Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

AiThority Interview With Deepak Patel, Security Evangelist at PerimeterX

AiThority Interview With Deepak Patel, Security Evangelist at PerimeterX

Know Me

Hi Deepak, please tell us your role and the team you handle at PerimeterX.

I serve as a Security Evangelist at PerimeterX. My team of cybersecurity experts work closely with Research and Product teams to consistently uncover and combat novel cyberattacks. At PerimeterX, we analyze the full gamut of cyberthreats related to Websites, Mobile apps and APIs, DevOps and Governance, and we work with digital businesses to protect them and liberate them of worry in each of these categories.

Recommended AI: AiThority Interview with Rohan Chandran, CPO at Infogroup

From your vantage point, what have been the most impressive and important changes to your industry, and how has it changed the way you work?

Without a doubt, COVID-19 is having the most prominent effect right now. The PerimeterX team has been tracking surges in traffic and cyberattacks on industries including food and food delivery, e-learning and travel, and fashion and home goods.

Levels have been surpassing even the highs of holiday shopping, with account takeover (ATO) attacks most commonly trending. These attacks are far from new, having incurred roughly $10 billion in losses over the past two years. My team is at the forefront of educating Retailers and Financial Service companies to strengthen their mitigation efforts even further.

Digital skimming attacks such as Magecart have continued to rank among the top cyberattacks as well, with ramifications rising for businesses due to compliance regulations such as GDPR and CCPA. Additionally, cybercriminals are now intercepting web and apps by attacking the APIs that connect them. Educating businesses on risk factors continues to be critical here.

How are App Attacks different from Website attacks? What kind of technology does one rely on to thwart such attacks?

Website attacks can be classified as typical attacks that go after the vulnerabilities of the protocol. We are defining web applications as applications that provide a user with a login and allow the user to make a purchase or obtain something of value. Web Application attacks abuse the business logic – like using the login page to validate stolen credentials or using the gift card balance checks to guess gift card numbers with a balance.

ATO attacks, carding attacks, and scraping attacks are just some of the attack types that are shared between the two. In fact, the primary way that apps are built today is with APIs. APIs are increasingly being targeted by malicious hackers. Our research has found more than 75% of login requests from API endpoints are malicious. The growth in API attacks is driven by the simple fact that they are easier and more economical to mount while being harder to detect than legacy browser-based botnet attacks.

Recommended AI: AiThority Interview with Charlie Dordevich, VP of Sales Operations at Nintex

New forms of Cyber threats are emerging. Healthcare and Financial institutions are the primary targets? How do you analyze these threats at PerimeterX?

Cybercriminals go after the money. As more users transact business online across many segments such as Healthcare, Financial Services, and e-commerce, the attackers follow.

We take a proactive approach and monitor for these threats as they arise, with Machine Learning trained by a real-time feedback loop to keep up with evolving attack methodologies.

Recently, Bird Bot pushed the pricing higher for Nintendo Switch, poaching resellers to hoard the console. What kind of bots are we dealing with here?

These open-source bots are fairly sophisticated and have a workflow for top e-commerce sites that repeatedly adds console listings to a ledger and automatically presses the buy button. This follows a similar model to bots used by streetwear and sneaker enthusiasts to snatch up inventory for the sake of resale profits.

These tools have become quite popular in street fashion markets, have been sold openly, and are even advertised on the growing number of sites covering shoe culture and sneaker releases.

Who benefits from deploying these kinds of checkout bots/reselling bots?

Secondary market hosts and resellers are the direct beneficiaries of these. Bird Bot was publicly available to anyone with access to the distributor’s Discord server, allowing consumers to access the tool without even paying a premium.

On the opposite end, there are huge repercussions to the businesses from whom products are bought using these tools. For these brands, checkout bots that deny users access to products are seriously damaging their reputation. These bots are very sophisticated, change rapidly, and are tuned live during the launch of such limited edition products, making it really challenging to detect and mitigate them.

Read More: AiThority Interview with Ben Vaught, CEO at DemandStar

AI, Blockchain, low-code DevOps, and RPA techniques are making a huge impact on the current security tech markets. Where is the overall AI-ML market heading to in the next 4 years?

As cyberattacks are becoming increasingly sophisticated, Machine Learning-based solutions are going to become a core aspect of any content security policy.

Users now create staggering amounts of data per year, and novel algorithms are necessary to differentiate user behavior to solve new use cases. To do that, website owners need a new defensive Machine Learning-driven methodology, sophisticated behavior modeling, and a constant real-time feedback loop.

What kind of skills and abilities does one need to be part of your security product development team?

