Endpoint Security , Network Firewalls, Network Access Control , Next-Generation Technologies & Secure Development

Why the Security Ecosystem Needs the Theory of Evolution

Sophos' Dan Schiappa on the Darwinian Theory of Cybersecurity
Dan Shiappa, senior vice president, Sophos

Cybersecurity pros need to apply the Darwinian approach of "survival of the fittest" to cybersecurity to navigate the risk landscape and raise the industry baseline for security, says Dan Schiappa of Sophos.

See Also: Are Security Tools Slowing Your Response?

But to be effective, a Darwinian approach has to be implemented industrywide and can't be restricted to a single vendor, he adds.

In an video interview at RSA Conference 2018, Schiappa discusses :

  • The evolution of security defenses;
  • Insight into the current security landscape;
  • Metrics from Sophos' "The Dirty Secrets of Network Firewalls" report.

Schiappa is senior vice president and general manager of Sophos' end-user and network security groups. Schiappa oversees the overall product strategy, product management, architecture, research and development, product quality, and release plans for both groups, including recent innovations in next-generation endpoint and firewall products.


About the Author

Varun Haran

Varun Haran

Managing Director, Asia & Middle East, ISMG

Haran has been a technology journalist in the Indian market for over six years, covering the enterprise technology segment and specializing in information security. He has driven multiple industry events such as the India Computer Security Conferences (ICSC) and the first edition of the Ground Zero Summit 2013 during his stint at UBM. Prior to joining ISMG, Haran was first a reporter with TechTarget writing for SearchSecurity and SearchCIO; and later, correspondent with InformationWeek, where he covered enterprise technology-related topics for the CIO and IT practitioner.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.