Privacy Policy

Below the Surface – S1E3

Below the Surface – S1E3

DARSHNA KAMANI [00:01:38] Hello and welcome to this episode of Below the Surface. I am your host, Darshna Kamani. And here is my co-host, Stephanie Cavigliano

STEPHANIE CAVIGLIANO [00:01:48] And hello, everyone. Tell me about your weekend.

DARSHNA KAMANI [00:01:53] Well, we had quite an interesting weekend, we’re lockdown. And I have a daughter so we’ve been trying to make things a bit fun and a bit interesting. So we did a a fake camping. We didn’t quite sleep outside, but we slept indoors, put everything down. It’s fake campfire. But we played a really cool game. We played something called compass coding where someone is “di.. the programmers” and then one person follows the instructions that blindfolded and you tell them where to go to pick up firewood and to get to the campsite. So that was our weekend, a very tired Sunday because we didn’t sleep as much, but it was definitely a lot of fun. How about you?

STEPHANIE CAVIGLIANO [00:02:37] That sounds like a blast! Great innovative ways to stay busy and keep a little one occupied. I have a lovely weekend also. I actually went over the hill, so I live in the Bay Area and I’m very close to the beach, luckily. So I made it out of the beach for the first time from the shelter in place. Then that was a blast. I forgot how easily I sunburn. So I’m paying the price today, it’s all work it.

DARSHNA KAMANI [00:03:06] It’s always worth it when you go to the beach. I definitely miss that one trip. Still yet to do after I looked down in place. So should we get to the show? I’m really excited about our guest today and the insights he will be bringing to the show.

STEPHANIE CAVIGLIANO [00:03:26] It’s gonna be a good one. So if you guys missed the last episode, we focus on secure as we win and some of the research that was carried out by Barracuda, where we delve into the attitudes and opinions about at SD-Wan adoption, along with data about acquisition, preferences, variations by industry and a variety of related issues. So if you want to watch that episode again or any of these episodes, for that matter, you can head over to the Barracuda LinkedIn page and find them on their.

DARSHNA KAMANI [00:03:54] Thanks, Stephanie. And before we bring on our next guests, a quick reminder that you can ask questions in the comments section below or feel free to just say hello and let us know where you’re watching from. So on to the show today, we will be discussing a range of topics from a recent malware Barracuda researchers have spotted to the impacts the pandemic has had on businesses and what the new normal will mean for cyber security and many other topics of the similar “frame”.

STEPHANIE CAVIGLIANO [00:04:24] So our guest today has been at Barracuda for over 15 years, and he is truly the mastermind behind a lot of our technology. He leads the companies get research and innovation, engineering teams and building future technology platforms to deliver continued success in our security and data protection products. He has more than 20 patents granted or pending in both network and content security. So I think could imagine he has a massive amount of knowledge and experience in the industry and we’re going to try to uncover some of that today.

DARSHNA KAMANI [00:04:56] We all are indeed. So with this in mind, it is with great pleasure to welcome our guest for today. Barracuda’s Chief Technology Officer, Fleming Shi.

FLEMMING SHI [00:05:07] Thanks, Darshna and Stephanie, it’s great to be here. Great to join you guys.

STEPHANIE CAVIGLIANO [00:05:12] Welcome, Flemming. We’re so happy you could join us. So let’s go ahead and dwelve right in. iF We look at some of the news and stories around cybersecurity. We see that we’re really never too far from a security breach or a new threat, unfortunately. So we’d like to know, what are some of the key things that you’ve seen recently in “…engine”?

