AITech Interview with Yashin Manraj, Chief Executive Officer at Pvotal

Yashin, to kick things off, could you share what inspired you to transition from a career in academia and engineering to founding Pvotal Technologies?

Growing up, I thought a lack of proper education was the root of many societal issues and inefficiencies.

Idealistically, I entered academia thinking I could become a professor who would nurture the issues leading to a wavering generation of talent, innovation, and development. Unfortunately, I quickly realized how some processes were limiting, stifling, and stuck in an antiquated age.

I could not build or address problems I saw in my niche field due to software issues, data breaches, the high cost of licensing fees for some critical tools, and the poor integration of tools. These issues led me to lose thousands of hours in frustration fixing technical problems rather than focusing on my growth, thesis, and research. The tools I used became a greater source of frustration than my research, constantly distracting me from my objectives.

My skills and resolve were too limited to reform academia from within, so I decided to focus on the issues within the software industry to limit the problems that more talented academics faced. I co-founded Pvotal with Ashley to build a new generation of solutions that helped customers focus on the value they bring to customers rather than get stuck in an iterative cycle of integrating code and debugging updates.

Pvotal emphasizes creating “Infinite Enterprises.” Could you explain what this concept entails and how it aligns with your overall mission?

While many industries have adopted different interpretations of the ideal Infinite Enterprise, we believe the “infinite enterprise” is any company that has achieved an infinitely scalable, independent, resilient, and secure infrastructure. Once these criteria are met, we observed that it allows businesses to truly innovate, improve, and elevate their value proposition to customers.

The age-old adage of teens or some fresh graduates going into “founder mode” can build the next generation of software in their proverbial garage, shared workspace, or dorm room is simply no longer possible.

The rise of hyperspecialization, wanton integration of third-party code or vendors, and the unmanaged accumulation of technical debt has led most software companies to become antiquated, vulnerable, and overbloated pieces of code that can no longer efficiently protect their customers’ data, provide a competitive edge to their users, and have a reasonable cost/utilization footprint.

Most modern enterprise software has at least 17 paid or free SaaS, PaaS, and third-party code powering its operation or development. With a tough economy, inflation, and squeezed supply chains, these different services are forced to raise prices continually, thus shifting the burden on the end consumer. In addition to the increasing costs, these software are often abandoned or introduce vulnerabilities to the enterprise supply chains, which is why we have experienced a record-breaking number of successful cyberattacks, ransomware, and fraud every year for the past decade.

To Know More, Read Full Interview @ https://ai-techpark.com/aitech-interview-with-yashin-manraj/

Related Articles -

Evolution of Lakehouse Architecture

Top Five Open-Source Database Management Software

Trending Category - IOT Smart Cloud

Prateek Bhajanka, APJ Field CISO Director at SentinelOne – AITech Interview

Could you please share some insights into your professional journey as APJ Field CISO Director at SentinelOne?

Prateek: The role of Field CISO is very interesting as it focuses on the value proposition of the security initiatives and deployments. This role helps me in cutting the prevailing noise in the industry because of the overwhelming number of jargon, overmarketing, and overpromises of the providers. At the same time, it helps the security leaders climb the maturity curve and define the security charter.

Can you provide an overview of the current cloud security landscape in the Asia Pacific Japan region and explain why it’s becoming an increasingly critical concern?

Prateek: The adoption of cloud technologies and platforms is only accelerating in the APJ region alongside the threat landscape, and the risks are increasing too. With businesses moving their critical business applications, data, and operations to the cloud, they are increasingly being targeted by threat actors as the organizations’ maturity level in cloud security is relatively lower than the traditional architecture. Additionally, the data protection and privacy laws in different countries and regions emphasize the need for cloud security.

According to you, what could be the key strategies and best practices that organizations should prioritize when securing their cloud platforms within the Asia Pacific Japan region?

Prateek: The first step is the realization that the approach to securing the cloud is different from the traditional approaches and understanding the shared responsibility model between the cloud service provider and the client. Cloud is not inherently secured but can be secured with the right policy, configurations, and controls. The journey to securing the cloud should start with Cloud Security Governance.

Can you identify specific challenges that organizations in the Asia Pacific Japan region typically encounter when it comes to maintaining the integrity and security of their cloud-stored data?

Prateek: Security in the cloud is more of an identity and access management issue. When the identities and access to cloud resources such as data storage are configured with secured configuration such as no public access to storage buckets, expiration of API tokens, etc, it will ensure the integrity and security of the data stored in the cloud.

To Know More, Read Full Interview @ https://ai-techpark.com/aitech-interview-with-prateek-bhajanka/

Read Related Articles:

Trends in Big Data for 2023

Diversity and Inclusivity in AI

Building a Fortified Wall: Effective Third-Party Risk Management Against Cyber Threats

In today’s interconnected business environment, companies regularly rely on third parties for critical business functions like supply chain, IT services, and more. While these relationships can provide efficiency and expertise, they also introduce new cybersecurity risks that must be managed. More than 53% of businesses worldwide have suffered at least one cyber attack in the past 12 months and one in five firms attacked said it was enough to threaten the viability of the business. Recent high-profile breaches like the SolarWinds attack have highlighted the dangers of supply chain compromises. Implementing a comprehensive third party risk management program is essential for security. In this post, we’ll explore key strategies and best practices organizations can use to defend against cyber threats from third party relationships.

