Eyal Traitel

Eyal Traitel

Tel Aviv District, Israel
3K‏ עוקבים מעל 500 קשרים

על אודות

Over 27 years of global experience in the enterprise software industry, encompassing…

מאמרים מאת Eyal

  • Fragile Ecosystem - Preventing a Cyber Security Epidemic

    Fragile Ecosystem - Preventing a Cyber Security Epidemic

    By Eyal Traitel, Head of Customer Success at Cybellum , a concerned citizen of the world As the current outbreak of the…

    3 תגובות
  • Taking a Sharp Turn

    Taking a Sharp Turn

    I joined the storage industry more than two decades ago just as it transformed from disconnected islands of separate…

    20 תגובות
  • Removing the Fat

    Removing the Fat

    That’s it, I’m in. I joined Excelero, and with it, the NVMe revolution.

    8 תגובות
  • Can you recover your VMs to any second? Come to Nijkerk, The Netherlands

    Can you recover your VMs to any second? Come to Nijkerk, The Netherlands

    Want a storage system that lets you clone and revert data to any second in the past? Want a system that provides you…

פעילות

הצטרפו עכשיו כדי לראות את כל פעילות

ניסיון

  • Cybellum גרפי

    Cybellum

    Tel Aviv District, Israel

  • -

    Tel Aviv, Israel

  • -

    Tel Aviv, Israel

  • -

    Tel Aviv Area, Israel

  • -

    Tel Aviv Area, Israel

  • -

    Tel Aviv Area, Israel

  • -

    Tel Aviv Area, Israel

  • -

    Tel Aviv Area, Israel

  • -

    Tel Aviv Area, Israel

  • -

    San Francisco Bay Area

  • -

    San Francisco Bay Area

  • -

    San Francisco Bay Area

  • -

    Amsterdam Area, Netherlands

  • -

    Amsterdam Area, Netherlands

  • -

    Herzliya Area, Israel

  • -

    Israel

  • -

    Tel Aviv Area, Israel

חינוך

רישיונות והסמכות

פרסומים

  • Framing Software Component Transparency (2024)

    CISA.gov

    I participated in the Oct 2024 update for this detailed SBOM guidance, sharing my expertise in the practice of generating and managing SBOMs for real-life products.

    ראה פרסום
  • Using a Cyber Digital Twin for Continuous Automotive Security Requirements Verification

    IEEE

    A Digital Twin (DT) is a digital representation of a physical object used to simulate it before it is built or to predict failures after the object is deployed. In this article, we introduce our approach, which applies the concept of a Cyber Digital Twin (CDT) to automotive software for the purpose of security analysis. In our approach, automotive firmware is transformed into a CDT, which contains automatically extracted, security-relevant information from the firmware. Based on the CDT, we…

    A Digital Twin (DT) is a digital representation of a physical object used to simulate it before it is built or to predict failures after the object is deployed. In this article, we introduce our approach, which applies the concept of a Cyber Digital Twin (CDT) to automotive software for the purpose of security analysis. In our approach, automotive firmware is transformed into a CDT, which contains automatically extracted, security-relevant information from the firmware. Based on the CDT, we evaluate security requirements through automated analysis and requirements verification using policy enforcement checks and vulnerabilities detection. The evaluation of a CDT is conducted continuously integrating new checks derived from new security requirements and from newly disclosed vulnerabilities. We applied our approach to about 100 automotive firmwares. In average, about 600 publicly disclosed vulnerabilities and 80 unknown weaknesses were detected per firmware in the pre-production phase. Therefore, the use of a CDT enables efficient continuous verification of security requirements.

    ראה פרסום
  • Vulnerability Management - Practical Challenges and Solutions for Cybersecurity Engineering

    -

    Integrating cybersecurity development, testing and operations activities around a common risk and vulnerability management framework is key to implementing an effective and efficient cybersecurity engineering process. We describe a case study to investigate the practical implementation of vulnerability management within an automotive cybersecurity engineering process. The case study is based on applying a combination of Cybellum's Product Security Assessment tool for identifying software…

    Integrating cybersecurity development, testing and operations activities around a common risk and vulnerability management framework is key to implementing an effective and efficient cybersecurity engineering process. We describe a case study to investigate the practical implementation of vulnerability management within an automotive cybersecurity engineering process. The case study is based on applying a combination of Cybellum's Product Security Assessment tool for identifying software vulnerabilities with HORIBA MIRA's vulnerability management method. We illustrate how effective vulnerability management requires a combination of people, processes and tools, explore the challenges of scaling this activity and identify opportunities for further development of a scalable solution.

    ראה פרסום
  • Introduction to IBM Real-time Compression Appliances

    IBM Redbooks

    This IBM Redbooks® publication is an easy-to-follow guide that describes how to design solutions successfully using IBM Real-time Compression Appliances (IBM RTCAs). It provides practical installation examples, ease of use, remote management, high availability, and administration techniques. Furthermore, it explains best practices for RTCA solution design, application integration, and practical RTCA use cases.

    ראה פרסום
  • Using SANs and NAS, 1st Edition

    O'Reilly

    This book explains the similarities and differences of SANs and NAS to help you determine which, or both, of these complementing technologies are appropriate for your network. Using SANs, for instance, is a way to share multiple devices (tape drives and disk drives) for storage, while NAS is a means for centrally storing files so they can be shared. Preston exams each technology with a vendor neutral approach, starting with the building blocks of a SAN and how they can be assembled for…

    This book explains the similarities and differences of SANs and NAS to help you determine which, or both, of these complementing technologies are appropriate for your network. Using SANs, for instance, is a way to share multiple devices (tape drives and disk drives) for storage, while NAS is a means for centrally storing files so they can be shared. Preston exams each technology with a vendor neutral approach, starting with the building blocks of a SAN and how they can be assembled for effective storage solutions. He covers day-to-day management and backup and recovery for both SANs and NAS in detail.

    אַחֵר הכותבים
    • W. Curtis Preston
    ראה פרסום

קורסים

  • IBM Basic Blue – First-line Management Course

    -

  • Presenting Data and Information, Edward Tufte Seminar

    -

  • Project Management Seminar (Cadence Management Corporation)

    -

  • Shades of Blue – Multi-cultural Course

    -

  • VMware Sales Professional

    -

כבוד ופרסים

  • Reduxio Rookie Salesperson of the Year 2016

    Reduxio Systems

    Awarded for the overall pre-sales support provided to the sales organization.

  • Customer Appreciation Award from Intel Israel Engineering Computing – Immediate Recognition

    Intel

    “For outstanding work consulting and supporting wide Israel EC filers’ infrastructure on 24x7 basis. For the dedication and good work quality – Thank you!”.

  • Peer Recognition Award

    NetApp

  • Peer Recognition Award

    NetApp

  • Employee of the Year

    Motorola

  • Employee of the Month

    Motorola

שפות

  • English

    מיומנות מקצועי מלאה

  • Hebrew

    מיומנות שפת אם או דו-לשונית

  • Dutch

    מיומנות יסודית

המלצות התקבל

4 אנשים המליצו Eyal

הצטרפו עכשיו כדי נוף

עוד פעילות על ידי Eyal

הצג Eyal את הפרופיל המלא

  • ראה את מי שאתה מכיר במשותף
  • הכירו
  • צור קשר Eyal ישירות
הצטרפו נוף הפרופיל המלא

פרופילים דומים אחרים

הוסף כישורים חדשים עם קורסים אלה