Articles

Network Access Control – Rundumschutz Mit Vielen Lochern
By Ulrika Ostler, SearchSecurity.de
Published: July 17th, 2007
Link

Eight Vulnerabilities You May Have Missed
Dark Reading
Published: July 15th, 2007
Link

Network Discovery Steps Up A Gear
By Bryan Betts, Techworld
Published: May 31st, 2007
Link

Microsoft NAP-TNC compatiblity won’t speed adoption, user’s say
By Bill Brenner and Dennis Fisher, SearchSecurity.com Staff
Published: May 21st, 2007
Link

Student evades Cisco NAC; Get’s suspended
By Tim Green, Network World
Published: April 26th, 2007
Link

Weak networks need NAC bypass
By Martin Courtney, IT Week
Published: March 9th, 2007
Link

Expert: NAC is not a network security cure-all
By Robert Westervelt
Searchsecurity.com
Published: March 5th, 2007
Link

Think your network is secure? Think again
By William Jackson
Washington Technology
Published: March 2nd, 2007
Link

Black Hat, Back with the Hackers
eWeek
Published: February 21st, 2007
Link

NAC RFPs: Questions to ask
SearchNetworking.com
Published: February 7th, 2007
Link

An Extreme Solution for NAC
InternetNews.com
Published: February 5th, 2007
http://interetnews.com/infra/article.php/3657876

NAC’s Unanswered Questions
Dark Reading
Published: January 23, 2007.
http://www.darkreading.com/blog.asp?blog_sectionid=327&WT.svl=blogger1_1

Ofir Arkin, CTO, Insightix
Internetnews
Published: January 19, 2007.
http://www.internetnews.com/security/article.php/3654956

Today’s NAC Remains Vulnerable to Attack
eWeek
Published: October 18th, 2006.
http://www.eweek.com/article2/0,1895,2029790,00.asp

Caution urged on endpoint VPN security
Network World
Published: September 11th, 2006.
Link

NAC, VoIP security draw questions at Black Hat
By Ellen Messmer, Network World
Published: August 4th, 2006.
http://www.networkworld.com/news/2006/080706-blackhat-nac-voip.html

Experts Point to Weaknesses in NAC Security
By Matt Hines, eWeek
Published: August 3rd, 2006.
Link

Black Hat: Standards Issues Open Network Security Holes
By Larry Greenemeier, Information Week
Published: August 3rd, 2006.
Link

Dodging NAC’s Silver Bullet
By Sean Michael Kerner, Internet News
Published: August 3rd, 2006.
http://www.internetnews.com/infra/article.php/3624326

Researchers: NAC Experiencing Growing Pains
By Kevin McLaughlin, CRN
Published: August 3rd, 2006.
Link

Wireless, NAC holes on display at Black Hat
By Paul F. Roberts, InfoWorld
Published: August 3rd, 2006.
http://www.infoworld.com/article/06/08/03/32NNblackhatdefcon_1.html

Red flag raised over NAC security
By Paul F. Roberts, InfoWorld
Published: August 2nd, 2006.
http://www.infoworld.com/article/06/08/02/HNblackhatnac_1.html

Black Hat Presentation Shows Flaws In NAC
By Luc Hatlestad, VAR Business
Published: August 2nd, 2006.
Link

Story Lines Abound On Eve Of Black Hat 2006
By Kevin McLaughlin, CRN
Published: August 1st, 2006.
http://www.crn.com/sections/security/security.jhtml?articleId=191601022

Black Hat with a Vista twist
By Joris Evers, CNET news.com
Published: August 1st, 2006.
Link

Black Hat Conference puts spotlight on NAC, Vista and rootkits
By Ellen Messmer and Tim Greene, Network World
Published: July 31st, 2006.
http://www.networkworld.com/news/2006/073106-black-hat-conference.html

Black Hat: Cisco to be under scrutiny again
By Robert McMillan, IDG News Service
Published: July 24th, 2006.
http://www.networkworld.com/news/2006/071906-black-hat-cisco-to-be.html

Researchers Break Down NAC Defenses
By Tim Wilson, Dark Reading
Published: July 6th, 2006.
http://www.darkreading.com/document.asp?doc_id=98626

