She was born in 1966 in Moscow. Graduated from the Moscow Institute of Electronic Engineering (MIEM) with a degree in Applied Mathematics. In 1997 she founded Kaspersky Lab and became its CEO. For 10 years, under the leadership of Natalia, Kaspersky Lab has transformed from an unknown startup into a bright leader in the international IT market with a half-billion (in dollar equivalent) turnover. In 2007, Natalya Kasperskaya became the head of InfoWatch, which develops innovative solutions for protecting corporations from the most pressing internal and external threats.
Natalya Kasperskaya actively invests in the development of high-tech companies, is a member of the Grant Committee of the Skolkovo Foundation, a board member of the Association of Software Developers (ARPP) "Otechestvenny Soft", a member of the Expert Council on Russian software under the Ministry of Communications and Mass Media. Heads the subgroup "Internet + Society" under the Presidential Administration, created in pursuance of the list of instructions of the President of the Russian Federation dated January 29, 2016. Expert of the professional organization of security officers BISA. Natalya Kasperskaya is a laureate of the Women in Technology competition in the Middle East in the Best Technology Business Entrepreneur nomination and other international competitions. In 2016, she became the winner of the national stage of the Entrepreneur of the Year international competition and the winner in the High Technologies nomination computer engineer requirements.
In 2017, Natalya Kasperskaya was recognized by the expert community as the Person of the Year 2016 in the IT and telecom industry as part of the Best in Russia business award. In March 2017, she was included in the "30 Most Inspiring Business Leaders" rating by Insights Success magazine.
Ed. - Natalia, good afternoon. Today there are a large number of issues related to both the information security of individuals and the state. How protected is the domestic public sector from data leakage, if we consider the problem in an international context? And how to deal with the violation of the privacy rights of individuals?
N.K. -In a country where most information security tools do not belong to a domestic manufacturer, but are purchased abroad, it is rather problematic to talk about security issues. If from the point of view of software, we can at least theoretically provide ourselves, then from the point of view of "hardware" the situation is rather sad. And in different areas - from mobile devices, smartphones and ending with heavy servers. There are separate companies that are engaged in assembly. But this is assembly, not production. Since the key component is the availability of its own research and production base. In the Soviet Union, there was a powerful scientific and practical reserve for the production of microelectronics. Perhaps Soviet production lagged slightly behind Western counterparts - but it was its own. Now we are in serious dependence. The problem with this, firstly, is that someone else's "hardware" can contain unwanted elements or bookmarks, which entail negative consequences up to the simultaneous termination of foreign software in Russia. In fact, all modern equipment, as a rule, has built-in antennas and is somehow connected to the Internet. Today, the topic of the Internet of Things is very fashionable, which is increasingly being introduced into our lives. I often have a question: why does a kettle need the Internet? But this is a modern trend. However, this small improvement in functionality comes with very serious risks. The presence of a radio antenna in one or another component makes it possible to talk about the possibility of influencing it from the outside. that someone else's "hardware" may contain unwanted elements or bookmarks that entail negative consequences up to the simultaneous termination of the foreign software on the territory of Russia. In fact, all modern equipment, as a rule, has built-in antennas and is somehow connected to the Internet. Today, the topic of the Internet of Things is very fashionable, which is increasingly being introduced into our lives. I often have a question: why does a kettle need the Internet? But this is a modern trend. However, this small improvement in functionality comes with very serious risks. The presence of a radio antenna in one or another component makes it possible to talk about the possibility of influencing it from the outside. that someone else's "hardware" may contain unwanted elements or bookmarks that entail negative consequences up to the simultaneous termination of the foreign software on the territory of Russia. In fact, all modern equipment, as a rule, has built-in antennas and is somehow connected to the Internet. Today, the topic of the Internet of Things is very fashionable, which is increasingly being introduced into our lives. I often have a question: why does a kettle need the Internet? But this is a modern trend. However, this small improvement in functionality comes with very serious risks. The presence of a radio antenna in one or another component makes it possible to talk about the possibility of influencing it from the outside. all modern equipment, as a rule, has built-in antennas and is somehow connected to the Internet. Today, the topic of the Internet of Things is very fashionable, which is increasingly being introduced into our lives. I often have a question: why does a kettle need the Internet? But this is a modern trend. However, this small improvement in functionality comes with very serious risks. The presence of a radio antenna in one or another component makes it possible to talk about the possibility of influencing it from the outside. all modern equipment, as a rule, has built-in antennas and is somehow connected to the Internet. Today, the topic of the Internet of Things is very fashionable, which is increasingly being introduced into our lives. I often have a question: why does a kettle need the Internet? But this is a modern trend. However, this small improvement in functionality comes with very serious risks. The presence of a radio antenna in one or another component makes it possible to talk about the possibility of influencing it from the outside. However, this small improvement in functionality comes with very serious risks. The presence of a radio antenna in one or another component makes it possible to talk about the possibility of influencing it from the outside. However, this small improvement in functionality comes with very serious risks. The presence of a radio antenna in one or another component makes it possible to talk about the possibility of influencing it from the outside.
Ed: - Can we programmatically prevent the enemy from accessing our devices, install an antivirus that will prevent the sending of any information to the conditional iPhone?
N.K .: - The problem is that, as a rule, all antiviruses and similar products work at a higher level. Yes, there is hardware - this is a very low level, the level of software commands. There is an operating system level, and a higher level. Anything above the operating system are the applications that people usually work with. Hardware bookmarks are created at the hardware level. And if you work at a higher level, then no matter how hard you try, you cannot penetrate to a lower level.
No comments:
Post a Comment