Cybercrime has reached far and wide just as much as technology and the Internet have their reach. Information technology security solutions are crucial for all sorts of organizations and businesses, given the pervasive adoption of the Internet and digital technologies.
The present era is surrounded by devices that are connected through the Internet. From web banking to government organizations and the medical industry, all are connected through the web. With the expansion in the number of web users, there is a substantial increase in the number of cyber-attacks.
Resecurity provides some of the best cybersecurity services in the market to individuals and organizations. The company delivers a unified platform for endpoint protection, risk management and threat intelligence for large enterprises and government agencies worldwide.
The following excerpts are taken from a conversation with Gene Yoo, CEO of Resecurity
Q. What motivated you to reinvent security services?
It’s more than security services. There are many professional firms out there and part of modernizing the service is to do it continuously and with little or no human intervention. Like out of the box and productize or commoditize. As you can imagine the human bench you have to maintain to service everyone. This is the standard across all products and services. The problem with intelligence is that you can only do so much with signals and sensors that collect information. Intelligence is human operations; you can say reinventing or as we like to call it going old-school.
Q. Where do you think the modern enterprise security system is lacking behind, and how is your company filling the void?
There are many solutions with bells and whistles that meets the ever-changing threat landscape as well as regulatory requirements, and we’re not talking about just at the state or federal level but globally. We are seeing waves of enterprise security solutions that are transforming and adapting to the demands of regulatory and advanced cyber threats. If we all paused a bit and improve patching and hardening, and go through reducing the technical debt, we might have a better chance. Instead, we keep putting new or modern systems to fill a checkbox. Let’s not even get into the lack of time, resources and money to support cyber security. Everyone is focused on below the firewall or the perimeter; we like to focus on above the firewall. We go beyond the firewalls to globally search and monitor our clients’ business imperatives. We fill the void by using a combination of signal and human intelligence operations to identify and protect our clients. Without requiring learning how to use the platform and working closely with both technical and business teams to understand what is important to them—tailored to each of our clients on intelligence collection.
Q. Modern cyberattacks are equally automated. How do you help organizations to fight fire with fire?
Automated, perhaps, but the reality is that we make it so easy for our adversaries. Tools may have some automation whereas true cyber espionage groups are well funded to attack or even provide a service. Just like any business enterprise, they are finding ways to optimize and increase profit. This is exactly why we built our Context™ threat intelligence platform, to be like a Google of intelligence—combining signal and human aspects. But you know the old saying, the best offense is defense. By enabling our clients with tools to understand the adversaries tooling and tactics is key but really to get there, you must go upstream and develop a chain of assets. Intelligence platform isn’t one-way ingestion, it’s interactive with your service provider. This is where we differentiate ourselves.
Q. There are other reputed companies in the market, how are you a better service provider?
There are many companies that we look up to and respect. We provide better service simply because we never really talk about the platform, and its features but intelligence. A key aspect of our business is not using any commodity data sources, meaning stuff that is free or generally available online that you can buy from others. If this is the case and everyone is buying the same data sources, what value is threat intelligence monitoring services? We collect over 30,000 all-source intelligence, tailored and acquired to each of our client’s business requirements. Simple, we don’t recycle. Our clients use our platform as a workbench, where they can go as far as they can, but to engage the actual adversaries or infiltrate or maintain a persistent role—this is where we come in. Not using some personas or known tricks. Just like we can spot fraud, they can spot personas.
Q. Bigger the network. Bigger the issue. Do you think your services are ready to cater to the needs of never ending digital transformation?
Absolutely. We have always built our products and services to scale to the growth of our clients. When we “scope” our clients, we’re not counting how many users or domains we’re going to charge, we are evaluating not just their growth in digital ecosystems but also mergers and acquisition growth.
Q. How efficient is your security expertise, and how do you keep your service standards up and running?
Continuous learning and conferences. We invest significantly in professional and personal growth for each of our teams. There is a reason why we still have our original team from 2016. You must take care of your team, that’s the priority. Given that our products are powered and maintained by our human operators, there’s nothing more worth investing in.
Providing organizations with robust cybersecurity solutions
Gene Yoo is the CEO of Resecurity. Gene brings over 30 years of past experience in cybersecurity in various capacities for some of the world's largest brand names such as Warner Bros., Sony, Computer Science Corporation, Coca-Cola Enterprise, Capgemini, and Symantec.