Insightix Technology Aims to Fill Network Discovery Gap
By Paula Musich, eWeek
Published: June 6th, 2005.
http://www.eweek.com/article2/0,1759,1822975,00.asp

In the name of god, look after your children surfing the Internet (In Hebrew)
By Eyal Markoos, Ma’ariv Newspaper
Published: August 26th, 2004.
http://www.nrg.co.il/online/10/ART/772/878.html

Hacking from Home (In Hebrew)
By Dror Globerman, Ma’ariv Newspaper
Published: February 19th, 2004.
http://www.nrg.co.il/online/archive/ART/651/614.html

A sting with two keys (In Hebrew)
By Eyal Tal, Ma’ariv Newspaper
Published: January 11th, 2004.
http://www.nrg.co.il/online/archive/ART/625/401.html

What does Blaster wants? (In Hebrew)
By Dror Globerman, Ma’ariv Newspaper
Published: August 17th, 2003.
http://www.nrg.co.il/online/archive/ART/525/493.html

Blaster Attacks: Thousands of computers infected (In Hebrew)
By Dror Globerman, Ma’ariv Newspaper
Published: August 12th, 2003.
http://www.nrg.co.il/online/archive/ART/523/419.html

Fears, Blaster will infect many computers (In Hebrew)
By Gal Mor, Ynet
Published: August 11th, 2003.

About Blackhat USA 2003 (In Hebrew)
By Dror Globerman, Ma’ariv Newspaper
Published: August 10th, 2003.
http://www.nrg.co.il/online/archive/ART/522/197.html

Shooting Up In The Air – Terror and Crime Using the Internet (In Hebrew)
By Dror Globerman, Ma’ariv Newspaper
Published: June 5th, 2003.
http://images.maariv.co.il/cache/ART489582.html

Honey Traps (In Hebrew)
By Dror Globerman, Ma’ariv Newspaper
Published: May 25th, 2003.
http://images.maariv.co.il/cache/cachearchive/25052003/ART482847.html

FBI seeks Internet telephony surveillance
By Kevin Poulsen, SecurityFocus
Published: March 27th, 2003.
http://www.securityfocus.com/news/3466

The day in which Israel’s ISPs Infrastructure was attacked (In Hebrew)
By Gal Mor, Ynet
Published: February 17th, 2003.
http://www.ynet.co.il/articles/0,7340,L-2440813,00.html

Ethernet security leak discovered
By John McCormick, TechRepublic, ZDnet UK
Published: January 27th, 2003.
http://techupdate.zdnet.co.uk/story/0,,t481-s2129369,00.html

Vendors mum on Ethernet driver
By Paul Roberts, IDG News Service
Published: January 13th, 2003.
http://www.linuxworld.com.au/news.php3?nid=2124&tid=8

Comment: Leaky networks put data at risk
By Roger Howorth, IT Week, vnu.net
Published: January 10th, 2003.
http://www.networknews.co.uk/Analysis/1137935

Ethernet drivers leak data
By IT Week staff, vnu.net
Published: January 10th, 2003.
http://www.networknews.co.uk/News/1137936

Security Firm @stake Says Your Network May Be Leaking Sensitive Data
By George V. Hulme, Information Week
Published: January 7th, 2003.
http://www.informationweek.com/story/IWK20030107S0003

Flaw Found in Ethernet Device Drivers
eWEEK
Published: January 6th, 2003.
http://www.eweek.com/article2/0,3959,809353,00.asp

Emerging Technology: Security and Voice over IP – Let’s Talk
by Andrew Conry-Murray , Network Magazine.
Published: November 5th, 2002.
http://www.networkmagazine.com/article/NMG20021104S0004

The Israeli Intelligence Site Vulnerable (In Hebrew)
by Dror Gloverman, Maariv Newspaper.
Published: September 13th, 2002.
http://images.maariv.co.il/cache/cachearchive/13092002/ART347197.html

BlackHat 2002: The White House and Free Software Will Guide the Industry
by Brenno J.S.A.A.F. de Winter, Linux Journal
Published: August 17, 2002.
http://www.linuxjournal.com/article.php?sid=6277.

Flaws Plague VOIP Phones
by Dennis Fisher, eWEEK
Published: July 12th, 2002.
http://www.eweek.com/article2/0,3959,373289,00.asp.

