;p&gt;When personal computers just came out (DOS era&amp;hellip;) most of them operated with a single &amp;ldquo;task&amp;rdquo; running in the CPU. You could be running the OS or a game, but not at the same time. This wasn&amp;rsquo;t very efficient as a lot of time was wasted waiting for user input, or hardware changes, etc.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Security Problems of an Eleven Year Old</title>
      <link>https://productsecurity.info/posts/securityproblemsofanelevenyearold/</link>
      <pubDate>Tue, 06 Sep 2016 00:00:00 +0000</pubDate>
      <guid>https://productsecurity.info/posts/securityproblemsofanelevenyearold/</guid>
      <description>&lt;p&gt;I encountered a &lt;a href=&#34;https://www.youtube.com/watch?v=kWnCxyATyUY&#34;&gt;youtube&lt;/a&gt; video of a smart 11 year old by the name of &lt;strong&gt;Jake Sethi Reiner&lt;/strong&gt;, that explains in very simple terms the methodical way a security researcher should think. Don&amp;rsquo;t be fooled by his age, i have spent time trying to teach people this exact way of thinking:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Identify the problem&lt;/li&gt;
&lt;li&gt;Gather evidence&lt;/li&gt;
&lt;li&gt;Hypothesize and analyze solutions&lt;/li&gt;
&lt;li&gt;Carry out experiments, analyze the results&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The problem he encounters at his home are no different than those encountered by professional security researchers - and his solutions are the exact steps one should follow through (learning to overcome different issues and concepts along the way).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Why The IoT Is Potentially The Most Dangerous Thing In The World</title>
      <link>https://productsecurity.info/posts/turning_the_tide/</link>
      <pubDate>Thu, 14 Jul 2016 00:00:00 +0000</pubDate>
      <guid>https://productsecurity.info/posts/turning_the_tide/</guid>
      <description>&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://productsecurity.info/posts/turning_the_tide/Screenshot-from-2016-10-07-22-06-18.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;The Internet of Things (IoT) is an intersection of trends that brings motivation, innovation, money and opportunity together into one massive tool. However, in the race to build more and more IoT devices and units, security is often an oversight. While this phenomenon is often spoke of in security circles, most users just assume that the security is built-in and have no idea the vulnerabilities that they are exposing their organizations or homes to.&lt;/p&gt;</description>
    </item>
    <item>
      <title>NIST: Agencies must prepare to get hacked</title>
      <link>https://productsecurity.info/posts/nist/</link>
      <pubDate>Mon, 20 Jun 2016 00:00:00 +0000</pubDate>
      <guid>https://productsecurity.info/posts/nist/</guid>
      <description>&lt;p&gt;&lt;img alt=&#34;fedscoop&#34; loading=&#34;lazy&#34; src=&#34;https://productsecurity.info/posts/nist/Screenshot-from-2016-10-07-22-07-12.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;In a recent interview to FedScoop I was asked to comment my opinions on the recent NIST SP-800-184 draft publication, which is focused on Guide for Cyber security Event Recovery.&lt;/p&gt;
&lt;p&gt;After reading the publication, and acknowledging its importance, i think we are still left with several issues. The IT industry at large has seen an evolutionary process where a lot of attacks had mitigation in place, in what is already a best practice. however, in the OT domain this process did not take place.&lt;/p&gt;</description>
    </item>
    <item>
      <title>IoT security concerns plague executives</title>
      <link>https://productsecurity.info/posts/smartgridnews/</link>
      <pubDate>Thu, 02 Jun 2016 00:00:00 +0000</pubDate>
      <guid>https://productsecurity.info/posts/smartgridnews/</guid>
      <description>&lt;!-- ![](Screenshot-from-2016-10-07-22-06-18.png) --&gt;
&lt;p&gt;&lt;img alt=&#34;SmartGridNews&#34; loading=&#34;lazy&#34; src=&#34;https://productsecurity.info/posts/smartgridnews/Screenshot-from-2016-10-07-22-09-01.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;In a recent article in Smart Grid News I was asked to comment in the security concerns that executive face when dealing with IoT concerns.&lt;/p&gt;
&lt;p&gt;I recommended that executive start with setting up a team of security specialists and incorporate best practices within the IoT product development process. While these measures are in no way simple, they offer a starting point to enhance an organization security posture.&lt;/p&gt;</description>
    </item>
    <item>
      <title></title>
      <link>https://productsecurity.info/posts/hip19/hip19/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://productsecurity.info/posts/hip19/hip19/</guid>
      <description>&lt;h1 id=&#34;thoughts&#34;&gt;Thoughts&lt;/h1&gt;
&lt;ul&gt;
&lt;li&gt;offer some training oppurtunities&lt;/li&gt;
&lt;li&gt;followup with Hemed and Mickey&lt;/li&gt;
&lt;li&gt;attack crypto frameworks&lt;/li&gt;
&lt;li&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;notes&#34;&gt;Notes&lt;/h2&gt;
&lt;h3 id=&#34;dpapi&#34;&gt;DPAPI&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;@paulacqure&lt;/li&gt;
&lt;li&gt;personal story&lt;/li&gt;
&lt;li&gt;limited set of crypto to use, probably one of these&lt;/li&gt;
&lt;li&gt;animated walkthrough of concepts&lt;/li&gt;
&lt;li&gt;use of 3DES in chrome password store, password length?&lt;/li&gt;
&lt;li&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;whoami-priv&#34;&gt;whoami /priv&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Andrea Pierini&lt;/li&gt;
&lt;li&gt;@decoder_it&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;aws-workshop&#34;&gt;AWS Workshop&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;@Rzepsky&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;mailto:pawel.rezpa@security.pl&#34;&gt;pawel.rezpa@security.pl&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;public access through ACL - should be deprectaed soon&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;encrypt your snapshots&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;lazys3 enumarate possible s3 bucket names&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