FLEMMING SHI [00:05:31] Sure. There’s quite a few right now. I think if you’re tuning to the news, you can hardly ever miss any, you know, especially cause for cybersecurity related events. Our focus on two or three of them. So today, the first one I want to touch on is the crypto minor malware that we actually published related to this “respilite”. This is something that I wanted to bring to light, because this is one area where, you know, if you think about in COVID-9 pandemic times, a lot of folks are using the Cloud infrastructure to deliver services. And obviously, we as employees like we are right now on the webinar, we’re using a SaaS solutions. So how do you protect those SaaS solutions? So at this particular news is about a particular crypto malware that gets into your Cloud infrastructure and take over your resources. Therefore, they can actually utilise your compute resource and do what they want to do. Obviously, in this case, it’s mining for cryptocurrency, but at the same time they can getting to actually certainly utilise your computers. They can also do a lot of harm. So this is something I wanted to point to. It’s really good to read about it. We actually have some infographics we want to show you later on related to this. And the other news around, you know, especially in Great Britain, I think you heard about the Nigerian prince, you know, the scam. We, I grew up for, you know, with the Nigerian prince scam before. It’s more about like, you know, saving someone from Nigeria, you know, wiring money. But this particular ones, obviously, it’s a cyber attack. In fact, this particular threat has not only made the person rich, but also he’s starting to take advantage of COVID-19. I think the last part of his, you know, various crimes was really related to scamming COVID-19 patients and got 20 million pounds of actual cash related to either treatments or ventilators. So this is something that you have to pay attention to. Attackers are taking advantage of the pandemic, actually trying to go after folks and obviously logistics. All the things that’s related to moving these equipment around are vulnerable to attacks. The other one I would talk about is actually coming up really important for the Americans. It’s a voter scam, right. So in Kentucky, you’ve probably heard about this news related to Attorney General Daniel Cameron’s, you know, alert to the citizens to make sure are not responding to, you know, fake scams, which talks about, you know, election by email, by text, by phone. And none of those actual methods are actually valid voting methods. So in that scenario, you know, it’s really important to pay attention to what’s coming through your your e-mail, because a lot of folks who sign up for registered to vote, there will be, you know, obviously reading news and obviously notifications related to how to actually vote in this November. So pay attention to that. It’s really important to not get getting to a situation where the bad guys are taking advantage of the democratic process. Yeah.

DARSHNA KAMANI [00:09:13] Thanks Fleming, really interesting. And, you know, it’s definitely continuously in the news about cyber security, not so recently, but I remember seeing a couple of weeks ago where we heard about the University of California, San Francisco paying around, I think it was 1.14 Million dollars in ransom to hackers due to an instance. What are your thoughts on this? You know, should companies ever pay the ransom? And how do they go about protecting themselves so they don’t have to?

FLEMMING SHI [00:09:40] Right. So it’s very important to understand, you know, this type of attacks, the ransomware attacks are just going to be always going on. In fact, we did another study recently. We saw another much more broader high volume ransomware attack. So the name of the ransom was called “Abbadon”. We would do a study on it “for the way” in the future. And it’s, important to really pay attention to your process for recovery. If you get the ransomware note or someone get ransomware attacking your organisation. So first, understand which procedures you have in place to make sure you are not going to pay the ransom. That’s the first instinct, right? Try not to pay for the ransom because, you know, most of the folks who have a backup system or have a way to do, you know, file, sync and share. They should be able to recover from, you know, from the situation. But if it’s been there for a while, if you have, you know, gotten the ransomware for a long time, you may not have a choice. But it’s best not to pay for it because you with which you end up doing is continue to fund the you know, the attackers and and the criminals. Right. So it’s do the best you can to not pay for it by that means you have to pre-plan. Make sure you have a good backup. Make sure you have trained your users. And in a scenario where you in some cases the ransomware, it’s actually not necessarily only attacking the individuals files in the UCSF scenario, I believe it’s actually attack on their service. So their servers probably really critical data was encrypted or basically putting hostage scenario. So in those scenarios, you should think about how do you backup your assets that you have for. For your servers. Right. Either that service configuration files or even that potentially really important, I would say profiles of your server service, your applications where they actually, you know, because there’s a front end to the service and there’s backend. So there’s a lot of persistence in as far as data goes. So really pay attention to making sure all those are covered up. And you have a way to recover if you ever get hit. But my suggestion is always try to go through the route that you can manage to recover without paying the ransom, because the ransomware these days is not just about getting your files back. Sometimes they actually go after and say, hey, if you don’t pay the second ransom, they won’t release the data, for example. Right. If you have customer data in there, you’re subject to a much worse scenario. So be careful. But at the same time, try to be really smart about how to secure your data.

STEPHANIE CAVIGLIANO [00:12:49] Great insight and advice there, Fleming. It’s always really interesting to hear how these stories play out in the news. So Bartacuda, of course, that’s its own research to stay up to date on all of the latest trends, as you know, just last month. Barracuda released a bright spotlight on that new crypto minor malware variant that you were “seeing” about earlier. So I want to double click on that a little bit. Can you tell us a little bit more about it? Explain again what the impact is. And importantly, what exactly should organisations be done to stay vigilant in the wake of that kind of attack?

