Q&A: Eugene Kaspersky on taking on the big boys

Kaspersky's chief executive tells IT PRO about how his company plans to climb the security ladder, toppling the likes of Symantec and McAfee along the way.

Everyone will. Most people will take it.

The Stuxnet story, as far as I know... they were disconnected from the internet. So the lesson is to have a very strict policy over new data which you upload to critical IT systems.

If you need to upgrade the system, take it offline, upgrade, double check and then get it back [up and running]. It's better to have a more secure operating system in this environment, maybe a dedicated operating system, which has very strict security regulation. Only a limited set of applications can be used, they must be signed and only a limited set of people has access to the system.

It is much more expensive to develop such a system but [without one] the risk is much higher.

Advertisement - Article continues below

New security technologies are not there to replace existing technologies. They are a new layer of protection. Like a seat belt in a car. It's not a replacement for the airbag.

You've been talking about cloud computing here at InfoSec. What do you see as the benefits of cloud-based security technologies?

Our view on new security technologies is that they are not there to replace existing technologies. [They] are a new layer of protection. Like a seat belt in a car. It's not a replacement for the airbag.

We have mainly cloud-based technologies now in our products... Cloud-based technologies recognise that there are different people, different countries, different places to download executables from, not just the source They recognise that new software is being spread through the internet.

With these we can stop new malware within a few minutes. We can stop it before it is run on computers.

Traditional technology protects you after some time. This cloud technology protects you immediately. It protects you against most of the malware but not 100 per cent.

There are some high-end malicious technologies, which are not possible to stop in this way. For example, polymorphic malware, malware which mutates.

With cloud technologies it is possible to stop most cyber criminals.

Featured Resources

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?

Download now

Your first step researching Managed File Transfer

Advice and expertise on researching the right MFT solution for your business

Download now

The KPIs you should be measuring

How MSPs can measure performance and evaluate their relationships with clients

Download now

Life in the digital workspace

A guide to technology and the changing concept of workspace

Download now

Most Popular

operating systems

17 Windows 10 problems - and how to fix them

4 Nov 2019
Business strategy

The pros and cons of net neutrality

4 Nov 2019
Domain Name System (DNS)

Microsoft embraces DNS over HTTPS to secure the web

19 Nov 2019
social media

Can Wikipedia founder's social network really challenge Facebook?

19 Nov 2019