SecurityIntelligence.Com
- Fighting Cyber Threats With Open-Source Tools and Open Standards - Bar Haim
- How to Use DNS Analytics to Find the Compromised Domain in a Billion DNS Queries - Aviv Ron
- TRusted Anonymous Data Exchange (TRADE) Threat Intelligence Sharing With Blockchain - Yair Allouche
- How Israel Became the Land of Connected Car Research and Development - David Storm
- Seeing Data Security Breaches With Your Own Eyes - Ofer Biller
- Hey Phishing, You Old Foe — Catch This Cognitive Drift? - Limor Kessem and co-author Aviv Ron
- Solution for Detecting Cyber Intrusions to Connected Vehicles (II) - Yair Allouche
- Solution for Detecting Cyber Intrusions to Connected Vehicles (I) - Yaron Wolfsthal
- Does NoSQL Equal No Injection? - Aviv Ron
- Tips for Implementing Security Behavioral Analytics - Oded Margalit
- Transparent Hat Hackers: Hacking Outside the Box - Oded Margalit
IBM Research Blog
- IBM’s new AI-infused security technologies help defenders speed response to cyber attacks - Marc Stoecklin, Ian Molloy, Yaron Wolfsthal
- Would you know if your car was being hacked - Yair Allouche
Other
- Artificial Intelligence: a New Weapon for Cybercriminals - Yaron Wolfsthal, (Cyberdefense24, in Polish), interview following keynote talk at Secure'18 (conference organized by CERT.Polska), Warsaw, 2018
- How AI is Sharpening the Edge of Cybersecurity - Yaron Wolfsthal
- Cyber security talent development: Start when they're young - Oded Margalit (Ynet, in Hebrew)