FLEMMING SHI [00:13:21] Absolutely. So obviously, we’re going to have a very focussed session on this in the near future as a webinar. But it’s I’m gonna touch on it. So the crypto minor malware, if you think about it, the cryptocurrency is of high value asset for a lot of criminals because they exchange that. That’s how they build up their wealth. You know, a lot of ransomware uses cryptocurrency, but in this case, obviously, is most of the world is living with some type of a SaaS, you know, making sure your infrastructure is protected. It’s really about what we’re trying to, you know, bring to light. So what that means is your system, Linux or Windows, whatever service date servers you have, it doesn’t matter if it’s a public Cloud or private Cloud. If they’re able to penetrate and identify a vulnerability in one of your, you know, application frameworks. Right. So, for example, you know, some of these will show a table in later on. But this is really about showing you that these applications or are built with components, these components are sometimes have vulnerabilities. When they actually get through those vulnerabilities, they exploit them. Once they get through, then they can dropping all sorts of compute. I would just say, malware, but it’s software that runs on your infrastructure. And in this case, we have a minor. Obviously, it’s a variant of “XM rig”, but also it has a code length scanner that actually does a random generation of IP addresses. So then it continues to kind of virally expand its network. So this particular crypto minor malware can take over your infrastructure and silently utilise your compute power to attack others. Right. So and if you think about that, it’s actually pretty nasty, because if your system got taken over to attack others, what happens to your system? You will have a bad reputation. So many. It’s really all connected. So, you know, having a SaaS serving your customer, could be targeted in this kind of scenario. And it could be very dangerous. Yeah.

DARSHNA KAMANI [00:15:47] Thanks Flemming. And it goes beyond “crypto minor right?” You know, there are other attacks and organisations should be aware of what deeply organisations should currently and be wary of and stay protected against?

FLEMMING SHI [00:16:01] Yeah. So first of all, infrastructure attacks are and those are the one of the things I worry about the most, because first of all, folks are using their home networks to access SaaS to do their job. Right. Let it be collaboration. Let it be productivity, that it be software development, even everything’s online. Like my daughter uses Adobe Creative Suite to build really the designs. Right. So it’s also a SaaS platform. So basically, these infrastructures are designed to be very flexible, very powerful, very extensible. And that’s sort of the, I will say, targets for the criminals because they want to have more compute power, more resources, more trustworthy brands. Sort of, you know, front ending them so they can actually hide behind really, really good brands. So even back to the criminal Raymon Abbas from the Nigerian prince scenario. I mean, he was impersonating all kinds of brands, including Premier League soccer or football, that’s what I shoud say. Football in England. But the point there is impersonation and, you know, making sure they are able to find some kind of disguise, you know, makes their attack more effective. Right. So if you think about that, every every other news that we see, let it be HSBC, let it be other things like even COVID-19 related. WHO impersonation. So all this is about taking over your assets. If you don’t have a “d mark” record, you know, preventing people from using your domain for sending emails, you’re kind of like wide open to the bad guys as well. Right. So just think about all those things. It’s really important to to protect infrastructure. They you have to service your customer could be weaponized. The second thing is, I think it’s really people working from home. Your networks much larger now. We have very secure home networks. Probably not as secure as you think. So think about how to secure that. We’ll talk a little bit more about that in the later part of the discussion here.

STEPHANIE CAVIGLIANO [00:18:26] Yeah. So I’d love to hear more about that now. Right. So, of course, it’s tough to even have this conversation without thinking about how we’re all working from home and the potential security, compromise and threat that poses to our businesses network. So how does that change the threat landscape? Wouldn’t organisations need to be thinking about? And I’m also curious. Has they recruited, seen an increase in threats? If you can even tell us that.

