Interview

CISOs must shape IT security programs around overall corporate strategy: Gaurav Agarwal, Symantec

Enterprises need to deploy an integrated cyber defense strategy or a single-platform approach that can protect across endpoints, networks, applications and cloud, says Gaurav Agarwal, Managing Director, India & SAARC, Symantec.

You can't take a zero-trust view with traditional hub-and-spoke architecture: Scott Robertson, Zscaler

A Zscaler report reveals that there is a 400 percent spike in SSL-based phishing attacks. Scott Robertson, VP-APJ of Zscaler reveals what makes SSL inspection such a daunting task for the enterprise.

Vulnerability management, surface visibility is imperative for modern CSOs: Gerry Sillars

Skybox Security imparts huge advantage to organizations over the attackers by delivering advanced vulnerability and threat intelligence, says Gerry Sillars, APAC Chief at Skybox Security. 

Spear phishing has come a long way since the ‘Nigerian prince’ racket: Hatem Naguib, Barracuda

While the CISO’s job has gotten harder, the dark web has made hacking a piece of cake for the bad guys. Hatem Naguib, SVP & COO Barracuda Networks walks us through the current threat landscape.

Bring your own key to resolve trust issues: Jin MA, Alibaba Cloud

In the context of cloud security, bring your own key (BYOK) will ensure businesses don't need to trust anyone else to protect their data, says Jin MA, Chief Product Officer, Alibaba Cloud Intelligence. 

What CSOs must consider before hopping on to the AI bandwagon: Vaidyanathan Iyer, IBM

From crippling skills shortage to secure quantum computing, Vaidyanathan Iyer, Security Software Leader at IBM India, South Asia, throws light on factors affecting present-day enterprise security landscape.

Synchronized security is the secret sauce for modern infra: Gavin Struthers, Sophos

We are changing the security narrative with a broader portfolio that enhances ‘security as a system’ approach, says Gavin Struthers, APJ Chief at Sophos.

Cyber espionage shows no signs of slowing down: Michael Sentonas, CrowdStrike

The bears, pandas, kittens and chollimas are out in the open, and the military top-brass is apprehensive. Michael Sentonas, VP of Technology Strategy at CrowdStrike, gives us a dekko at the cyber espionage threat landscape.

The need of the hour is not just AI, but explainable AI: Subram Natarajan, CTO, IBM India/South Asia

From explainable AI to blockchain to building a super-fast processor, Subram Natarajan, CTO of IBM India/South Asia tells us how IBM does what it does best – innovate to stay ahead. 

A tenth of security alerts that should be taken seriously are ignored: John Maynard, Cisco

From evolving threats to DNS attacks and IoT security, John Maynard, Global Security Officer at Cisco brings to light present-day security challenges the enterprise needs to brace up to.

Meta to become Mega Cyber Security player: Venu Peruri

We want to be biggest Cyber Security solution provider for the large enterprises by 2021, says Venu Gopal Peruri, CEO, Meta Infotech.

Bitdefender EDR is reality than a jargon: Zakir Rangwala

We have good success story with EDR through Bit Defender’s Ultra and elite versions implemented well by our channel partners, says Zakir Rangwala at BD Software Distribution.