Fusion Experience enriches your digital life seamlessly by connecting all the services that make user experience better, more fluid, and on the go. This holistic philosophy is the secret sauce of successful unicorns and now revealed in a book written by Ilan Dray and co-authored by Amanda Lasser.

Fusion Experience, the book, is limited to only 500 signed Deluxe Edition copies… so it’s time to tease you even more!

Pre order yours Now
www.fusionexperience.design

A philosophy by Ilan Dray / Co-Authored by Amanda Lasser

What is Fusion Experience?

In such a connected world where we can instantly have everything at our fingertips, the user has become very disconnected from the digital experience as a whole. …


09/08/2020 - Sardegna, Italy

Good morning, Italy!

It’s early morning. I’m drinking my cappuccino and enjoying the endless view of Porto Cervo, surrounded by this green forest, naturally sculpted rocks of Sardegna, with the Mediterranean sea on the horizon, the melody of the grasshoppers, little breeze, and no clouds in the sky. This pastoral moment is inspiring and the perfect moment to relax and share with you the story of the new branding of Aqua Security.

Welcome to Porto Cervo, Sardegna Island, Italy / Aqua’s New Branding from a Bird View :)

Today marks exactly six months since I’ve been a part of Aqua Security, the leading cloud-native security company, and the challenge to join a company that is…


Fantastic collaboration with the artist & designer Anna Stylianou, who have already “style” in her name and she won the First Prize of the competition by Mei Avivim to design the coolest sewer cover in the city of Tel Aviv in Israel!
#GOLDTLV #tlv_manhole @tlv_manhole

Anna & IMKMZ in action :) Gold fingers


Dedicated to the inspiring Certified Bikram Yoga Teacher Liliana Ghiani from Hot Yoga Sardegna

During this Covid 19 challenging period, Liliana Ghiani invite you to practice yoga for Free. Follow her on https://www.eventbrite.com/o/hot-yoga-sardegna-30016587524

Hi everyone, so here a simple guidance on how to create your courses online and manage your community without too much technical record. I’ve tried to keep it as simple possible with a step by step article and some cool tips.

1 / Don’t Be Scared of Technology

Technology is created to make your life easier and as an expert in user experience, trust me that behind the scene, lot of people working day to day to create intuitive interfaces that you are using everyday in a seamless way. From Waze to Google, infinite are the examples of platforms and app that are simply here to help you. So don’t be afraid :) If Liliana did it, so everyone can do it!

And the cool news, that you can do it from your phone!


When we create Digital Products, it is good to know the meanings of what you design :)

Based on this simple idea, today, I decided to share with you the technical jargon that we use and makes us sound so smart … and, as soon as you are introduced to these words, everything will look so clear …

INside the KOD … just for you! www.inkod.com

I am pleased to introduce to you THE CYBER SECURITY LEXICON … and today WHAT IS PHISHING ?

Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.

TACHLESSS (as we say in Israel…)

Bad guys are trying to steal your private information to use it against you :( Get some spams in your email? …


When we create Digital Products, it is good to know the meanings of what you design :)

Based on this simple idea, today, I decided to share with you the technical jargon that we use and makes us sound so smart … and, as soon as you are introduced to these words, everything will look so clear …

INside the KOD … just for you! www.inkod.com

I am pleased to introduce to you THE CYBER SECURITY LEXICON … and today WHAT IS SANDBOX?

In computer security, a sandbox is a security mechanism for separating running programs. It is often used to execute untested or untrusted programs or code, possibly from unverified or untrusted third parties, suppliers, users or websites, without risking harm to the host machine or operating system.

TACHLESSS (as we say in Israel…)

When the system organize all your data to find the bugs and without stopping to work :)


When we create Digital Products, it is good to know the meanings of what you design :)

Based on this simple idea, today, I decided to share with you the technical jargon that we use and makes us sound so smart … and, as soon as you are introduced to these words, everything will look so clear …

INside the KOD … just for you! www.inkod.com

I am pleased to introduce to you THE CYBER SECURITY LEXICON … and today WHAT IS TROJAN?

A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users’ systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.

TACHLESSS (as we say in Israel…)

The Trojan Horse is a tale from the Trojan War about the subterfuge that the Greeks used to enter the city of Troy and win the war. …


When we create Digital Products, it is good to know the meanings of what you design :)

Based on this simple idea, today, I decided to share with you the technical jargon that we use and makes us sound so smart … and, as soon as you are introduced to these words, everything will look so clear …

INside the KOD … just for you! www.inkod.com

I am pleased to introduce to you THE CYBER SECURITY LEXICON … and today WHAT IS DDoS?

DDoS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack.

TACHLESSS (as we say in Israel…)

When too much attacks in the same time and same spot and it will cause you a real headache and your system will stop to operate ‘cause’ over data… Let me explain you Trojan…


When we create Digital Products, it is good to know the meanings of what you design :)

Based on this simple idea, today, I decided to share with you the technical jargon that we use and makes us sound so smart … and, as soon as you are introduced to these words, everything will look so clear …

INside the KOD … just for you! www.inkod.com

I am pleased to introduce to you THE CYBER SECURITY LEXICON … and today WHAT IS THE CYBER KILL CHAIN?

A cyber kill chain reveals the stages of a cyberattack: from early reconnaissance to the goal of data exfiltration. The kill chain can also be used as a management tool to help continuously improve network defense.

TACHLESSS (as we say in Israel…)

The Kill Chain is a crazy cool name to describe the series of events to recognize a cyber attack and act against it.


When we create Digital Products, it is good to know the meanings of what you design :)

Based on this simple idea, today, I decided to share with you the technical jargon that we use and makes us sound so smart … and, as soon as you are introduced to these words, everything will look so clear …

INside the KOD … just for you! www.inkod.com

I am pleased to introduce to you THE CYBER SECURITY LEXICON … and today WHAT IS THE DARK WEB?

The “dark web” is the encrypted network that exists between Tor servers and their clients, whereas the “deep web” is simply the content of databases and other web services that for one reason or another cannot be indexed by conventional search engines.

TACHLESSS (as we say in Israel…)

The dark side of the web … so big underground that even Google do not find all what’s happening there and you can buy all the bad stuff.

For more info, I…

Ilan Dray

Senior Creative Director Aqua Security / Former VP Creative Cybereason / Co-Founder Inkod.com / Partner toDay.ventures / Mentor & Global Speaker / FX Godfather

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store