FLEMMING SHI [00:18:57] Yeah, you guys can hear me okay? Again, just want to be sure. So, yeah. So working from home. So this is really, really tricky because part of it is because suddenly we were forced to not by any, you know, positive means. But it’s really pandemic who we are all at home. So suddenly you need to make sure people have laptops and points that actually functions as part of your workforce. And, you know, from there, the network that’s our home is subject to all sorts of, I will say, scrutiny as well, because you have to pay attention to what these networks are. So you really have to think about how to build up the network connectivity security and find a way to apply policies. So it’s not necessarily the, you know, purely based on where your credentials are because your credentials could be stolen. So just think about going beyond just network level of segmentation. Really, it’s up to the world of micro segmentation. You have to get to workloads. So that gives you flexibility to allow people to use their devices to fall for work. But at the same time, really pay attention to who is allowed to what apps, what, you know, making sure all the alerts are set up. So you’re you’re SaaS that supporting your workforce from home. Is it seeing a way? It’s being monitored. It’s being secure. And so that’s really important. And also, you know, working from home is like you can’t just hand everybody a little firewall. Hey, this is the next generation firewall. Take your home and work with that. You can’t do that anymore. I mean, it’s not sustainable. Right. So you have to think about how to conditionally apply policies. So based on the condition of the network, you know, sort of their profile in various locations based on a location, based on their identity. So, for example, using MFA for a lot of things is really important, making sure the person is who they say they are, right? It’s really important to ensure that identity who are accessing your apps are authentic, right? So there’s various components in the working from home scenario. We will talk about but really pay attention to, you know, how the networks put together.

DARSHNA KAMANI [00:21:28] So to me, this naturally means that organisations need to rethink their security strategy and educate their employees. How do organisations ensure they stay secure in this new way of working?

FLEMMING SHI [00:21:41] Yeah, so I think the main thing here is to really understand what work is now. I mean, if you think about if we’re nine manufacture even a manufacturing, you may still have components that runs in the Cloud, right? So think about the world as a hybrid scenario. So there is some, your own data centre, maybe still left, but mostly in public Cloud. Then you have SaaS applications that you are using for your work. Let it be, for example, NetSuite, Salesforce, the biggest SaaS ever, Office 365, right? So it’s you know, all those parts are what makes up your workforce makeup. Makes up to the tools that you use. So in that scenario, really understanding well connected with security is really important. So the things that connect your public Cloud to between regions, who has access to it and all those things, identity, you know, and application connectivity, you know, is this application supposed to talk to this this set of servers? You know, who has access to them? So your Cloud infrastructure, security posture is really, really important. So those are all the elements that you have to pay attention to. And the biggest attack surface today, still email, messaging, collaboration. That’s where a lot of the attack starts. They sent you phishing emails, you know, and those scams are very, very dangerous because when you have one person go through and become a victim, you end up jeopardising the rest of the company, because if that person is connected to your infrastructure, then you potentially there could be a lateral movement. So this is why network segmentations is one thing. And by having micro segmentation on top of that, it makes them more secure, because when you do have one compromised environment or laptop, if you don’t let the rest of the infrastructure being exposed to that laptop or being able to shut it down quickly, it will prevent lateral movement. So the spread of the attack will be obviously slow down.

STEPHANIE CAVIGLIANO [00:24:05] Right. That makes a lot of sense. “Many of us can anticipate” because we have more distraction, easier to get caught off guard, especially when I’ve got this laptop sitting here at home and a lot of other things going on too. So many security considerations to keep in mind. I’m curious, Fleming, as lockdown starts to ease in many different countries, we have organisations that now have folks working from the office and, from home. Does that prevent a different kind of chanlleng?

FLEMMING SHI [00:24:36] Actually, I think when you have more of a hybrid workforce, a little bit different from the hybrid we talked about as the infrastructure. You have users at home, users at work. You still need to connect through the SaaS, you know, environments and other applications that you use. So the difference is that when you’re switching, because at some point you have people going home and going, you know, switching between environments, you know, making sure the application level of security and the endpoint security is in place. So because when you’re going into a controlled environment, the guards might be set differently. So when you go back home, making sure it’s properly transition to a more tighter control. So I think it’s really important to make sure you design something like that. The danger when people are going back and forth between work and home, home offices and maybe sometimes to be even Starbucks in between. You know, your security, is that set up in a way that is ready to protect regardless of the environment? It really tests what we probably zero trust type of policy management.

DARSHNA KAMANI [00:26:01] They say you kind of you mentioned public Cloud already, and it’s definitely been reported that with the new normal and the new way of working and more organisations are moving into the Cloud, is Barracuda seeing the same? And if so, why is it a key solution to this new way of working?

