על אודות
Over 27 years of global experience in the enterprise software industry, encompassing…
מאמרים מאת Eyal
פעילות
-
I've been awarded with the 2nd prize of the AVL ITS #Innovation #Award 2024 for my approach to behavior model-based compliance checking, handed over…
I've been awarded with the 2nd prize of the AVL ITS #Innovation #Award 2024 for my approach to behavior model-based compliance checking, handed over…
נוסף לייק על ידי Eyal Traitel
-
I'm honored to share that I will be showcasing at the IATI Mini MIXiii Miami on January 9th, 2025! This exclusive event highlights the forefront…
I'm honored to share that I will be showcasing at the IATI Mini MIXiii Miami on January 9th, 2025! This exclusive event highlights the forefront…
נוסף לייק על ידי Eyal Traitel
-
Work hard, play hard at DustPhotonics, this time it was the "play hard" part. I great day out of the office with good vibes, drinks and fun
Work hard, play hard at DustPhotonics, this time it was the "play hard" part. I great day out of the office with good vibes, drinks and fun
נוסף לייק על ידי Eyal Traitel
ניסיון
חינוך
רישיונות והסמכות
פרסומים
-
Framing Software Component Transparency (2024)
CISA.gov
I participated in the Oct 2024 update for this detailed SBOM guidance, sharing my expertise in the practice of generating and managing SBOMs for real-life products.
-
Using a Cyber Digital Twin for Continuous Automotive Security Requirements Verification
IEEE
A Digital Twin (DT) is a digital representation of a physical object used to simulate it before it is built or to predict failures after the object is deployed. In this article, we introduce our approach, which applies the concept of a Cyber Digital Twin (CDT) to automotive software for the purpose of security analysis. In our approach, automotive firmware is transformed into a CDT, which contains automatically extracted, security-relevant information from the firmware. Based on the CDT, we…
A Digital Twin (DT) is a digital representation of a physical object used to simulate it before it is built or to predict failures after the object is deployed. In this article, we introduce our approach, which applies the concept of a Cyber Digital Twin (CDT) to automotive software for the purpose of security analysis. In our approach, automotive firmware is transformed into a CDT, which contains automatically extracted, security-relevant information from the firmware. Based on the CDT, we evaluate security requirements through automated analysis and requirements verification using policy enforcement checks and vulnerabilities detection. The evaluation of a CDT is conducted continuously integrating new checks derived from new security requirements and from newly disclosed vulnerabilities. We applied our approach to about 100 automotive firmwares. In average, about 600 publicly disclosed vulnerabilities and 80 unknown weaknesses were detected per firmware in the pre-production phase. Therefore, the use of a CDT enables efficient continuous verification of security requirements.
-
Vulnerability Management - Practical Challenges and Solutions for Cybersecurity Engineering
-
Integrating cybersecurity development, testing and operations activities around a common risk and vulnerability management framework is key to implementing an effective and efficient cybersecurity engineering process. We describe a case study to investigate the practical implementation of vulnerability management within an automotive cybersecurity engineering process. The case study is based on applying a combination of Cybellum's Product Security Assessment tool for identifying software…
Integrating cybersecurity development, testing and operations activities around a common risk and vulnerability management framework is key to implementing an effective and efficient cybersecurity engineering process. We describe a case study to investigate the practical implementation of vulnerability management within an automotive cybersecurity engineering process. The case study is based on applying a combination of Cybellum's Product Security Assessment tool for identifying software vulnerabilities with HORIBA MIRA's vulnerability management method. We illustrate how effective vulnerability management requires a combination of people, processes and tools, explore the challenges of scaling this activity and identify opportunities for further development of a scalable solution.
-
Introduction to IBM Real-time Compression Appliances
IBM Redbooks
This IBM Redbooks® publication is an easy-to-follow guide that describes how to design solutions successfully using IBM Real-time Compression Appliances (IBM RTCAs). It provides practical installation examples, ease of use, remote management, high availability, and administration techniques. Furthermore, it explains best practices for RTCA solution design, application integration, and practical RTCA use cases.
