Artificial Intelligence & Machine Learning , Events , Governance & Risk Management

Evolution of Security: Embracing Edge, AI and Collaboration

Fastly Technology Vice President Sean Leach Discusses Emerging Security Strategies
Sean Leach, vice president, technology, Fastly

To rethink security strategies, enterprises should tap into edge computing, adopt technologies such as generative AI and ensure "secure by default" practices, said Fastly Vice President Sean Leach. He discussed the evolving risk landscape and third-party providers' role in managing security.

See Also: The Dark Side of AI: Unmasking its Threats and Navigating the Shadows of Cybersecurity in the Digital Age

The risk landscape is evolving, and that means security practices need to be adaptable to ever-changing threats. One emerging tool that can help is artificial intelligence, Leach said.

"Although AI is far from magic, it can help in toil reduction," he said. "For a security operations center, AI can do a lot to help take the load off of their plate. For example, AI can process bug bounty reports and generate detection and blocking rules and make them templated."

In this video interview with Information Security Media Group at Infosecurity Europe, Leach also discussed:

  • Edge vs. traditional cloud security strategies;
  • The shifting risk landscape;
  • Collaboration between security and development teams.

Leach has over 20 years of experience in building and scaling large-scale security technology and products. Prior to Fastly, he led internet infrastructure services at UltraDNS, Neustar and Verisign.


About the Author

Anna Delaney

Anna Delaney

Director, Productions, ISMG

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.