Security Experts:

Avi Chesla's picture

Avi Chesla

Avi Chesla is CEO and Founder of empow, a cyber security company that envisions a future where security experts have the freedom, and the technology, to create unique solutions to meet their organizations' security needs. Prior to empow, Avi was CTO and VP of Security Products at Radware, where he was responsible for defining and leading the company’s strategic technology roadmap and vision including the foundation and management of Radware’s Security Division, a provider of cyber attack mitigation solutions. Mr. Chesla has authored a number of articles for major publications on advanced network behavioral analysis, expert systems and information security and has earned numerous patents in these areas. His views on industry trends and best practices have been featured in articles, white papers, and on the conference speaking circuit.

Recent articles by Avi Chesla

  • In order to reap the greatest benefit from virtualization, SDN and NFV concepts, the control and data-plane functions of network security devices should be decoupled.
  • Focusing more on availability-based attacks, the security friction surfaces are now wider than ever, and much more dynamic for enterprises, cloud service providers and carrier organizations.
  • What’s missing today is a well-defined set of selection criteria for attack mitigation solutions, mainly for the online business market. Four types of attack mitigation solutions exist in today’s market. In regard to quality of attack mitigation, each one has its own characteristics.
  • While Long Term Evolution (LTE) networks bring the promise of relieving traffic jams for mobile operators, they also entail new security risks.
  • Network virtualization, under the umbrella of Software Defined Networking (SDN), presents an opportunity for network innovation but at the same time introduces a new weakness which will more than likely be targeted once solutions become more commercially available.
  • The following predictions may help change these static roles, and allow you to look ahead at the upcoming threat trends to proactively plan your defense strategy.
  • With an increased level of encrypted traffic on enterprise networks, attackers are taking advantage of this blind spot within the organization’s security model in order to launch attacks over HTTPS more than ever before.
  • The characteristics of cyber attack campaigns have fundamentally changed, but tactics to mitigate them as well as best practices employed by IT security organizations has not.
  • One of the most challenging expectations is that information security systems be able to not only detect attacks, but also prevent or mitigate them in real-time. This demand forces systems to be more independent from the human factor.
  • Software Defined Secured Networking (SDSN) allows not only for the acceleration of networking innovation, but will also dramatically change the way we think about security.
  • The first thing that comes in mind when hearing about another lethal denial-of-service attack is the massive traffic that the attackers sent in order to take down a service, or to flood the network. But attack trends reveal an emerging threat of DoS attacks by low and slow attack tools.
  • To be effective in a counter attack, defenders ideally would like to get as close as possible to each attacker and neutralize his ability to generate the attack traffic. So what techniques should the counterattack contain?
  • Any competent military commander knows that when put in a defensive position, defense forces are never be able to withstand long and sustained offensive attacks. In the realm of cyber attacks, the concept of a counterattack operation must also play a major role in the defense strategy against emerging cyber threats.