Security advice you can use,
not just a report
Linux operating system attack surface reduction
Designing complex systems, protocols and interfaces
Security of Machine Learning Systems, including IP protection
Secure Developement Practices & Tooling
Reverse Engineering and Tooling for Exploitation
Robust design using best practices, from existing building blocks
With nearly 20 years of experience in the cyber-security industry, Guy held various positions in both corporates and start-ups.
He is currently a Cyber Security Consultant, focusing on OS and Services Hardening, Cryptography, AI Security, and Reverse Engineering.
Starting out as a software developer for security startups and later spent 8 years in the IDF. After completing his degrees in Electrical Engineering and Applied Mathematics, he focused on security research, in the real world.
Leaving the corporate for a while to be a CTO of a startup in the Industrial IoT space (17 people), he later returned to Intel to lead the “Predictive Threat Analysis” group (~10 people) who focused on the security of machine learning systems and trusted execution environments.