Talking security with Anil Valluri, MD, India & SAARC, Palo Alto Networks

Anil Valluri, Managing Director and Vice President at Palo Alto Networks, delves into the pressing challenges of IT and OT convergence, and the significance of Zero Trust and automation in cybersecurity.

The cyberthreat landscape remains fraught with danger, as the frequency of cyber-attacks and threats escalates daily. 

Amidst these challenges, a steadfast player dedicated to safeguarding businesses from the clutches of malicious actors is Palo Alto Networks.  

The Santa Clara-based company has shown relentless commitment in its pursuit to fortify enterprise digital defenses. Evolving steadily over time, it has transcended its origins as a mere network security provider, blossoming into a comprehensive platform that encompasses a wide array of security capabilities. 

I recently had the opportunity to have an engaging conversation with Anil Valluri, Managing Director and Vice President, India & SAARC at Palo Alto Networks. Our discourse delved deep into the heart of the cyberthreat landscape, with a particular focus on the challenges posed by Information Technology (IT) and Operational Technology (OT) convergence for modern enterprises and Zero Trust. 

Cybercrime: The world’s 3rd largest economy  

When questioned about the impending threat landscape and the imminent concerns for businesses in the next year, Valluri emphasized that cybersecurity has taken center stage with the Boards of enterprises, regulatory authorities, governments – all of them having made cybersecurity their paramount priority. 

“This burgeoning concern is not unwarranted, given that cybercrime has now burgeoned into the world’s third-largest economy and is projected to reach a staggering $10 trillion by 2025.,” Valluri says. 

This explosion in cyber activity is intricately linked to the digital transformation wave, the proliferation of hybrid workforces, cloud adoption, the growth of OT, the Internet of Things (IoT), 5G technology, and beyond. All these advancements have significantly expanded the attack surface, thereby amplifying vulnerabilities. 

Valluri candidly acknowledged that the vastness of the threat landscape renders absolute protection and prevention a challenging endeavor.  

“The sheer magnitude of the digital expanse invariably means that some vulnerabilities will be missed, paving the way for potential breaches,” he says. 

This is particularly pertinent in the context of India, which has emerged as one of the most targeted nations globally. The country’s strategic importance in the APAC region has propelled it to the second position among the most targeted nation. The escalating focus of attacks on government infrastructure and financial institutions underscores the gravity of the situation. 

Evolving cybersecurity threats require modern defenses 

Addressing the evolution of cyber threats, Valluri expounded on the remarkable transformation from traditional attacks, such as denial of service (DoS), distributed denial of service (DDoS), phishing, and malware, to the next generation of threats.  

“In a world where operational technology (OT) devices (often the least protected) are increasingly targeted, security vulnerabilities loom large. The longevity of usage versus maintenance shelf life has left devices like OT vulnerable,” Valluri says. 

For instance, devices like ECG systems that have been in use for over a decade continue to operate, despite the expiration of support and security updates. This glaring lack of security preparedness for such devices has paved the way for increased vulnerability. The proliferation of ransomware to ransomware-as-a-service (RaaS) has further compounded the threat landscape, allowing anyone with motivation to execute a ransomware attack.  

“The mantra is simple: hackers only need to be right once, while defenders must be right every time,” Valluri says. 

Valluri states that as a seasoned practitioner and technology provider in the cybersecurity space, Palo Alto Networks grapples with a vast spectrum of problems on a global scale. Their repository of threat signatures and patterns is arguably one of the world’s largest. To counteract evolving threats, Palo Alto Networks strives to render existing attack methodologies useless.  

“The goal is to thwart all known threats, thereby forcing attackers to develop novel tactics that demand investment in terms of time, resources, and effort. This approach, driven by AI/ML capabilities, predictive models, behavioral analytics, and anomaly detection, strives to protect against the unknown while thwarting familiar threats,” Valluri says. 

The growing cyber threats of generative AI  

The advent of generative AI has breathed new life into cyberthreats, enabling threat actors to mimic known behaviors, thereby complicating defense strategies.  

Valluri acknowledged the increased capabilities of hackers who can leverage generative AI and deep AI/ML to mimic behaviors and voices, posing grave security concerns. While this technology is available in the public domain and offers benefits, it inadvertently exposes corporate data. He also highlighted the rise of “Me Too” sites, acting as fronts for these generative AI platforms. In response, Palo Alto Networks aims to empower customers to use generative AI judiciously, thereby preventing data leakage. 

Self-defending manufacturing 

The convergence of IT and OT carries inherent advantages in terms of enhanced product and service quality, operational reliability, and improved efficiency. However, this convergence introduces cybersecurity risks that demand immediate attention. 

Valluri underscored the need to stick to basics, particularly regarding OT devices that lack inherent security features.  

“Ensuring network segmentation, deploying containment strategies, and scrutinizing data stream patterns for anomalies are pivotal in curbing cyber threats in this sphere. Additionally, acknowledging the functional lifespan of OT devices and maintaining security patch updates can significantly reduce vulnerabilities,” Valluri says. 

Zero Trust: The secret to security 

Zero Trust, an approach that has garnered significant attention, has revolutionized cybersecurity. Valluri expounded on this philosophy, emphasizing that implicit trust is no longer granted. Instead, constant authentication and validation are demanded at every stage of interaction.  

“Zero Trust, while not a standalone product, represents a mindset that permeates the organizational ethos. Whether dealing with users, endpoints, or OT devices, the application of Zero Trust principles can ensure a safer digital environment,” Valluri says. 

The rising tide of cyber threats demands an equally robust countermeasure. Automation, powered by AI/ML, is emerging as the backbone of modern cybersecurity. Hackers, armed with advanced technology, orchestrate multifaceted attacks that necessitate an automated response. Automation in security operations centers (SOCs) is pivotal in countering these threats effectively, as it allows security analysts to focus on addressing unique or complex situations.  

Valluri envisions a future where autonomy prevails, with AI/ML models and automation driving defense strategies. 

Disclaimer: The views expressed in this article are those of the author and do not necessarily reflect the views of ET Edge Insights, its management, or its members

Scroll to Top