Avishai Wool

Avishai Wool
CTO and Co-Founder, AlgoSecProf. Wool has served on the program committee of the leading IEEE and ACM conferences on the computer and network security. He has published more than 110 research papers and holds 13 US patents with more pending. He is also a professor in the School of Electrical Engineering at Tel Aviv University and deputy director of the Interdisciplinary Cyber Research Center at TAU. He's the creator of "Unlocking information Security", a successful massive open online course (MOOC). When he’s not busy evangelising AlgoSec’s solutions, Avishai enjoys tinkering with all sorts of computer and network security technologies, most recently focusing on in-vehicle communication networks, industrial control systems, and side-channel cryptanalysis.
Articles by Avishai Wool
Hybrid cloud computing enables organisations to segregate their resources and workloads on-premise, in a private cloud, or a public cloud. But despite its many benefits, the hybrid environment also cr...
News mentions
AlgoSec, a global cybersecurity pioneer, has announced it has been named an Established Vendor in the 2024 Gartner Peer Insights Voice of the Customer for Network Automation Platforms. ...
Professor Avishai Wool looks at five areas where he expects cyber security practices to develop in 2023 in response to the changing threat landscape and advances in response and protection technologie...
AlgoSec, a global cyber security leader in securing application connectivity, has announced its new product, AlgoSec ObjectFlow, a network security object management solution for hybrid environments,...
AlgoSec, a provider of business-driven network security management solutions, today announced the availability of its integrated solution for Cisco ACI and security devices on Cisco’s Global Pri...
Key people from AlgoSec
Security experts
Using artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
DownloadAccess control system planning phase 2
Download