Intelligent SME.tech Issue 45 | Page 25

intelligent

// PREDICTIVE INTELLIGENCE //

TACKLING SOPHISTICATED THREATS with Corelight

Implementing robust cybersecurity measures , leveraging advanced technologies and fostering continuous improvement are critical steps in achieving a robust cybersecurity posture . Vijit Nair , VP , Product at Corelight , discusses how to protect digital assets in a connected world and uncovers the path to fortify defences . He highlights the primary ways Corelight is helping organisations enhance their cybersecurity posture and drive significant growth .

c

Can you start by telling us about yourself and your career path so far ?
My career path has been somewhat traditional . I grew up in India deeply fascinated by science and technology . I recall undertaking projects in high school like determining the optimum flight path for drones about 30 years ago . This fascination led me on a journey around the world and ultimately to the US for college . After graduating , I joined a start-up where we were working on AI before it became widely popular . We used AI to predict the health of machines and systems utilised by large organisations in the US , focusing on green energy initiatives .
Eventually , I joined Juniper Networks and during my tenure there , I started in the engineering organisation developing some of the world ’ s most advanced and fastest routers and eventually got promoted to the head of product for their cloud vertical .
Following this , I was looking for a company that was dedicated to defending some of the most critical organisations which is why I took the opportunity to join Corelight . I ’ ve been at Corelight now for around four-and-a-half years working on various products before becoming head of product .
What are some of the main challenges facing security organisations today ?
After conversing with Chief Information Security Officers ( CISOs ) almost weekly for several years , it ’ s clear that the environments they intend to secure are becoming more complex . Several factors contribute to this evolution . The pandemic , for instance , forced many organisations to transition to remote work . Consequently , workloads and applications shifted from data centres and campuses to the cloud , adding layers of complexity . This on-going change is driven by developers , engineers and users adopting new and interesting technologies which continuously expand the attack surface . As a CISO , one must remain vigilant about the evolving threat model and address these changes consistently .
Adding to this complexity is the constantly shifting geopolitical landscape . Attackers are becoming increasingly resourceful and sophisticated , ranging from low-level hackers to nation-state actors who are equipped with advanced AI tools . Thus , not only are the environments growing more complex , but the threats are also becoming more sophisticated .
Compounding these challenges is the difficulty in securing skilled personnel . Despite significant investments in tools and processes , there has been inadequate focus on training and developing cybersecurity talent . This results in a persistent struggle to find individuals with the right skill set to protect organisations effectively . The tension between increasing complexity and sophisticated threats versus a shortage of adequately skilled professionals remains a significant hurdle for CISOs .

AS A CISO , ONE MUST REMAIN VIGILANT ABOUT THE EVOLVING THREAT MODEL .
Intelligent SME . tech
. tech
25