-
Using SANs and NAS, 1st Edition
O'Reilly
This book explains the similarities and differences of SANs and NAS to help you determine which, or both, of these complementing technologies are appropriate for your network. Using SANs, for instance, is a way to share multiple devices (tape drives and disk drives) for storage, while NAS is a means for centrally storing files so they can be shared. Preston exams each technology with a vendor neutral approach, starting with the building blocks of a SAN and how they can be assembled for…
This book explains the similarities and differences of SANs and NAS to help you determine which, or both, of these complementing technologies are appropriate for your network. Using SANs, for instance, is a way to share multiple devices (tape drives and disk drives) for storage, while NAS is a means for centrally storing files so they can be shared. Preston exams each technology with a vendor neutral approach, starting with the building blocks of a SAN and how they can be assembled for effective storage solutions. He covers day-to-day management and backup and recovery for both SANs and NAS in detail.
אַחֵר הכותבים
קורסים
-
IBM Basic Blue – First-line Management Course
-
-
Presenting Data and Information, Edward Tufte Seminar
-
-
Project Management Seminar (Cadence Management Corporation)
-
-
Shades of Blue – Multi-cultural Course
-
-
VMware Sales Professional
-
כבוד ופרסים
-
Reduxio Rookie Salesperson of the Year 2016
Reduxio Systems
Awarded for the overall pre-sales support provided to the sales organization.
-
Customer Appreciation Award from Intel Israel Engineering Computing – Immediate Recognition
Intel
“For outstanding work consulting and supporting wide Israel EC filers’ infrastructure on 24x7 basis. For the dedication and good work quality – Thank you!”.
-
Peer Recognition Award
NetApp
-
Peer Recognition Award
NetApp
-
Employee of the Year
Motorola
-
Employee of the Month
Motorola
שפות
-
English
מיומנות מקצועי מלאה
-
Hebrew
מיומנות שפת אם או דו-לשונית
-
Dutch
מיומנות יסודית
המלצות התקבל
4 אנשים המליצו Eyal
הצטרפו עכשיו כדי נוףעוד פעילות על ידי Eyal
-
במסגרת תוכנית מפגשים בין מילואימניקים לאנשים מתעשיית ההייטק של MiluimTech, נפגשתי היום לקפה ☕ עם Uriya Gilboa והכרתי בנאדם חכם, מוכשר, יצירתי ועם…
במסגרת תוכנית מפגשים בין מילואימניקים לאנשים מתעשיית ההייטק של MiluimTech, נפגשתי היום לקפה ☕ עם Uriya Gilboa והכרתי בנאדם חכם, מוכשר, יצירתי ועם…
נוסף לייק על ידי Eyal Traitel
-
I’m happy to share that I’ve obtained a new certification from EC-Council: CEH | Certified Ethical Hacker - Cybersecurity
I’m happy to share that I’ve obtained a new certification from EC-Council: CEH | Certified Ethical Hacker - Cybersecurity
נוסף לייק על ידי Eyal Traitel
-
With Datafy.io, you only pay for the stuffing...sorry EBS you use. Happy Thanksgiving to all our friends around the world. #thanksgiving #ebs #aws…
With Datafy.io, you only pay for the stuffing...sorry EBS you use. Happy Thanksgiving to all our friends around the world. #thanksgiving #ebs #aws…
נוסף לייק על ידי Eyal Traitel
-
I've been working at NetApp for just about half of my life...a small matter of 25 years...first 20 years in the Petach Tikva office, and the last 5…
I've been working at NetApp for just about half of my life...a small matter of 25 years...first 20 years in the Petach Tikva office, and the last 5…
נוסף לייק על ידי Eyal Traitel
-
OEMs and suppliers are finding new & interesting ways to comply with cybersecurity regulations. Cybellum’s Guy Gilam will discuss exactly that in…
OEMs and suppliers are finding new & interesting ways to comply with cybersecurity regulations. Cybellum’s Guy Gilam will discuss exactly that in…
נוסף לייק על ידי Eyal Traitel
-
Happy thanksgiving to all my American friends!
Happy thanksgiving to all my American friends!
נוסף לייק על ידי Eyal Traitel