Connect with us

Interviews

“Gain Practical Experience and Learn the Fundamentals”

Published

on

Subhalakshmi Ganapathy, the Product Evangelist for IT Security at ManageEngine, says there is no substitute for hard work and talent, and the results definitely prove it  

Can you share a little bit about what it is that you do and what a typical day for you is like?
I joined ManageEngine, the enterprise IT management division of Zoho Corporation, in 2013. Being a computer science engineer, I was intrigued by the technicalities of this domain. Having initially focused on log management, I extended my interest and delved deep into the SIEM and CASB fields of cybersecurity. Today, I manage the research and product marketing team for ManageEngine’s SIEM solution.

What obstacles did you have to overcome?
In the early days of my career, when I used to represent the company at trade shows or industry events, I sensed that those who came to our booth or attended a presentation either took me lightly or had some reservations regarding my technical knowledge. At the very least, they were surprised to hear me talk about cybersecurity. Now, we see a lot of women in cybersecurity, specifically in leadership roles. There is no substitute for hard work and talent, and the results definitely prove it.

What advice would you give to women considering a career in the industry you represent?
I believe that cybersecurity is a field that challenges you constantly. It is rapidly evolving and requires continuous learning and adaptation to stay ahead of new threats, techniques, and technologies. My advice for aspirants would be to gain practical experience and learn the fundamentals thoroughly while in their initial job and keep up with the latest industry developments through networking and professional development opportunities. It’s also important to have a passion for the field as well as strong analytical and problem-solving skills.

Why do you love your job? 
I love the dynamic nature of the job and the limitless learning opportunities it provides. I get to learn something new every day. I’ve received my bachelor’s in computer science engineering and it fascinates me to read about the intricacies of different attack techniques and how adversaries manipulate and exploit vulnerabilities. The best part is, I get to translate this knowledge into a workable security strategy that guides enterprises to step up their defenses and build a proactive and secure environment.

Cyber Security

Beyond Blocklists: How Behavioural Intent Analysis Can Safeguard Middle East Businesses from Rising AI-Driven Bot Threats

Published

on

The Middle East is facing an unprecedented surge in AI-driven bot attacks, with malicious automation now outpacing traditional defenses. Mohammad Ismail, Vice President for EMEA at Cequence Security, warns that legacy tools like IP blocklists and rate limiting are no match for today’s sophisticated threats (more…)

Continue Reading

GISEC

ManageEngine @ GISEC Global 2025: AI, Quantum Computing, and Ransomware Form Part of Cybersecurity Outlook for 2025

Published

on

As AI-powered attacks and quantum computing reshape the cyber threat landscape, organizations must rethink traditional defense strategies. In an exclusive interview, Sujoy Banerjee, Associate Director at ManageEngine, reveals how businesses can prepare for 2025’s most critical threats—from AI-generated phishing scams to quantum-decrypted ransomware (more…)

Continue Reading

GISEC

Positive Technologies @ GISEC Global 2025: Demonstrating Cutting-Edge Cyber Threats and AI Defense Strategies

Published

on

At GISEC Global 2025, Positive Technologies showcased live demonstrations of sophisticated hacking techniques while emphasising the growing role of AI in both cyber attacks and defense. In an exclusive interview with Security Review, Ilya Leonov, the Regional Director at Positive Technologies revealed insights about the Middle East’s evolving threat landscape, their work with regional governments, and why investing in human expertise remains critical despite advancing technologies (more…)

Continue Reading
Advertisement

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.