FLEMMING SHI [00:26:20] Yeah. So we see public Cloud as a huge growth. If you think about what’s happening, there is, you know. I would just say the traditional applications I wouldn’t even call traditional, it’s been awhile now, so public Cloud has been out for a long time, since 2006, right? So but before that, people used to use client server applications. But now the public Cloud really is the foundation for all the SaaS. So everything is the SaaS.  Like even for code repository, it’s GitHub. Right. So it’s available around the world. So why is it really, really important? Because, again, there’s a awesome compute power involved in public Cloud. And it’s very elastic. And when you’re not paying attention to your resources or your assets running in public Cloud, you can’t end up being weaponized by the criminals. And therefore, you could have disruption in your own service to your customers because your IP address or your your infrastructure got, you know, breached or penetrated. So it’s being carried out as a weapon. So in that scenario, what happened is the security devices and security solutions will start locking you based on the reputation. From there, you could lose your productivity from your SaaS. You can lose a lot of revenue “if you’re consumption”. So that said, everything’s connected, right. As users are moving to home, Sassy’s become more important. Who does the SaaS? People are building applications. Regardless what it is, those applications will have infrastructure that could be easily taken over. If you’re not paying attention. So that’s why, you know, Barracuda have solutions from both sides. You know, we support the folks who are building application and we support solutions that also filters people. I mean, filters the threats for people who are using these applications. So it’s a complete thing. You know, one side is not going to do it all. So it’s really important to have public Cloud security and hybrid Cloud security as a whole.

STEPHANIE CAVIGLIANO [00:28:35] A little bit about kind of mentioned zero trust. We talked a little bit about application security, I’d love for you to go a little bit deeper into that, you know. Let’s say I’m an I.T. administrator and my organisation is moving to a more public Cloud infrastructure model. What do I need to be thinking about? What what strategies and security innovations should I be considering?

FLEMMING SHI [00:28:59] Yeah. So I think if we touched on your trust, we touched on public Cloud as you’re actually thinking about migrating more staffing to public Cloud is ensuring who has access to it. That’s just, you know, look at that. Right. So why do you need public Cloud? Because it’s extensible. It’s really elastic. It’s really powerful. Right. And you can get infrastructure set up being a moment’s notice. Right. So that is the power. And sort of in some way, it’s dangerous. So having the right people. I would just say even you have developers or dev ops working with your infrastructure. Make sure you have a cost security kind of posture, management, kind of a solution in place. So while you’re doing this migration, moving into cloud, you know, really ensured that environment, people who are touching those, their identity, their access levels. And also if the cloud workloads are configured correctly, because this is why there’s no NCIS foundation benchmarks for all the public Cloud providers. Because you want to make sure the posture, the configuration, the resources are set up in the right way. So no one’s actually accidentally leaving a door or window open in that way. Right. So and also making sure all the application frameworks are patched correctly. Zero trust is really about a SD-WAN, as you know, software defined perimeter making sure. On top of what you have, you’re overlaying a network that basically it’s logically designed for the access level that’s, I will say, limited to a set of tasks. Not opening the entire infrastructure just by purely using VPN. I’m sure you heard about the NSA’s advisory on VPN, you know, situations in the past, in the recent past. And the story there is ensuring you have the right network MASH that basically delivers to secure transport for the applications. Secondly, making sure that the policies and access control is tied down to a purpose is don’t open it up for everything. Like if you open up a whole subnet, potentially lateral movement, we’re coming. Now, on top of that is then again is at end point, you know, which laptop, which endpoint has right access to what app, what kind of application components in the inner pod environment or in your SaaS. That’s really kind of delivers the full spectrum of zero trust type of security model. And some of those requires you to be actually to make sure your laptop is, you know, up to let you say the patch level is it’s up to date before you can access your mom. And things like that is also it’s very conditional kind of qualifications for them, for the end point to function. So that’s also part of the zero trust, kind of the overall security model.

DARSHNA KAMANI [00:32:22] So this alone makes me think about the skills needed in security to support businesses. There’s a lot of news about the lack of security professionals and skills. Do we have the right cybersecurity skills within businesses to manage all these new technologies?

