Transcript
A (0:02)
You're listening to the Cyberwire network, powered by N2K.
B (0:11)
And now a message from our sponsor. Zscaler, the leader in cloud security enterprises have spent billions of dollars on firewalls and VPNs. Yet breaches continue to rise by an 18% year over year increase in ransomware attacks and a $75 million record payout in 2024. These traditional security tools expand your attack surface with public facing IPs that are exploited by bad actors more easily than ever with AI tools. It's time to rethink your security. Zscaler Zero Trust plus AI stops attackers by hiding your attack surface making apps and IPs invisible eliminating lateral movement Connecting users only to specific apps, not the entire network. Continuously verifying every request based on identity and context. Simplifying security management with AI powered automation and detecting threats using AI to analyze over 500 billion daily transactions. Hackers can't attack what they can't see. Protect your organization with Zscaler Zero Trust and AI. Learn more@zscaler.com Security.
C (1:31)
My name is Avishua and I'm the CEO and co founder of Orca Security Infectos. Excited about cyber security since I was 13 years old. As a teenager we had a network in my high school and I was looking about way that you can get around it. It was clear to me that I'm going to get into cybersecurity since then when I became 18 years old to join the Israeli army, the intelligence to Unit 8200 and go to a cyber training course which I also later on became the teacher of one of the course and it all started that way. In fact we had in our high school a team that was both instructors and students that were excited about computers that could help set the network, help with maintaining the IT environment. I was even hired for a few months during the summer break and it was in fact a really great opportunity to get students who are excited about something to do something valuable with the time help setting things. And I was always attracted to how you can make it more secure. I knew it's retroactively looking at it. It was a high school network, it's not secure by definition, but it was still something that excited me to see what are the different trade offs, what it means to set it in a certain way, how it can be attacked via different means, etc. I joined a cyber training course which is very unique compared to a lot of training experiences that the training is not all about what you know about learning stuff, but about learning how to Progress and improve and solve things. It's very rare that we are told there is a problem, you should simply solve it by yourself. Not by looking on how other people do that, but solve it by yourself. And while you do that to make sure that your progress without comparing yourself to others, it really challenges you to get the most that you can. So I started and moved to Checkpoint. I've been there for more than a decade. Started as a team leader, later on became a group manager. Started the sandboxing solution of check point. The last four years I was the chief technologist. Security is all about choke points. And traditionally when you look at computers, there's been two choke points. The network, you know, it's not the ideal. There's encryption, you can't see everything, but if you put a device between your physical network and the Internet, you'll see it all. So it's a great choke point. There is a different choke point which is the cloud itself. And they thought that it's needed to be looked at from a completely different view. And the only way to do something which is so radically indifferent is by starting a company and not trying to do it within companies that are many times more focused on the way that on the history and the capabilities that exist till that time. As a manager, my job it have two acts. One is to lead to make sure that we're executing to the vision, but on the other end to do everything that there is no other owner in the organization. And at the same time we need to build it to make sure that it will grow and execute the vision that we created for orca. The favorite part is to solve actual organization problems. There is so much times in cybersecurity when companies build solutions that looks good on paper but are not consumable, that requires tons of friction, require tons of deployment and in lab it's nice. But they are deployed on 30, 40 or 50% of the environment. It's not really helpful because the attacker can always go to the areas that are not deployed. And theoretically the vendor is okay, but the customer is not secured and can be breached. The one thing that I love about what we do is that we are reducing friction in the organization. And it simply helps people to do their jobs instead of becoming of being plumbers, connecting things, trying to install how to deploy tools. They can do their job and become real security into a security practitioner. If you're just getting started, you need to be excited by that. It's not something that don't do it if you don't love it. Because you won't succeed. I think it's true about every profession, but you really need to love that. But second, take the time and do things for yourself. You must understand how things are actually working. You must understand what is a vulnerability, what are the limitations. You can't just go and jump over that without understanding the basic you'll be always have limitation to capabilities in that. So try to do things by yourself and then everything will be clearer. You'll understand what's important, what's less if you take this time. This is the thing that makes me wake up every morning to make sure that we are creating products that are valuable and fun for people to use. Foreign.
![Avi Shua: Try to do things by yourself. [CEO] [Career Notes] - CyberWire Daily cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F22b5b7a6-e4b2-11ef-8abd-f71124f7c8f2%2Fimage%2F910aaf148c5fdf3b9f89208a91f19df4.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)