Cloud Security , Security Operations

Achieving Zero Trust in the Cloud

Menlo Security CTO Kowsik Guruswamy Shares Recommendations
Kowsik Guruswamy, CTO, Menlo Security

Office365 and SaaS usage are driving a shift away from managing security on premises, necessitating stronger security in the cloud, says Kowsik Guruswamy, chief technology officer at Menlo Security.

See Also: Buyer’s Guide to Unified SASE for Your Hybrid Workforce

"When people talk about zero trust today, that don't really mean zero," he says. "They are talking about granular trust - at the end of the day you are still trusting a little bit."

In a video interview with Information Security Media Group at RSA 2020, Guruswamy discusses:

  • The nuances of zero trust in the cloud;
  • Security challenges with SaaS app usage;
  • Common challenges and key recommendations.

Guruswamy is CTO of Menlo Security. Previously, he was co-­founder and CTO at Mu Dynamics, which pioneered a new way to analyze networked products for security vulnerabilities. Prior to Mu, he was a distinguished engineer at Juniper Networks. Guruswamy joined Juniper via the NetScreen / OneSecure acquisition where he designed and implemented the industry's first IPS. He has more than 15 years of experience in diverse technologies like security, cloud, data visualization and computer graphics. Guruswamy has 18 issued patents and holds an MSCS from University of Louisiana.

About the Author

Varun Haran

Varun Haran

Managing Director, Asia & Middle East, ISMG

Haran has been a technology journalist in the Indian market for over six years, covering the enterprise technology segment and specializing in information security. He has driven multiple industry events such as the India Computer Security Conferences (ICSC) and the first edition of the Ground Zero Summit 2013 during his stint at UBM. Prior to joining ISMG, Haran was first a reporter with TechTarget writing for SearchSecurity and SearchCIO; and later, correspondent with InformationWeek, where he covered enterprise technology-related topics for the CIO and IT practitioner.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.