FLEMMING SHI [00:32:39] You know, I think, you know, not always, but I think things are getting better because people are start.. part of the security is really about the fabric and who is using the network and using the applications. So awareness training is it’s coming up to speed. People are getting a little better. So I think just pure cybersecurity skills, doing threat hunting, doing analytics, that’s gonna be hard to find. But every one of us just kind of like the COVID-19 scenario. Every while else has part of it. We actually can do something to make sure we’re not causing a problem for the network or we’re not contributing to the criminals, you know? You know, their plots. So really, think about the skills goes from driving awareness, understanding what the threats really mean and how they actually get to you. And obviously, having the right security tools in front of it will help a lot. But at the same time, you know, just having the immune system doesn’t always get you the awareness. You you need exposed to your exposed some level of threats to the user so the users can get trained up. Then beyond that is a professional. Really understand how the hackers think, what tools they use, where do they look in your infrastructure, putting up the right monitoring solutions to really understand what the data means. That is the autonomy. And we need to get more folks to do more data analytics. And really, data driven future is really important for security because there’s so much data right now. Not everybody can really kind of pass through and consume and extract the right things. So having the right tools will help. But at the same time, those skills are the hardest to find. Yeah.

STEPHANIE CAVIGLIANO [00:34:35] So, Flemming, do you have any advice for folks who might want to make a career in cybersecurity? What do you see as some of the additional key skills for those individuals who are looking to join the cybersecurity industry?

FLEMMING SHI [00:34:48] Right. So, yeah, I have the privilege of working through my earlier part of my career, really kind of started from a “socket” level programming. Understand how the application working the days where you have to go, you know, listeners and clients, sockets and server sockets. But today’s world, when people are building applications. They may not actually understand all the parts. Right. They are, you know, interacting with the API, they are interacting with a set of SDKs. So really do some homework on understanding the fundamentals. Really understand, okay, behind this API, there are these other things behind it. Right. So through the API, my data will end up being in this storage, in this Cloud in various states. Really pay attention to that because then, you know, you know what the attack might be like. So really, I think that’s one thing I would suggest is pay attention, understand the Funday fundamentals, the foundation behind it, the infrastructure where the data’s are stored, and also pay attention to, you know, how software is being really kind of deliver it. Right. So in the old days, it was just mostly if we’d get lucky if it’s a browser, but you know, it could be a client. But today, it’s all a lot of mobile devices. A lot of IOS or Android endpoints. So, you know, what’s running on that device also matter. So those are really important parts of of really kind of being part of the cybersecurity professional line of work. Yeah. Because let me just give you an example. There was, you know, a while back, you know, IOS probably has a certain database functions behind the scenes and locally. You can easily break through and get to that database by doing a show injection into the app. So point there is know just pay attention. So if you know the platform you’re running out needs to be more help right now. Of course it’s much more secure. But if you whatever platform you’re using, let it be a public Cloud workflow. Just pay attention to that and know how to secure your data even the host gets compromised. You will still have security for your data. Yeah. That’s just one example.

DARSHNA KAMANI [00:37:14] Some great ideas and advice there. Thank you. So what about women in tech? I mean, it’s definitely something I hold dear about, you know, getting more women into tech. I’m trying to introduce my daughter to nanotechnology and coding so she has a passion for it. How do we get the next generation of women to want to join and stay in tech? And more specifically, in cybersecurity?

FLEMMING SHI [00:37:37] You know, first of all, you guys are doing great. We’re very good to have a lot of great women in tech and cybersecurity. So one of the things that I feel it’s important is the social media effect of it, right? So if you look at all the different applications that’s running on people’s phones, you know, understand how they work and train folks to really think about what kind of data you want to post. Just drive awareness at a young age first. So I tried to train my kids to be very, very cautious in their what they post and what kind of things they… Start early. I mean, start from the dinner table. I mean, besides all the fun stuff that’s going on. But talk about cyber. The digital world. It’s really cool. And I put, the other thing I did is, you know, if you guys like Matrix, it’s a trilogy. I ship you know, these are geeky movies, but it’s fun for the kids. Then they get to understand how, you know, applications can be brought to life almost visually. Right. Like, really, if you think about it, “the hackers” how they interact with our, you know, attackers, interact with the victims. You know, all that. It’s kind of like a movie. It’s really important to drive awareness early on. And yeah. So I think there’s plenty of opportunity to drive that interest. And because in the future, everything is digital. There are going to be more advanced than we are 10 years from now. So, you know, if they don’t understand how things work behind the scene now, it will be much harder by then. So I think the complexities can go up. So keep iterating through it and you stay on top of all the apps they’re running. That’s another thing I think it’s important. Yeah. Yeah.

