By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: “Cybersecurity must take place in real time in the future”
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > “Cybersecurity must take place in real time in the future”
News

“Cybersecurity must take place in real time in the future”

News Room
Last updated: 2026/04/22 at 11:04 PM
News Room Published 22 April 2026
Share
“Cybersecurity must take place in real time in the future”
SHARE

However, how quickly a platform is introduced depends on the customer themselves, their company, their use cases, their existing contracts and so on. We also strive to reduce costs to encourage customers to migrate and simplify their platformization process. In addition, we must not lose sight of the fact that a cybersecurity approach must be comprehensive – after all, we are talking about a global chain.

When it comes to the cost structure of the solutions, Palo Alto has a reputation for offering powerful but expensive technology. What do you say to that?

Reisinger: Compared to the level of protection we offer our customers, our technology is not that expensive. On the other hand, the costs also reflect all the innovations that are in our solutions.

How do you assess your main competitors – especially Fortinet and CrowdStrike?

Reisinger: The cybersecurity market is fragmented, but we are the market leader. Nevertheless, we have to convince people anew every day.

The current, extremely turbulent geopolitical climate is having a significant impact on security and customers’ IT purchasing decisions. Does this also have an impact on your company, which is a US player operating in Europe? Or to be more specific: Are you observing a trend towards local options among public sector customers?

Reisinger: CISOs with a lot of responsibility know that a wealth of telemetry data is essential for effective protection. That’s why we’re not seeing any decline in demand. In addition, each region and country has its own legal framework and regulations, which we fully respect. In fact, we were one of the first companies in the world to sign the European AI Act. We have also secured the relevant national certifications.

Our view of sovereignty is that we need to find a balance between ‘perfect’ and ‘zero’. When we talk about sovereignty, we can refer to hardware, for example. On this issue, we must accept the interdependence that exists between different global markets – for example in the area of ​​chips. On the other hand, when we talk about data sovereignty, it is something that can be easily achieved.

We implement the Bring Your Own Key policy for many customers to ensure that telemetry data sent from their devices is encrypted and protected. We are not interested in accessing personal data that our customers work with. We only use telemetry, application identity, user and device data. This is precisely why we were able, for example, to detect the attempted compromise via SolarWinds, even though it was carried out with the help of machine learning tools.

Speaking of the threat situation: In your opinion, how does the current war in Iran affect this?

Reisinger: Our Unit42 team recently published a report outlining how the military offensive launched by the United States and Israel has activated the Iran-aligned cyber ecosystem. This created a scenario of digital confrontation that has an impact far beyond the region and combines hacktivism, political campaigns and pressure on critical infrastructure.

In this context, the issue of sovereignty is relevant again. Or the question of what companies can do if their infrastructure is bombed, for example. The question is what the concept of sovereignty means in an emergency situation. Some of our customers in the Middle East are already rethinking their sovereignty strategy due to this situation. Ultimately, it becomes clear that the concept of sovereignty is fluid.

“We must prevent AI from suffering the same fate as other technologies”

Looking to the future, we face significant challenges in the area of ​​IT security as the post-quantum era approaches. How do you see this – and what are you doing in this area?

Reisinger: We are already in the preparation stages. For example, we launched Quantum Safe Security to help companies prepare for the post-quantum era. Because the big question that scientists and experts are currently asking is when ‘Q-Day’ will occur. The estimates are roughly between 2029 and 2035. In addition, the integration of CyberArk’s technology into our platform will help ensure that the credentials used by machines cannot be decrypted or compromised by quantum computers. In the future, cybersecurity must be real-time, highly automated and simple for customers – or, as we call it, modular platformization.

What do you think is currently the biggest challenge for IT security decision-makers and CISOs?

Reisinger: Definitely shadow AI. We must prevent AI from suffering the same fate as other technologies in the past – keyword shadow IT. AI implementations must go hand in hand with robust cybersecurity. The same applies to AI and identity management.

Another problem is the fragmentation of solutions: I recently spoke to an executive from a large European bank. During the conversation it emerged that the institute uses 60 different solutions. The gaps between these systems are an invitation for attacks. (fm)

This article is im Original published by our Spanish sister publication Computerworld.es.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article New tax in Austria: 2 euros per package from online retail New tax in Austria: 2 euros per package from online retail
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

New tax in Austria: 2 euros per package from online retail
New tax in Austria: 2 euros per package from online retail
Software
Amazon buys startup Fauna Robotics – and with it this humanoid robot
Amazon buys startup Fauna Robotics – and with it this humanoid robot
Gadget
at -45%, this high-end smartphone is sold by pallets
at -45%, this high-end smartphone is sold by pallets
Mobile
In Spain we have glorified the long nap. In scientific studies they have a different opinion on the matter.
In Spain we have glorified the long nap. In scientific studies they have a different opinion on the matter.
Gaming

You Might also Like

Test and compare AI models with LinkedIn
News

Test and compare AI models with LinkedIn

1 Min Read
Meta spies on employees in the name of AI
News

Meta spies on employees in the name of AI

2 Min Read
Smishing: How phishing via SMS works
News

Smishing: How phishing via SMS works

8 Min Read
What to expect from Apple’s new CEO
News

What to expect from Apple’s new CEO

2 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?