In addition, these teams have developed some very advanced algorithms for the detection of poly- and metamorphic malware and the subsequent training in real time of machine learning-augmented intelligence systems that can then detect derivative strains without supervision. This is a huge breakthrough in malware detection.

On the hardware side, they have been studying acoustic information leakage, where noise made by common computers reveals information about the secret data they are operating on. The team has discovered that computer sound recorded by special microphones can be analyzed to reveal secret encryption keys, a breakthrough that will lead to hack-proof hardware platforms.

And finally, in the areas of user behavior, they have been using advanced machine-learning tools to characterize the typical behavior of different users in an organization to detect anomalies in their behavior even when they perform within their authorized range of activities. We can’t do this today, so insider threat is one of the leading causes of a cyber breach.

The point of all of this is to assure that Israel will not fall victim to escalated cybercrime and state-sponsored attacks and not be dependent upon Western governments and commercial enterprises to develop defenses fast enough to outwit the hackers and cyberterrorists.

[lz_related_box id=804358]

Israel is a serious nation with a long memory. It can recognize an existential threat and has the ability to act decisively. It understands how precarious the world stage has become and what a significant role cybertechnology will play in future warfare.

We, on the other hand, would rather spend countless calories investigating justice obstructions that didn’t happen, Russian collision that never existed, and whether our commander-in-chief tweets too much.

When the fan really starts spinning, I hope Netanyahu will be able to make room for us.

Steve King is the COO and CTO of Netswitch Technology Management.