Monday, 12 May 2025
  • My Feed
  • My Interests
  • My Saves
  • History
  • Blog
Subscribe
Capernaum
  • Finance
    • Cryptocurrency
    • Stock Market
    • Real Estate
  • Lifestyle
    • Travel
    • Fashion
    • Cook
  • Technology
    • AI
    • Data Science
    • Machine Learning
  • Health
    HealthShow More
    Skincare as You Age Infographic
    Skincare as You Age Infographic

    When I dove into the scientific research for my book How Not…

    By capernaum
    Treating Fatty Liver Disease with Diet 
    Treating Fatty Liver Disease with Diet 

    What are the three sources of liver fat in fatty liver disease,…

    By capernaum
    Bird Flu: Emergence, Dangers, and Preventive Measures

    In the United States in January 2025 alone, approximately 20 million commercially-raised…

    By capernaum
    Inhospitable Hospital Food 
    Inhospitable Hospital Food 

    What do hospitals have to say for themselves about serving meals that…

    By capernaum
    Gaming the System: Cardiologists, Heart Stents, and Upcoding 
    Gaming the System: Cardiologists, Heart Stents, and Upcoding 

    Cardiologists can criminally game the system by telling patients they have much…

    By capernaum
  • Sport
  • 🔥
  • Cryptocurrency
  • Data Science
  • Travel
  • Real Estate
  • AI
  • Technology
  • Machine Learning
  • Stock Market
  • Finance
  • Fashion
Font ResizerAa
CapernaumCapernaum
  • My Saves
  • My Interests
  • My Feed
  • History
  • Travel
  • Health
  • Technology
Search
  • Pages
    • Home
    • Blog Index
    • Contact Us
    • Search Page
    • 404 Page
  • Personalized
    • My Feed
    • My Saves
    • My Interests
    • History
  • Categories
    • Technology
    • Travel
    • Health
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Home » Blog » Why the significance of cybersecurity will grow even more: Leading information security engineer Anton Snitavets explains the reasons and consequences
Data Science

Why the significance of cybersecurity will grow even more: Leading information security engineer Anton Snitavets explains the reasons and consequences

capernaum
Last updated: 2025-01-24 14:28
capernaum
Share
Why the significance of cybersecurity will grow even more: Leading information security engineer Anton Snitavets explains the reasons and consequences
SHARE

Why the significance of cybersecurity will grow even more: Leading information security engineer Anton Snitavets explains the reasons and consequences

Contents
The shift towards an integrated approachDeveloping tailored solutionsThe necessity of continuous learning

In December 2024, the Cyber Resilience Act (CRA) entered into force in Europe, marking the beginning of the transition period for organizations and businesses to adapt to the new cybersecurity requirements. This regulatory document aims to enhance quality and security standards by requiring manufacturers and retailers to support and update digital components throughout the lifecycle of their products. The CRA covers both hardware and software, affecting not only EU manufacturers but importers, so the US companies that operate or sell their products in EU countries will be affected, too. The legislation will profoundly impact several market segments, such as Internet of Things products. While companies have until 2027, when compliance obligations become mandatory, the CRA marks an important step in recognizing the importance of cybersecurity for a great range of products and creating structures that will protect the interests of the end customers. Anton Snitavets, a Lead Information Security Engineer at Doumo, a Senior member of IEEE, a fellow member of the Hackathon Raptors community, and a Certified Information Security Systems Professional, explains what the modern approach to cybersecurity entails and what factors businesses should take into account to protect their customers and themselves.

The shift towards an integrated approach

Anton Snitavets points out that cybersecurity has become an integral part of their operations for more businesses, not just some protective measures or security rules imposed on existing processes. This is particularly true for companies that specialize in software development. Anton encountered a similar issue in 2017 when he started working at Aras Corp as a DevSecOps Engineer. To improve the software development process, he implemented the Secure Software Development Lifecycle (SSDLC), which made the software development process significantly more secure by adding new means of detecting and eliminating cybersecurity risks before they lead to negative consequences. He integrated the existing software solutions along with the custom ones he developed himself, making the software development process more productive and reliable. Specifically, he improved the process of developing updates for the Aras Innovator Software, an engineering product management solution used by Aras customers, with major engineering companies such as General Motors and Airbus among them.  As a result, within 3.5 years, he significantly increased product quality, eliminated multiple vulnerabilities in the software, and increased its stability and security, which is especially important for a software solution used for complex engineering tasks. After joining Doumo recently, he is implementing similar approaches as a Lead Information Security Engineer, working on integrating the SSDLC with cloud infrastructure.

“The fact that more companies, similar to the two mentioned above, focus significant effort on making the development processes more secure highlights that for security measures to be efficient, they need to become an integral part of the software development cycle,” he comments. “The companies that have not already implemented this approach will need to learn to apply it throughout the development lifecycle.”