VoIP, in a Call-Waiting position (In Hebrew)
by Dror Globerman, Ma’ariv Newspaper
Published: July 9th, 2002.
http://images.maariv.co.il/cache/ART316610.html.

Dell’s notebook security fails to impress
by Nick Booth, Computer Reseller News
Published: May 29th, 2002.
http://crn.vnunet.com/News/1132211.

School Daze: Analyzing a School Network
by Laura Chappell, Novell Connection, May 2002, pp. 31-36
Published: May 2002.
http://www.nwconnection.com/2002_05/casestudy52/.

Group Analyzes Hackers – Honeynet Project Steps Up Effort to Gauge
the Threat Posed by Internet Invaders

by Riva Richmond, The Wall Street Journal (the print edition page B6B).
Published: April 24th, 2002.
Link (subscribers only).

Are your users who they say they are?
by Robert Gray, Revolution Magazine UK.
Published: April 17th, 2002.
http://www.test2.revolutionmagazine.com/News/view.cfm?r=1&id=87934

For Hacker Watching, Think Bees To Honey
by Riva Richmond, Dow Jones Newswires.
Published: April 16th, 2002.
Link (subscribers only).

Lax security shaming UK
by Suzzanna Kerridge, Silicon.com.
Published: April 16th, 2002.
Silicon.com

Prooving Beyond Reasonable Doubt
by Rob Gallagher, Info Security Management.
Published: April, 2002.
No Link Available

On The Cutting Edge: Hacked Off
by Lawrance M. Walsh & Anne Saita, Information Security Magazine.
Published: August 2001 Magazine Edition.
http://www.infosecuritymag.com/articles/august01/departments_news.shtml

Security Manager’s Visit to Defcon is an Eye Opener
by Mathias Thurman, Computerworld.
Published: August 13th, 2001.
Link

A Million Dollar Waits for a Hacker (In Hebrew)
by Dror Gloverman, Maariv Newspaper.
Published: August 12th, 2001.
http://images.maariv.co.il/cache/ART175663.html

An Internet Threat – The Code Red Worm (In Hebrew)
by Dror Gloverman and Alex Doron, Maariv Newspaper.
Published: August 1st, 2001.
http://images.maariv.co.il/cache/cachearchive/01082001/ART171551.html

The Insiders (In Hebrew)
by Dror Gloverman, Maariv Newspaper.
Published: July 16th, 2001.
http://images.maariv.co.il/cache/ART165423.html

Musings
by Rik Farrow, ;login: Magazine, Volume 26, Number 1.
Published: February, 2001.
http://www.usenix.org/publications/login/2001-02/pdfs/farrow.pdf

קורות חיים: האקר (In Hebrew)
by Dror Gloverman, Maariv Newspaper.
Published: January 8, 2001.
http://images.maariv.co.il/cache/cachearchive/08012001/ART102248.html

Letters to the Editor (System Fingerprinting With Nmap)
Network Magazine.
Published: January 5th, 2001.
http://www.networkmagazine.com/article/NMG20001219S0005

האקר צמרת (In Hebrew)
by Dror Gloverman, Maariv Newspaper.
Published: November 12th, 2000.
Local Copy: First Half, Second Half
http://images.maariv.co.il/cache/ART83492.html

System Fingerprinting With Nmap
by Rik Farrow, Network Magazine.
Published: November 6th, 2000.
http://www.networkmagazine.com/article/NMG20001102S0005/1

ICMP Stands For Trouble
by Rik Farrow, Network Magazine.
Published: September 5th, 2000.
http://www.networkmagazine.com/article/NMG20000829S0003

קוראים לי ‘פסיק’ ואני האקר (In Hebrew)
by Dror Gloverman, Maariv Newspaper.
Published: April 2nd, 2000.
http://images.maariv.co.il/cache/cachearchive/02042000/ART42459.html

Hackers: The Good vs. The Evil (In Hebrew)
by Yehuda Konfortas, Information Week The Israely Edition.
Published: March 13th, 2000.
http://www.people-and-computers.co.il

Y2Hack Under Political Attack
by Tania Hershman, Wired magazine
Published: February 16th, 2000.
http://www.wired.com/news/politics/0,1283,34349,00.html

Advertisements

%d bloggers like this: