At FortifyIQ, our R&D team is a unique blend of industry veterans with deep expertise in mathematics and cybersecurity, alongside talented young engineers who bring fresh perspectives and innovative thinking.
With a strong focus on research and innovation, our team has contributed to dozens of patents and published academic papers, solidifying our position at the forefront of cybersecurity advancements.
CEO and Co-founder
USASeasoned entrepreneur with 25+ years of experience leading B2B technology and software companies.
Successfully founded and scaled two companies to the INC 5000 list 8 times, including one reaching #54 with 4,889% growth.
Thought leader and a best-selling published author.
CTO and Co-founder
IsraelYury holds a Ph.D. in Mathematics from the Hebrew University of Jerusalem.
Prior to founding FortifyIQ, he was a principal engineer at ARM, specializing in cryptography, and worked as a data security expert at NDS.
At FortifyIQ, Yury leads the company’s R&D efforts. He holds multiple patents and has published several academic papers in the fields of cryptography and hardware security.
Chief Innovation Officer
IsraelYaacov is a mathematician whose work in cryptographic security and attack prevention has resulted in 41 patents and five published academic papers.
He manages activities related to innovative aspects of products, including academic research, and patenting. Prior to joining FortifyIQ, he held senior security research roles at NDS and Intel where he contributed to both offensive and defensive aspects of semiconductor security.
VP R&D and Products
IsraelValery is an electronic engineer and a semiconductor security expert with 25 years of experience in hardware security architecture and chip design. As VP of Security Research and Product at FortifyIQ, he leads the company’s security R&D and product development.
Previously, Valery has held roles at Sony Semiconductor, Winbond, and National Semiconductor, where he developed advanced security solutions for SoC products. He holds 11 patents in hardware security.
VP Business Development
FranceOlivier has spent more than 33 years in the semiconductor security business helping global companies, including NXP, Microchip and Thales, to define their strategies, products and solutions, and make cybersecurity not only protect assets but also generate revenue.
He's held senior managing positions in R&D, product marketing, sales and business development in international and complex environments. His 7 patents as inventor are in use in many IoT security applications. He holds an MSc in Computer Science and Artificial Intelligence.
We are dedicated to uncovering new vulnerabilities, developing cutting-edge security solutions, and staying ahead of emerging threats. Our relentless pursuit of excellence guarantees advanced, reliable, and practical cybersecurity solutions for our clients.
“Summary. The leakage analysis (Welch t-test) on over 30 million traces did not show statistically significant first- and second-order differences between trace sets with fixed and random inputs. The template-based DPA analysis, on the pseudo-random trace set for the profiling phase (15 million traces) and on a sub-set of 300k fix input traces for matching phase targeting the first-round S-box output, and template attack on ciphertext, did not indicate any potential information leakage.”
” The results for the soft IP presented in the report were obtained on the TOE which is the basic hardware implementation of the soft IP without additional levels of security (e.g. that are present in a secure silicon layout). Therefore the internal strength of the soft IP itself was evaluated. This indicates that the investigated features and parameters of the soft IP implementation should be robust against SCA and fault injection attacks in different implementations including ASIC. Nevertheless, according to the Common Criteria rules, the strength of the final composite product must be evaluated on its own.”