Developing tailored solutions

This shift towards a more integral approach to information security leads to another significant change. Businesses must develop tailored solutions that answer their needs precisely instead of relying on readily created ones. “Ready-made solutions do not often cover all cases and scenarios, leaving out specific vulnerabilities unprotected or, conversely, wasting company resources on measures that aren’t necessary in a particular case,” explains Anton Snitavets. “This is why companies need solutions that account for the specifics of their operations and related common risks.” His experience provides enough examples of why developing tailored solutions and accounting for specific situations and threats is essential, as it improves the development process and makes the product more secure for the end user. At Aras Corp, he developed and implemented a solution for code analysis that allowed developers to detect vulnerabilities such as SQL injections and path traversal risks in the product code, as well as vulnerabilities specific to a particular product. After the analyzer was implemented, several dozen vulnerabilities were detected and fixed. In addition, implementing the analyzer made the product safer and secure for end users to develop custom solutions, enabling them to detect and resolve potential risks in the early stages of development.

Anton Snitavets mentions one more critical concept companies will have to adopt: they will have to focus on preventing threats and acting proactively instead of focusing solely on protecting themselves from known threats and responding to breaches that have already happened. To achieve this goal, a flexible system of analysis and reporting is required, which will allow the company to monitor the current state of the infrastructure, predict and detect potential risks, and eliminate them before they cause any losses. This is the type of work Anton Snitavets conducted at Jabil Inc., where he worked as a Cloud Security Engineer from 2022. To improve the security compliance posture in the company, he developed an original reporting framework to promptly get informed about the security state of the cloud resources. To do so, he adapted existing security standards. He integrated a software solution to aggregate data about the state of the cloud information that had a crucial role in company operations, helping to keep its security compliance rating at the highest possible level.

The necessity of continuous learning

It is important to add that technology is constantly moving forward, and along with new protective measures, new threats emerge. “While cybersecurity professionals develop new, more robust, and resilient ways to protect data and ensure the stable operations of the digital infrastructure, malicious actors find new attack vectors, trying to use emerging technology to their advantage,” explains Anton Snitavets. This is why it is necessary for a cybersecurity professional to learn continuously, both in theory and practice, exploring new methods and solutions and finding efficient ways to apply them to the tasks at hand.

Throughout his career, Anton Snitavets has followed this principle. Even while studying, he started working as a software developer, gaining experience that provided a solid foundation for his future career. He then worked continuously on acquiring professional certifications, including the Certified Information Systems Security Professional (CISSP), which is considered one of the most challenging cybersecurity certifications to obtain.

“It is important to combine acquiring formal certifications, which prove the professional skills of the individual, with a constant exploration of emerging technologies and putting newly acquired knowledge into practice,” explains Anton Snitavets. “Becoming a cybersecurity expert requires high dedication and discipline because the cost of mistakes can be significant.

One must constantly move forward and act proactively to implement efficient information security processes. New regulatory measures like CRA will push companies to adopt better security practices. However, even before becoming mandatory, companies must advance their approach to cyber security to protect themselves and their clients against emerging threats. “

Share This Article
Twitter Email Copy Link Print
Previous Article Vitalik Outlines Ethereum’s 2025 Strategy: Optimizing L2 and Data Blocks Vitalik Outlines Ethereum’s 2025 Strategy: Optimizing L2 and Data Blocks
Next Article Driving AI forward: An interview with Nataliya Polyakovska Driving AI forward: An interview with Nataliya Polyakovska
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Using RSS feeds, we aggregate news from trusted sources to ensure real-time updates on the latest events and trends. Stay ahead with timely, curated information designed to keep you informed and engaged.
TwitterFollow
TelegramFollow
LinkedInFollow
- Advertisement -
Ad imageAd image

You Might Also Like

Leaked: Is $566 far too much for AMD RX 9060 XT 8GB
Data Science

Leaked: Is $566 far too much for AMD RX 9060 XT 8GB

By capernaum
Could Nintendo actually brick your Switch for rule-breaking now?
Data Science

Could Nintendo actually brick your Switch for rule-breaking now?

By capernaum
Your next iPhone might be more expensive this fall
Data Science

Your next iPhone might be more expensive this fall

By capernaum

Seq2Seq models

By capernaum
Capernaum
Facebook Twitter Youtube Rss Medium

Capernaum :  Your instant connection to breaking news & stories . Stay informed with real-time coverage across  AI ,Data Science , Finance, Fashion , Travel, Health. Your trusted source for 24/7 insights and updates.

© Capernaum 2024. All Rights Reserved.

CapernaumCapernaum
Welcome Back!

Sign in to your account

Lost your password?