About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
SecurityIntelligence.Com
- Fighting Cyber Threats With Open-Source Tools and Open Standards - Bar Haim
- How to Use DNS Analytics to Find the Compromised Domain in a Billion DNS Queries - Aviv Ron
- TRusted Anonymous Data Exchange (TRADE) Threat Intelligence Sharing With Blockchain - Yair Allouche
- How Israel Became the Land of Connected Car Research and Development - David Storm
- Seeing Data Security Breaches With Your Own Eyes - Ofer Biller
- Hey Phishing, You Old Foe — Catch This Cognitive Drift? - Limor Kessem and co-author Aviv Ron
- Solution for Detecting Cyber Intrusions to Connected Vehicles (II) - Yair Allouche
- Solution for Detecting Cyber Intrusions to Connected Vehicles (I) - Yaron Wolfsthal
- Does NoSQL Equal No Injection? - Aviv Ron
- Tips for Implementing Security Behavioral Analytics - Oded Margalit
- Transparent Hat Hackers: Hacking Outside the Box - Oded Margalit
IBM Research Blog
- IBM’s new AI-infused security technologies help defenders speed response to cyber attacks - Marc Stoecklin, Ian Molloy, Yaron Wolfsthal
- Would you know if your car was being hacked - Yair Allouche
Other
- Artificial Intelligence: a New Weapon for Cybercriminals - Yaron Wolfsthal, (Cyberdefense24, in Polish), interview following keynote talk at Secure'18 (conference organized by CERT.Polska), Warsaw, 2018
- How AI is Sharpening the Edge of Cybersecurity - Yaron Wolfsthal
- Cyber security talent development: Start when they're young - Oded Margalit (Ynet, in Hebrew)