Artificial Intelligence & Machine Learning , Network Detection & Response , Network Firewalls, Network Access Control

Network Security in the Era of Cloud and AI

Rahul Kashyap of Arista Networks on the Evolution and Complexity of Networks
Rahul Kashyap, CISO, Arista Networks

As CISO at Arista Networks, Rahul Kashyap oversees cybersecurity operations and incubates business initiatives. If you look back to 10 years ago, enterprise network were monolithic, Kashyap said, but they have been evolving.

See Also: Building Better Security Operations Centers With AI/ML

Network security is becoming more complex because of hybrid and multi-cloud environments, which provide attackers with new avenues to exploit vulnerabilities, emphasizing the need for constant vigilance.

"One area where we have been particularly focused is network detection and response. This is where you get telemetry from the network, you ingest data and then you respond to threats," Kashyap said. "This gives you a broad set of capabilities to search, query your network in real time and then respond to threats depending upon the nature of the threat."

In this video interview with Information Security Media Group at RSA Conference 2024, Kashyap also discussed:

  • How AI can improve network security through automated anomaly detection;
  • Having a zero trust strategy to implement stringent access controls;
  • The evolving threat landscape and the need to stay vigilant.

Kashyap has been instrumental in building several key security technologies such as network intrusion prevention systems, host intrusion prevention systems, web application firewalls, whitelisting, endpoint/server host monitoring and virtualization-based security. He is an accomplished pen tester and has in-depth knowledge of operating systems, networking and security products.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.