Safety Detective: How did you get into cybersecurity, and what do you love about it?
Isaac Kohen: I love technology’s potential to solve so many of our most pressing problems, and I’ve committed much of my professional career to developing new and better ways to use technology in this capacity. My efforts are not exclusively cybersecurity-related, but this is a subset of tech adoption that I care about deeply. Because I believe in the possibility of technology, I want to see these systems thrive and to help prevent company and customer data from being misused and abused.
SD: What are some industries that use Teramind’s technology and why?
IK: Teramind is used by over two thousand customers in the government, healthcare, financial services, retail and e-commerce, utilities, legal and law enforcement agencies, and other industries. Our solution is suitable for both SMBs and large enterprises. Teramind is used for various use cases such as to detect insider threats, prevent data leaks, improve workforce performance, monitor third-party vendors, and conform with compliance regulations.
SD: How can Teramind protect consumers from threats?
IK: Teramind monitors virtually all activities on a computer such as file transfers, emails, document printing, IM session and more. It uses automated rules to detect and prevent anomalous behavior and threats. It’s intelligent data loss prevention (DLP) engine automatically identifies sensitive data and resources and protects them from unauthorized access and exfiltration attempts. Additionally, the software comes with real-time alerts, session recording, risk analysis, and detailed threat analytics to help admins investigate any security incidents.
SD: What is the number one threat in cybersecurity today?
IK: Today’s companies face a near-constant barrage of cyberattacks that threaten company and customer data. For instance, in 2019, UK companies experienced more than half a million cyberattacks, which was a significant increase from the year before. While these attacks are nuanced and diverse, many ultimately involve insiders – a company’s employees, contractors, or third-party partners. From those accidentally and maliciously compromising company data to employees engaging with phishing scams, collectively insiders are the number one threat to cybersecurity today. Fortunately, companies can control for this dynamic, making it both the most prescient risk and the most significant opportunity for organizations to bolster their defensive posture.
SD: How will the cyber threat landscape change in the next five years?
IK: Cybercriminals have millions of reasons to stay ahead of the game, so the threat landscape that companies face today will not be the same tomorrow. In the years ahead, the same technologies being deployed to drive efficiency and capability gains will be used for malicious means. Automation, artificial intelligence, and machine learning will allow cybercriminals to exploit loopholes more effectively while increasing the frequency and sophistication of their efforts. However, it’s not all doom and gloom. Cybersecurity companies are using this same technology to bolster their defenses. On both sides of the coin, the future of cybersecurity will be more algorithmically driven.