Activity
-
🔔 MSPs and MSSPs: Ever wondered how you can make money with vendor risk management? Third-party risk is one of the fastest-growing cybersecurity…
🔔 MSPs and MSSPs: Ever wondered how you can make money with vendor risk management? Third-party risk is one of the fastest-growing cybersecurity…
Liked by Roy Azoulay
-
This is a great opportunity to learn how our executive team is looking at the present and the future of cybersecurity with Cynomi!
This is a great opportunity to learn how our executive team is looking at the present and the future of cybersecurity with Cynomi!
Liked by Roy Azoulay
-
I'm proud to share that Cynomi is a finalist in not one, but 2 categories at the MSP Channel Awards! We’re up for: 🏆 AI Innovation of the Year 🛡️…
I'm proud to share that Cynomi is a finalist in not one, but 2 categories at the MSP Channel Awards! We’re up for: 🏆 AI Innovation of the Year 🛡️…
Liked by Roy Azoulay
Experience
Education
Volunteer Experience
-
Assessment Panel, MBA Entrepreneurship Project
Saïd Business School, University of Oxford
- 2 years 7 months
-
Judging Panel, 2015, 2017 Ideal Idol Business Plan Competition
Oxford Entrepreneurs
- 2 years 1 month
One of Four Judges for Oxford Entrepreneur's flagship pitch competition
-
Co-Initiator & Organiser
University of Oxford
- 1 month
"Conference: Israel and the Global Economic Crisis: Economy & Society, Business & Peace, Innovation & Enterprise"
-
Initiator & Organiser
University of Oxford
- 1 month
"The Changing Face of European Innovation: Perspectives from Britain and Israel”
-
Patents
-
Systems and methods for verifying a device location
Issued US12066554B2
A method of verifying a device location includes receiving a provisional location for a first device, setting a baseline location confidence value for the provisional location, determining a first network environment of the first device, and receiving one or more location reports each including a location for another device in the first network environment. For each received location report, the location in the location report is compared with the provisional location of the first device and a…
A method of verifying a device location includes receiving a provisional location for a first device, setting a baseline location confidence value for the provisional location, determining a first network environment of the first device, and receiving one or more location reports each including a location for another device in the first network environment. For each received location report, the location in the location report is compared with the provisional location of the first device and a distance is calculated; and an adjustment to the location confidence value of the first device is calculated based on the calculated distance. An output location confidence value is generated for the provisional location of the first device based on the baseline location confidence value and the adjustment calculated for each received location report.
-
Flat surface detection in photographs for tamper detection
Issued US US10692202B2
Photographs can sometimes be altered or changed in order to create photographs which appear to be of a scene which never took place, or did not take place at the place and time when the photograph is purported to have been taken. One way of circumventing known systems to detect this sort of falsified image is to take a photograph of a printed altered image. The present invention is a method of detecting such “photographs of photographs” by comparing two photographs of the same seen taken at the…
Photographs can sometimes be altered or changed in order to create photographs which appear to be of a scene which never took place, or did not take place at the place and time when the photograph is purported to have been taken. One way of circumventing known systems to detect this sort of falsified image is to take a photograph of a printed altered image. The present invention is a method of detecting such “photographs of photographs” by comparing two photographs of the same seen taken at the same time, with different exposures.
-
Flat surface detection in photographs
Issued US US11012613B2
A system and method is disclosed for detecting whether a photograph is of a flat surface, e.g. a “photograph of a photograph”, or of a real three dimensional scene. The method includes using a digital camera to take a photograph, and within a predetermined time period either before or after taking the photograph, recording focal length information from a plurality of focus areas using the autofocus routine of the digital camera. The recorded focal length information forms the input to a machine…
A system and method is disclosed for detecting whether a photograph is of a flat surface, e.g. a “photograph of a photograph”, or of a real three dimensional scene. The method includes using a digital camera to take a photograph, and within a predetermined time period either before or after taking the photograph, recording focal length information from a plurality of focus areas using the autofocus routine of the digital camera. The recorded focal length information forms the input to a machine learning classifier which has been trained to classify scenes as “flat” or “3D”.
