search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
Interview


Tell us a bit about yourself and your experience in the industry. I have been in the security and infrastructure industry for all of my career – almost 25 years. At Fastly specifically, I started as the Chief Security Officer and SVP of Product, building out those teams and our early product and technology. I learned quickly that when the functioning


of the Internet is dependent on the systems you build, you approach your work with a different mindset. You become good at spotting the small problems that can spiral into large-scale issues and become very thoughtful in the systems you build.


What are your priorities in your current role? Over my career with Fastly, I have helped build our core Edge product, launched the first version of our Compute product, and led the acquisition of Signal Sciences to expand our Security business. Now I am focused on the future of


Te daily stories on the continued


ransomware plague and the reputation and monetary loss from an application compromise keep cybersecurity at the top of everyone’s minds, and have made it a crucial business consideration for companies looking to maintain their resilience in the face of an increasingly dangerous digital ecosystem.


“Fastly’s mission is to make the internet a better place where all experiences are fast, safe, and engaging.”


our Security technology, helping push our CTO research initiatives, and continue to help our prospects and customers take full advantage of the power of the Fastly edge cloud platform.


What excites you about working with Fastly? Tere are very few companies in the world with the scale and importance of Fastly. We work with some of the most important and well-known companies in the world who trust us to manage their online performance and cybersecurity. I’m also lucky to work with the smartest engineers I have ever met. As a security and infrastructure geek, you can’t ask for a better place to work.


What is Fastly aiming for in 2023? Fastly’s mission is to make the internet a better place where all experiences are fast, safe, and engaging. That statement drives everything we focus on. Our focus this year is on improving the ease of use of


the entire platform. By giving our customers an amazing experience with our platform, they will be able to give their users an amazing internet experience. We take our customer’s trust seriously. Our aim is for all our customers to see us as true partners who deliver on our promises, and do exactly what they need us to do.


Cybersecurity is increasingly becoming a board-level concern. What is your experience of this, and how is it affecting business priorities? Nearly every survey I see still shows cybersecurity as the number one technology budget item for enterprises. This has been the case for the last few years, which is a great step forward from when cybersecurity was an afterthought for businesses.


www.pcr-online.biz May 2023 | 21


What do you think will be the key cybersecurity trends for 2023? Consumers are tired of all of the products that are being sold to them to secure their infrastructure that overpromise and underdeliver. Tey are also experiencing solution fatigue from having 20 cybersecurity solutions, none of which integrate with each other. Te major security trend we’ll see in


the rest of this year is the simplification and consolidation of cybersecurity solutions for enterprises. Businesses want a few best-of-breed solutions, that all integrate with each other to protect their networks and applications. Tey want all of these solutions to fit in the


DevOps model, meaning they give full visibility, are API-driven, and easy-to-integrate into their continuous integration/continuous delivery (CI/CD) stack. Above all, though, businesses want these solutions to stop attacks,


not just ‘tell them’ that there was an attack. Most solutions aren’t trustworthy. Tey oſten block legitimate users, slow infrastructure down or are so difficult to use that they are only run in ‘log mode’ where the solution just tells you an attack might have happened, but doesn’t actually stop it. Customers want a trusted solution that can be put into full blocking mode, that will actually stop an attack while it is happening, all without sacrificing performance or availability. As a result, cybersecurity companies are under pressure to deliver on their promises and create strong products that completely fit their client businesses’ needs.


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52