About
Activity
-
Proud to share that IBI CAPITAL has acquired 60% of Nextage's shares! 🎉 This milestone marks an exciting new chapter for our team and the amazing…
Proud to share that IBI CAPITAL has acquired 60% of Nextage's shares! 🎉 This milestone marks an exciting new chapter for our team and the amazing…
Liked by Shaked Gitelman
-
Password hygiene is important in reducing the risk of unauthorized access or compromised credentials. But is it a powerful enough approach against…
Password hygiene is important in reducing the risk of unauthorized access or compromised credentials. But is it a powerful enough approach against…
Liked by Shaked Gitelman
-
Last week, I had the privilege to participate in the OECD Working Party on AI Governance (AIGO) in Paris, representing Israel. During the…
Last week, I had the privilege to participate in the OECD Working Party on AI Governance (AIGO) in Paris, representing Israel. During the…
Liked by Shaked Gitelman
Experience & Education
Patents
-
TECHNIQUES FOR DETECTING EXPLOITATION OF MANUFACTURING DEVICE VULNERABILITIES
Issued 20210264036
A system and method for determining device attributes using a classifier hierarchy. The method includes: determining at least one exploitation condition for a manufacturing device based on at least one first device attribute of the manufacturing device and a plurality of second device attributes indicated in a vulnerabilities database, wherein the vulnerabilities database further indicates a plurality of known exploits for the plurality of second device attributes; analyzing behavior and…
A system and method for determining device attributes using a classifier hierarchy. The method includes: determining at least one exploitation condition for a manufacturing device based on at least one first device attribute of the manufacturing device and a plurality of second device attributes indicated in a vulnerabilities database, wherein the vulnerabilities database further indicates a plurality of known exploits for the plurality of second device attributes; analyzing behavior and configuration of the medical device to detect an exploitable vulnerability for the manufacturing device, wherein the exploitable vulnerability is a behavior or configuration of the manufacturing device which meets the at least one exploitation condition; and performing at least one mitigation action based on the exploitable vulnerability.
-
TECHNIQUES FOR DETECTING EXPLOITATION OF MEDICAL DEVICE VULNERABILITIES
Issued 20210264035
A system and method for determining device attributes using a classifier hierarchy. The method includes: determining at least one exploitation condition for a medical device based on at least one first device attribute of the medical device and a plurality of second device attributes indicated in a vulnerabilities database, wherein the vulnerabilities database further indicates a plurality of known exploits for the plurality of second device attributes; analyzing behavior and configuration of…
A system and method for determining device attributes using a classifier hierarchy. The method includes: determining at least one exploitation condition for a medical device based on at least one first device attribute of the medical device and a plurality of second device attributes indicated in a vulnerabilities database, wherein the vulnerabilities database further indicates a plurality of known exploits for the plurality of second device attributes; analyzing behavior and configuration of the medical device to detect an exploitable vulnerability for the medical device, wherein the exploitable vulnerability is a behavior or configuration of the medical device which meets the at least one exploitation condition; and performing at least one mitigation action based on the exploitable vulnerability.
-
TECHNIQUES FOR RESOLVING CONTRADICTORY DEVICE PROFILING DATA
Issued 20210185058
A system and method for resolving contradictory device profiling data. The method includes: determining a set of non-contradicting values and a set of contradicting values in device profiling data related to a device based on a plurality of conflict rules; merging values of the set of non-contradicting values in device profiling data into at least one first value; selecting at least one second value from the set of contradicting values, wherein selecting one of the at least one second value…
A system and method for resolving contradictory device profiling data. The method includes: determining a set of non-contradicting values and a set of contradicting values in device profiling data related to a device based on a plurality of conflict rules; merging values of the set of non-contradicting values in device profiling data into at least one first value; selecting at least one second value from the set of contradicting values, wherein selecting one of the at least one second value from each set of contradicting values further includes generating a certainty score corresponding to each value of the set of contradicting values, wherein each certainty score indicates a likelihood that the corresponding value is accurate, wherein the at least one second value is selected based on the certainty scores; and creating a device profile based on the at least one first value and the at least one second value.
Languages
-
Hebrew
Native or bilingual proficiency
-
English
Full professional proficiency
More activity by Shaked
-
Very proud to receive the J. Clarence Karcher Award from SEG! Awards are always about what you did and not necessarily what you will do, but looking…
Very proud to receive the J. Clarence Karcher Award from SEG! Awards are always about what you did and not necessarily what you will do, but looking…
Liked by Shaked Gitelman
-
"One ring to rule them all" .... Cloud security remediation! Congrats to the founders Merav Bahat, Tomer Schwartz, and Yuval Ofir! Our friends…
"One ring to rule them all" .... Cloud security remediation! Congrats to the founders Merav Bahat, Tomer Schwartz, and Yuval Ofir! Our friends…
Liked by Shaked Gitelman
-
A Mediterranean sea journey full of macarons? Today we launched our new LOTI PANTÓN Macarons Summer Collection 2024 - a new approach full of recipe…
A Mediterranean sea journey full of macarons? Today we launched our new LOTI PANTÓN Macarons Summer Collection 2024 - a new approach full of recipe…
Liked by Shaked Gitelman
-
The longest road I ever took reached its finish line last week, at the formal PhD graduation ceremony at Tel Aviv University. Years full of research,…
The longest road I ever took reached its finish line last week, at the formal PhD graduation ceremony at Tel Aviv University. Years full of research,…
Liked by Shaked Gitelman
-
Black Hat USA 2024 🎩 starts in just a few weeks! Zafran Security has something exciting cooking 🎸 Reach out if you’d like to meet while we are in…
Black Hat USA 2024 🎩 starts in just a few weeks! Zafran Security has something exciting cooking 🎸 Reach out if you’d like to meet while we are in…
Liked by Shaked Gitelman
-
Last 3 weeks > lessons learned: 1. I (may) have time for LinkedIn just during the weekend (sorry Nick Fisher #ZAFRAN VP marketing) 2. Onsite with…
Last 3 weeks > lessons learned: 1. I (may) have time for LinkedIn just during the weekend (sorry Nick Fisher #ZAFRAN VP marketing) 2. Onsite with…
Liked by Shaked Gitelman
-
Revenue org to R&D: "You just build us a good product, and we'll make sure to sell it"- The last week I had the privilege to experience with our…
Revenue org to R&D: "You just build us a good product, and we'll make sure to sell it"- The last week I had the privilege to experience with our…
Liked by Shaked Gitelman
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More