Q&A: Eugene Kaspersky on taking on the big boys

Kaspersky's chief executive tells IT PRO about how his company plans to climb the security ladder, toppling the likes of Symantec and McAfee along the way.

Everyone will. Most people will take it.

The Stuxnet story, as far as I know... they were disconnected from the internet. So the lesson is to have a very strict policy over new data which you upload to critical IT systems.

If you need to upgrade the system, take it offline, upgrade, double check and then get it back [up and running]. It's better to have a more secure operating system in this environment, maybe a dedicated operating system, which has very strict security regulation. Only a limited set of applications can be used, they must be signed and only a limited set of people has access to the system.

It is much more expensive to develop such a system but [without one] the risk is much higher.

New security technologies are not there to replace existing technologies. They are a new layer of protection. Like a seat belt in a car. It's not a replacement for the airbag.

You've been talking about cloud computing here at InfoSec. What do you see as the benefits of cloud-based security technologies?

Our view on new security technologies is that they are not there to replace existing technologies. [They] are a new layer of protection. Like a seat belt in a car. It's not a replacement for the airbag.

We have mainly cloud-based technologies now in our products... Cloud-based technologies recognise that there are different people, different countries, different places to download executables from, not just the source They recognise that new software is being spread through the internet.

With these we can stop new malware within a few minutes. We can stop it before it is run on computers.

Traditional technology protects you after some time. This cloud technology protects you immediately. It protects you against most of the malware but not 100 per cent.

There are some high-end malicious technologies, which are not possible to stop in this way. For example, polymorphic malware, malware which mutates.

With cloud technologies it is possible to stop most cyber criminals.

Featured Resources

Navigating the new normal: A fast guide to remote working

A smooth transition will support operations for years to come

Download now

Leading the data race

The trends driving the future of data science

Download now

How to create 1:1 customer experiences at scale

Meet the technology capable of delivering the personalisation your customers crave

Download now

How to achieve daily SAP releases

Accelerate the pace of SAP change to support your digital strategy

Download now

Most Popular

Windows XP source code allegedly leaked online
Microsoft Windows

Windows XP source code allegedly leaked online

25 Sep 2020
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020