UPDATED 16:24 EDT / OCTOBER 03 2017

EMERGING TECH

Fixing security ‘insanity’: Start early at code level, says Cybric CTO

When Cybric Inc. launched its new security platform last November, it offered a continuous security-as-a-service platform with a different take on addressing system vulnerabilities in the enterprise. Cybric’s approach was to automate checks at the code development level to build security into any new product before it could be deployed. The idea was to change the direction by trying to eliminate any chance of security flaws before mass release and adoption.

“The definition of insanity is doing the same thing over and over. Instead of adding or bolting on security at the end of your development and delivery cycle, let’s bring it in and find defects early on from code commit to build to delivery,” said Mike Kail (pictured), co-founder and chief technology officer at Cybric.

Kail visited with John Furrier (@furrier), host of theCUBE, SiliconANGLE Media’s mobile livestreaming studio, at the SiliconANGLE studio in Palo Alto, California. They discussed the technology behind Cybric’s approach, risks when traveling to China and the current state of the security environment.

Compatible with developer tools

By offering technology geared for developers, Cybric is trying to give them as much flexibility as possible. Its product works with tools such as Bitbucket and GitHub and operates on a continuous scanning model in an effort to ensure that security is maintained throughout the development process.

“We architected this from the ground up to be somewhat unique and differentiated in a crowded security market,” Kail said. “You can’t just buy tools and expect all of them to solve all of your problems.”

One problem that remains unsolved is how to stay connected and protected when traveling abroad. This has been a particular issue in countries such as China, where websites are filtered by the government and communication is frequently monitored. Some industry security experts recommend leaving your laptop and smartphone at home.

“I would never let you leave and go to a country like that without a burner phone and burner laptop,” Kail said in conversation about travel to China. “Don’t log in to anything, don’t connect to anything. There’s so many ways to subvert you.”

New enterprise tools and platforms are entering the market every week. This also means that the attack surface is expanding, which makes Cybric’s technology more timely in the wake of numerous high-profile ransomware attacks and breaches.

“There’s all these ways in. Hackers only have to be right once. We on the defensive side have to be right all the time,” Kail concluded.

Watch the complete video interview below:

Photo: SiliconANGLE

Since you’re here …

… We’d like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.

If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.