categories

HOT TOPICS

Cyber Security

Thought Leaders in Cyber Security: Ondrej Vlcek, CEO of Avast (Part 1)

Posted on Saturday, Aug 24th 2019

In this edition of the TLCS interview series, we discuss the immense vulnerabilities in B2C security.

Sramana Mitra: Let’s start by introducing our audience briefly to Avast. We’ve covered the company before and we’ll put that in context. From your perspective, do provide a little bit of summary and also a bit about yourself.

>>>
Hacker News
() Comments

Thought Leaders in Cyber Security: Kris Lahiri, Chief Security Officer, Egnyte (Part 6)

Posted on Saturday, Aug 24th 2019

Kris Lahiri: We’ve had a company that specializes in just drone pictures. They take live pictures of a site by drones and keeps that integrated. It uses this as an update to see how that project is progressing and roll that up into whatever reporting they want.

It doesn’t have to separately figure out what to do with the data from the company that works on drone. That is integrated through Egnyte. Similarly, there are these ecosystems that are built out for many industries. Life sciences is a good example.

>>>
Hacker News
() Comments

Thought Leaders in Cyber Security: Kris Lahiri, Chief Security Officer, Egnyte (Part 5)

Posted on Friday, Aug 23rd 2019

Kris Lahiri: There is another angle which is what you were referring to. I’ll bring up Egnyte in the life sciences space. Nowadays, there’s a lot of very serious work being done by life sciences companies that are using either genomics or other types of DNA sequencing, which needs a huge amount of elastic compute.

It’s a perfect environment for what happens in the public cloud like Google Cloud and AWS. The results of those experiments is what they need to collaborate on.

>>>
Hacker News
() Comments

Thought Leaders in Cyber Security: Kris Lahiri, Chief Security Officer, Egnyte (Part 4)

Posted on Thursday, Aug 22nd 2019

Kris Lahiri: In those four to five years, IT either did not have the tools that they would like or people’s thinking had to change. IT was just constantly looked at as a naysayer. If I go and ask my IT how to build this environment, they’re just going to say no.

So I’ll get a department-level AWS account and go build this out in AWS and demonstrate certain results. I’ll integrate some kind of a Hadoop backend and process all this data. They’re able to really work and produce results very rapidly.

>>>
Hacker News
() Comments

Thought Leaders in Cyber Security: Kris Lahiri, Chief Security Officer, Egnyte (Part 3)

Posted on Wednesday, Aug 21st 2019

Kris Lahiri: We integrate with all the top identity management providers. Now that I know who can get in, what types of access do they have? It’s not necessary that everybody in your finance department should automatically have access to payroll info. It’s also not true that everybody needs access to the finance folder.

This type of real-life situations that we’ve seen in the past as well as with our customers is what is built into the platform. We refer to this as our permissions model.

>>>
Hacker News
() Comments

Thought Leaders in Cyber Security: Kris Lahiri, Chief Security Officer, Egnyte (Part 2)

Posted on Tuesday, Aug 20th 2019

Sramana Mitra: I would like you to isolate the different security issues of a content platform and comment on each of them. What are the challenges? How do you differentiate? What are the issues we are dealing with in the current landscape?

Kris Lahiri: I’m going to come at it from a little bit of a deeper technical perspective. Very baseline infrastructure type of issues come up. We look at any content that a customer shares or stores within Egnyte as crown jewels of that company.

>>>
Hacker News
() Comments

Thought Leaders in Cyber Security: Kris Lahiri, Chief Security Officer, Egnyte (Part 1)

Posted on Monday, Aug 19th 2019

Excellent conversation about the security aspects of content and data and the evolution of shadow IT.

Sramana Mitra: Let’s start by introducing our audience to Egnyte and yourself. Bear in mind that we have been covering Egnyte for a while. The audience have some idea. We are going to talk about Egnyte today in the context of cyber security.

>>>
Hacker News
() Comments

Thought Leaders in Cyber Security: Idaptive CEO Danny Kibel (Part 4)

Posted on Monday, Jun 17th 2019

Sramana Mitra: How does this trend of people working from home all the time these days and this whole gig economy thing play into all the scenarios that you’re describing?

Danny Kibel: Yes, that’s key. In the old trusted world, people were either VPN-ing into their office. In that case, they become part of this big trusted circle of their enterprise or they would work from the office which already puts them, in terms of their physical location or network physical location, in a trusted world. They’d be given almost a blank trust to do whatever it is they need to do in the organization.

>>>
Hacker News
() Comments