Skip to content
  • Home
  • Categories
    • Computing
    • Artificial Intelligence
    • Virtual Reality
    • Internet
    • Gadgets
    • Mobile
  • Social

Vladimir Kolla, Founder of Patrowl: Half of corporate hacks are done by assets exposed on the internet, so remember to take into account your external attack surface

by Nicholas Flynn
Tweet
Share
Share
Pin

Vladimir Kolla, Founder of Patrowl: Half of corporate hacks are done by assets exposed on the internet, so remember to take into account your external attack surface

During the FIC, Patrowl will present its solution Offensive Security as a Service which makes it possible to continuously test the assets exposed on the Internet. Thanks to the hyper-automation of security controls and penetration testing, Patrowl makes it easy to identify, know and track the remediation of cyber risks. Vladimir Kolla, Founder of Patrowl considers that half of corporate hacks are done by assets exposed on the internet, so remember to take into account your external attack surface.


47

Global Security Mag: What will be your news at the International Cybersecurity Forum 2022?

Vladimir Kolla: During our presence at the FIC, we will present Patrowl, our solution ofOffensive Security as a Service which continuously tests your assets exposed to the internet (applications, website, remote access, cloud, etc.), identifies vulnerabilities and proposes a remediation plan.

Patroll is an Offensive as a Service security solution to manage the Exposed Surface on the Internet of companies to anticipate cyber threats by making organizations more effective against attackers. Thanks to the hyper-automation of security controls and penetration testing, Patrowl makes it easy to identify, know and track the remediation of cyber risks.

Global Security Mag: What are the strong points of the solutions that you are going to present on this occasion?

Vladimir Kolla: Patroll allows :

§ Gain visibility of the information system / Rediscover the information system and shadow IT

§ Succeed in following security news, vulnerabilities, new attack techniques, etc.

§ Succeed in retaining talent by automating thankless or daunting tasks and only having them work on tasks with high added value / Build employee loyalty by getting rid of low added value actions such as the management of multiple vulnerability scanning tools , manual metric recovery to build dashboards…

§ Win time

§ Reduce costs or make better use of the time of its employees by saving time on consuming tasks such as the construction of a remediation plan, monitoring of continuous security updates, etc.

§ Improve reliability (human error)

§ Be exhaustive (do not forget anything)

§ Be faster than attackers and avoid security incidents

§ Prioritize your risks and focus on the real issues

Global Security Mag: Since the beginning of the year, have you noticed the rise of new cyber threats?

Vladimir Kolla: Yes, following the default blocking of macros in Microsoft’s Office tools in April 2022, cybercriminals are focusing even more than before on hacking assets exposed to the internet.

Global Security Mag: How should technologies evolve to counter these threats?

Vladimir Kolla: The constant change in information systems, the galloping cyber news and the shortage of cybersecurity talent are forcing companies to find innovative solutions. Hyper automation is one of them. It is imperative to be able both to follow the news of threats in real time and to assess the security of its IS permanently.

By automating and simplifying cybersecurity, it makes it possible to control security, know and follow the correction of cyber risks in a simple way. Thanks to automation, all companies can benefit from the right level of security.

Global Security Mag: In your opinion, what place can humans have to reinforce the defense strategy to be deployed?

Vladimir Kolla: Humans must intervene on value-added tasks and automate daunting tasks.

Global Security Mag: There has been a shortage of talent for years, what actions can cybersecurity players put in place to attract new talent?

Vladimir Kolla: The lack of cybersecurity talent stems from the lack of students in engineering school and the lack of students attracted to science subjects at school. Among the solutions to be considered should be:

• Restore the image of the IT and security professions by raising awareness and training the youngest from middle school

• Sensitize the youngest to the future needs of the field

• Communicate about companies seeking to recruit young talent in a young and dynamic work environment.

Global Security Mag: What message would you like to convey to CISOs?

Vladimir Kolla: Half of company hacks are done by assets exposed on the internet, so remember to take into account your external attack surface, exposed to the internet, which is increasingly targeted by attackers.

Simplify cybersecurity for CISOs by allowing them to focus on implementing remediation and driving corporate security policies.

Website :

LinkedIn:

Twitter:

contact: sales@patrowl.io


20



We would like to thank the author of this write-up for this remarkable content

Vladimir Kolla, Founder of Patrowl: Half of corporate hacks are done by assets exposed on the internet, so remember to take into account your external attack surface


Check out our social media profiles and other pages related to themhttps://yaroos.com/related-pages/

Related Posts:

  • Scams, hacks and blackmail on the internet: a platform for filing a complaint
    Scams, hacks and blackmail on the internet: a platform for…
  • Digital marketing: The figures to remember for the 1st quarter of 2022 and the new trends to follow
    Digital marketing: The figures to remember for the 1st…
  • Here's why you have to deactivate your phone's internet from time to time, you'll be surprised you haven't done it before
    Here's why you have to deactivate your phone's internet from…
  • Researchers have developed malware to attack your iPhone even when it's turned off
    Researchers have developed malware to attack your iPhone…
  • The founder of Pebble is campaigning for a small Android smartphone
    The founder of Pebble is campaigning for a small Android…
  • Why everything is done to “extend the lifespan” of smartphones
    Why everything is done to “extend the lifespan” of…
Tweet
Share
Share
Pin
Categories Internet Tags Account, assets, attack, corporate, exposed, external, founder, hacks, internet, Kolla, Patrowl, remember, surface, Vladimir
Post navigation
Android and iPhone track you without your knowledge, how to erase GPS history
Are the “crypto bros” going to make metaverse hell for women?
  • Home
  • About
  • Contact

If we Have added some content that belongs to you or your organization by mistake, We are sorry. We apologize for that and assure you that this won’t be repeated in the future. If you are the rightful owner of the content used in our Website, please email us with your Name, Organization Name, Contact Details, Copyright infringing URL and Copyright Proof (URL or Legal Document) at https://yaroos.com/contact/ I assure you that, I will remove the infringing content Within 48 Hours.

Posting....