STEPHANIE CAVIGLIANO [00:39:27] Thanks Flemming. So you’ve been with Barracuda for the last 15 years. What are some of the biggest changes that you’ve seen within the cyber security landscape?

FLEMMING SHI [00:39:37] Oh, that’s a good question. It might take me 50 years to answer that, but no, no, it’s not that but that, you know, from my experience, you know, really sees what kind of solutions would go fit into our customers journey. And really kind of tells me how things are changed. Right. So initially when we built appliances, it was really awesome. Putting it in your closet, in your server closet or in your private data centre. And then it will just function, you know, set and forget. Right. But today, things are much more complex. There’s a lot more Cloud enable solutions. So our move to SaaS, for example, is a clear indication that Office 365 dominates exchange, for example. Right? So how do you secure Office 365 environment became a important transition. How we build our IMOS solution all the way to what we have it today? Then on top of that, you know, we had to migrate out of our own datacenter into public Cloud to take over now, not take over, take advantage of the awesome elastic and really powerful Cloud environments in AWS and Azure. So when we do that, we realise security is different. So how do you ensure who is entering your infrastructure? How they interact with your workloads? How do they configured environment? Maybe the infrastructure as code needs to be examined, making sure there’s no hosing there. All those practises are new things that we wanted to make sure we offer to our customers, too. So that’s a huge, you know, transition and transformation as well. So and obviously awareness like we talked about today, we’re working from home. Kids are studying from home, doing their homework from home. Right. So all those things requires much more awareness. Just as a vigil, just kind of like the pandemic, you know, you really have to pay attention, secure yourself, secure yourself for the benefit of others. Yeah.

DARSHNA KAMANI [00:41:41] So you’ve talked about what you’ve seen over the last 15 years. What about the future? What does the future hold for cyber security from threats as well as you know, how is it perceived by businesses? We talk about cyber security being at board level. Will we get there?

FLEMMING SHI [00:41:57] I think we’re making progress because I think you can see the future really is about, you know, like even the infrastructure we pay a lot attention to who is getting the data from that infrastructure out. Right. So so pay attention to that. And I think as companies move forward in this kind of environment or post pandemic, it’s very dispersed environments. So. Home offices are now your work offices. So pay attention to zero trust, making sure your security connecting networks are functioning and actually are able to do the job. It’s not just putting a firewall, blocking IPs. It’s about certain application functions, identity, making sure the user is always multifactor checked. So it’s not there just on typing a password and then they have keys to the kingdom. So you have to really pay attention to that. So I think the future what’s in store for us is more complex environments, more connected devices. It’s exciting for cyber security industry because we have a lot to protect and a lot of ways to make sure things are done correctly.

FLEMMING SHI [00:43:06] The work is never done… Flemming before we let you go, I have got one final question. Can you tell us what are some of the key trends in cyber security for this year? And which ones should organisations be paying attention to?

FLEMMING SHI [00:43:21] The biggest key trend right now is really about micro segmentation of your applications, your network getting the right protection in front of your workloads. Sometimes it’s the workloads that you serve your users with. For example, I’m Salesforce. I’m running Salesforce for customers. There are some other cases is really about data. You’re using Salesforce. How do you secure the data inside the Salesforce? Right? Now, make sure they’re not stolen. So the trend there is getting a level to the point where everyone at home needs to be trusted. So they’re the work tools that you have needs to be really well-defined. And making sure there’s no, you know, lying spots at the same time, at the same time, secure connectivity between your public cloud environments, your private Cloud environments. Your branch offices and now home offices. That’s really, really important. So that the whole SD-WAN, you know, future is there in store for us winning front of us. Yeah.

DARSHNA KAMANI [00:44:29] Thank you, Fleming, this has been a really interesting discussion. I have thoroughly enjoyed it and learnt so much, but unfortunately, that’s all we have time for today. Fleming, thank you again for joining us. It’s been an absolute pleasure.

FLEMMING SHI [00:44:41] It’s a pleasure for me to thank you for having me.

STEPHANIE CAVIGLIANO [00:44:44] Yes, thank you so much. Now, don’t forget, folks, that you can see all of our latest threat insight by subscribing to the Barracuda blog. You can do that on our website.

DARSHNA KAMANI [00:44:54] Thanks, Stephanie. Also, don’t forget to follow Barracuda on LinkedIn for the next instalment of Below the Surface. Until next time. Have a safe journey.