Limit Access and Segment Third Parties

Once a third party relationship is established, limit their access to only what is required for their role. Segment them into their own virtual network or cloud environment isolated from your core infrastructure. Implement the principle of least privilege access for their credentials. Disable unnecessary ports, protocols, and services. Lock down pathways between your network and the third party. The goal is to reduce their potential impact and restrict lateral movement if compromised.

Continuously Monitor for Threats

Monitor third party networks vigilantly for signs of compromise. Deploy tools like intrusion detection systems that generate alerts for anomalous behavior. Monitor for unusual data transfers, unauthorized changes, malware, and other IOCs. Conduct vulnerability scans and penetration testing against your third parties’ environments. Audit their logs and security events for issues impacting your security posture. The goal is early detection that can limit damage from a third party breach.

Practice Incident Response Plans

Even rigorous security can still experience incidents. Develop plans for quickly responding to a breach impacting a third party. Define escalation protocols and response team roles. Maintain contacts for your third parties’ security staff. Institute plans for containment, eradication, and recovery activities to limit the impact on your organization. Practice responding to mock third party breach scenarios to smooth out the process. Effective incident response can significantly reduce the damage from real world attacks.

Foster Strong Relationships with Third Parties

While security requirements and controls are critical, also focus on building strong relationships with your vendors, suppliers, and partners. Collaborate to improve security on both sides. Offer guidance and training to enhance their practices and controls. Recognize those who exceed expectations. Build rapport at the executive level so security is taken seriously. Cybersecurity does not have to be adversarial – work together to protect against shared threats.

Third party risk management is essential in modern interconnected business ecosystems. Businesses can no longer rely solely on their own security – all external connections must be assessed and managed.
To Know More, Read Full Article @ https://ai-techpark.com/third-party-risk-management-strategies-against-cyber-threats/

Read Related Articles:

Mental Health Apps for 2023

What is ACI

Safeguarding ASEAN’s Digital Future: Proactive Cloud Incident Response Strategies

The acceleration in the adoption of cloud technology has revolutionised the business landscape, and in doing so, significantly altered the cybersecurity ecosystem. The vast potential of cloud technology, such as its scalability, adaptability, and cost-effectiveness, has not gone unnoticed by nefarious entities seeking opportunities for exploitation. As businesses across ASEAN continue their transition to the cloud, they are increasingly confronted with escalating incidents of data breaches, ransomware attacks, and insider threats.

Therefore, it’s vital for organisations to devise and implement a robust cloud-specific incident response plan. Such a plan can help minimise the impact of security incidents, accelerate recovery time, and ensure optimal data protection in this rapidly evolving digital space.

Cloud Incident Response (IR) today needs to grapple with a radically different set of challenges, including data volume, accessibility, and the speed at which threats can multiply within cloud architectures. The interplay of various components, such as virtualization, storage, workloads, and cloud management software, intensifies the complexity of securing cloud environments.

That being said, Cloud IR cannot be done in isolation of the company’s overall incident response activities and business continuity plans. When possible, cloud security tools should use the same SOC, SOAR, and communication tools currently being used to secure other company elements. Using the same infrastructure ensures that suspicious and threatening cloud activities receive an immediate and appropriate response.

Creating an effective response plan involves understanding and managing the unique cloud platforms, being fully aware of data storage and access, and adeptly handling the dynamic nature of the cloud. Specifically:

Managing the Cloud Platform: The administrative console, the control centre of each cloud platform, facilitates the creation of new identities, service deployment, updates, and configurations impacting all cloud-hosted assets. This becomes an attractive target for threat actors, considering it offers direct access to the cloud infrastructure and user identities.

Understanding Data in the Cloud: The cloud hosts data, apps, and components on external servers, making it crucial to maintain correct configurations and timely updates. This is vital not just to prevent external threats, but also to manage internal vulnerabilities, such as misconfigurations, given the inherent complexity and size of cloud networks.

In conclusion, as businesses in the ASEAN region increasingly embrace cloud technologies, the need for a well-defined cloud IR plan has never been more crucial. By efficiently identifying signs of cloud-based threats, mitigating breaches, and limiting or eliminating damage, organisations can secure their cloud infrastructures, enhance their response processes, and reduce time to resolution.

To Know More, Read Full Article @ https://ai-techpark.com/strengthening-your-cybersecurity/ 

Read Related Articles:

AI and Blockchain Revolution

Ethics in the Era of Generative AI

Maximize your growth potential with the seasoned experts at SalesmarkGlobal, shaping demand performance with strategic wisdom.

seers cmp badge