Members of my team must focus on putting customer needs first, understanding the true value of our products from a market perspective, and being able to nurture innovations that meet demand.

We have to prioritize the features that customers mainly rely on, and the main reasons customers are using our products. Building and Marketing innovations into Products that match market demand at the right time are key for driving strong adoption and satisfaction.

Apart from offering Bot Defender, what other ways can businesses leverage automated cyber threat management to sustain growth?

We additionally offer PerimeterX Code Defender and PerimeterX Page Defender, which protect against other prominent attacks that threaten business growth. Code Defender proactively monitors client-side code for websites and apps and protects against Magecart attacks, digital skimming, formjacking, and sensitive data-harvesting attacks by detecting malicious script execution to safeguard user data.

Page Defender is a browser malware protection solution that blocks unwanted ads and scripts from redirecting web visitors so they can complete their intended path, resulting in more revenue for e-commerce sites and better brand experience.

Read More: AiThority Interview with Michael Sentonas, CTO at CrowdStrike

Is it safe to say that AI and Machine Learning development have finally outgrown their IT predecessors? Is it now an industry and a service in itself?

Yes. Previous approaches didn’t act in real-time and didn’t have automated feedback loops to continuously improve. Machine learning (ML) does all of this. Smarter fraudsters are now taking fuller advantage of Cloud Computing and Distributed Networks to mount attacks that are both harder to detect and are constantly evolving.

ML is required to get ahead of the cat-and-mouse game and spot new, more sophisticated threats that can evolve by the hour. The biggest advantage with ML is that it helps the industry deal with the increasing volume of security alerts and false positives. This enables the Security Analysts to get to the newest threats and stay ahead.

What is your opinion on the “Weaponization of AI technologies”? How do you promote your ethical AI ideas in the modern Digital economy?

Data usage and privacy comprise arguably the biggest ethical struggle in cybersecurity. AI consumes a daunting amount of data, and there are endless possibilities for data use.

While there are exciting innovations to be achieved using our wealth of data, the invasion of privacy that comes along with it can be scary. The ensuing debate is both troubling and necessary. At PerimeterX, we collect a lot of user activity data, but no personally identifiable information (PII), since we can stop attacks without it.

Read More: AiThority Interview with Jeremy Fain, CEO, and Co-founder at Cognitiv

Tag the one person in the industry whose answers to these questions you would love to read:

Sandy Carielli, Principal Analyst at Forrester.

Thank you, Deepak! That was fun and hope to see you back on AiThority soon.

Deepak Patel is a Security Evangelist at PerimeterX.

Deepak Patel has over two decades of experience in leading product, sales engineering and marketing teams in the security and infrastructure space. He is passionate about helping customers solve complex challenges in application security. He holds an MBA from Santa Clara University and a Bachelor’s in Computer Engineering from the National Institute of Technology, Karnataka, India.

PerimeterX is the leading provider of application security solutions that keep your business safe in the digital world. Delivered as a service, the company’s Bot Defender, Code Defender and Page Defender solutions detect risks to your web applications and proactively manage them, freeing you to focus on growth and innovation. Bringing together an elite engineering team, security research to continually update its solutions with current intelligence, and best-in-class customer enablement and support, the world’s largest and most reputable websites and mobile applications count on PerimeterX to safeguard their consumers’ digital experience. PerimeterX is headquartered in San Mateo, California.
  1. Timothy Bernson says

    That is really interesting, You are an overly professional blogger. I’ve joined your feed and stay up for seeking more of your excellent post. Also, I’ve shared your site in my social networks!

  2. brujos chat gratis says

    I was suggested this blog by my cousin. I’m now not positive whether or not this put up is written through him as nobody else understand such particular approximately my problem. You are incredible! Thank you!

  3. alquiler de carros bogota says

    Your place is valueble for me. Thanks!…

  4. Hi, just required you to know I he added your site to my Google bookmarks due to your layout. But seriously, I believe your internet site has 1 in the freshest theme I??ve came across. It extremely helps make reading your blog significantly easier.

  5. Europa-Road says

    Today, I went to the beachfront with my kids. I found a sea shell and gave it to my 4 year old daughter and said “You can hear the ocean if you put this to your ear.” She placed the shell to her ear and screamed. There was a hermit crab inside and it pinched her ear. She never wants to go back! LoL I know this is entirely off topic but I had to tell someone!

  6. stornobrzinol says

    Good day! I know this is somewhat off topic but I was wondering if you knew where I could get a captcha plugin for my comment form? I’m using the same blog platform as yours and I’m having problems finding one? Thanks a lot!

Leave A Reply

Your email address will not be published.