-
CROSS VERIFICATION OF DATA CAPTURED BY A CONSUMER ELECTRONIC DEVICE
Issued US US10678780B2
The present invention relates to a system and method for verifying the accuracy of metadata attached to primary data captured by a capture device. For example, primary data could be a photograph, sound recording or video recording captured by a consumer electronic device such as a mobile telephone. The metadata may relate to the time and/or location of the capture.
Courses
-
FCA Appointed Representative
-
-
Non Executive Director Duties
-
Languages
-
Hebrew
Native or bilingual proficiency
-
English
Native or bilingual proficiency
More activity by Roy
-
Heading to #XCHANGE next week in Houston? Cynomi will be at booth 510 We have some great swag and as always will be hosting our LEGO Raffle. Our VP…
Heading to #XCHANGE next week in Houston? Cynomi will be at booth 510 We have some great swag and as always will be hosting our LEGO Raffle. Our VP…
Liked by Roy Azoulay
-
🤝 Join Cynomi’s Inaugural Partner Meetups! 🤝 We’re excited to welcome MSPs and MSSPs to Cynomi’s Meetups, exclusive gatherings for MSP and MSSP…
🤝 Join Cynomi’s Inaugural Partner Meetups! 🤝 We’re excited to welcome MSPs and MSSPs to Cynomi’s Meetups, exclusive gatherings for MSP and MSSP…
Liked by Roy Azoulay
-
The Central Bank of the United Arab Emirates (CBUAE) made a bold decision that others should follow. OTP is easily defeated and all organizations…
The Central Bank of the United Arab Emirates (CBUAE) made a bold decision that others should follow. OTP is easily defeated and all organizations…
Liked by Roy Azoulay
-
Following the successful launch of Cynomi's TPRM module, we invite you to the upcoming webinar "From Blind Spot to Business Growth: MSP Success with…
Following the successful launch of Cynomi's TPRM module, we invite you to the upcoming webinar "From Blind Spot to Business Growth: MSP Success with…
Liked by Roy Azoulay
-
"The relationship has been really good. We’ve been moving into vCISO services and Cynomi was as the perfect tool to round out that service...We’re…
"The relationship has been really good. We’ve been moving into vCISO services and Cynomi was as the perfect tool to round out that service...We’re…
Liked by Roy Azoulay
-
"We've more than doubled our client base" Chad Fullerton of ECI shares a great testimonial of his team leveraging Cynomi's platform. Check it out…
"We've more than doubled our client base" Chad Fullerton of ECI shares a great testimonial of his team leveraging Cynomi's platform. Check it out…
Liked by Roy Azoulay
-
From the cold🥶 , rain ☔️ and wind 🍃of Amsterdam to 🌞 and warm 🕶️Barcelona!!!! The tale of three Cynomi manta rays who headed to Canalys (part…
From the cold🥶 , rain ☔️ and wind 🍃of Amsterdam to 🌞 and warm 🕶️Barcelona!!!! The tale of three Cynomi manta rays who headed to Canalys (part…
Liked by Roy Azoulay
-
Have you had a chance to check out Cynomi's blog yet? If not, check out today's newest post from our very own Jenny Passmore! 📰 : How MSPs Use…
Have you had a chance to check out Cynomi's blog yet? If not, check out today's newest post from our very own Jenny Passmore! 📰 : How MSPs Use…
Liked by Roy Azoulay
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreAdd new skills with these courses
-
4h 22m
Complete Guide to Google BigQuery for Data and ML Engineers
-
52m
Enterprise Security Architecture: Aligning Cybersecurity with Business Goals
-
13m
A Standalone Project: Build a Program to Encrypt and Decrypt Text Messages Using an Encryption Algorithm to Protect Data from Unauthorized Access