Interview

Cyber espionage shows no signs of slowing down: Michael Sentonas, CrowdStrike

The bears, pandas, kittens and chollimas are out in the open, and the military top-brass is apprehensive. Michael Sentonas, VP of Technology Strategy at CrowdStrike, gives us a dekko at the cyber espionage threat landscape.

The need of the hour is not just AI, but explainable AI: Subram Natarajan, CTO, IBM India/South Asia

From explainable AI to blockchain to building a super-fast processor, Subram Natarajan, CTO of IBM India/South Asia tells us how IBM does what it does best – innovate to stay ahead. 

A tenth of security alerts that should be taken seriously are ignored: John Maynard, Cisco

From evolving threats to DNS attacks and IoT security, John Maynard, Global Security Officer at Cisco brings to light present-day security challenges the enterprise needs to brace up to.

Meta to become Mega Cyber Security player: Venu Peruri

We want to be biggest Cyber Security solution provider for the large enterprises by 2021, says Venu Gopal Peruri, CEO, Meta Infotech.

Bitdefender EDR is reality than a jargon: Zakir Rangwala

We have good success story with EDR through Bit Defender’s Ultra and elite versions implemented well by our channel partners, says Zakir Rangwala at BD Software Distribution. 

Jim Barkdoll: TITUS looks at India market as fastest growth opportunity

Fresh from investments through Blackstone Ventures, data protection company TITUS is on the growth mode globally, and particularly in India, says Jim Barkdoll, CEO of TITUS.

Human behaviour is the new perimeter: Matt Moynahan, Forcepoint

Digital identities will be the ultimate weapon for CSOs against the hackers says Matt Moynahan, CEO, Forcepoint.

DLP isn’t a disruptive force to company’s culture: Roman Foeckl, CoSoSys

DLP is quickly becoming a mandatory tool in the arsenal of IT departments says Roman Foeckl, Founder and CEO, CoSoSys.

Archaic practices, skills shortage biggest gaps in security today: Rajnish Gupta, RSA

Rajnish Gupta, Regional Director, India & SAARC at RSA explains why identifying critical assets and assigning a risk score is imperative to new age cybersecurity.

Privileged access is a critical pathway to all attacks: Jeffrey Kok, CyberArk

By securing privileged access and secrets like API keys, SSL keys and encryption keys, organizations can their make journey to the cloud with a reduced risk posture, says Jeffrey Kok – Vice President, Pre-sales, Asia Pacific & Japan, CyberArk, in an interaction with IDG Media.

Cloud security doesn’t raise alarm bells: Jay Chaudhry, Zscaler

The shiny network appliances in organizations’ security infra are irrelevant as cloud is now a professionally managed utility, says Jay Chaudhry, founder & CEO at Zscaler.

Robust security with 99.99 percent uptime – LogMeIn CISO tells us how it’s done

From taming the DevOps beast to building a highly resilient architecture, Gerald Beuchelt, CISO at LogMeIn shares his strategy to thrive in the rapidly changing threat landscape.