Source: www.lastwatchdog.com – Author: bacohido
By Byron V. Acohido
In today’s threat landscape, attackers are no longer just exploiting technical flaws — they’re exploiting business logic.
Think gaps in workflows, permissions, and overlooked assumptions in how applications behave. This subtle shift is creating powerful new footholds for cybercriminals and evading traditional defenses.
A10 Networks’ Field CISO Jamison Utter calls this the new front in cybersecurity: stopping attackers who use your own processes against you.
I sat down with Utter to unpack how forward-looking companies are moving beyond static perimeter defenses to more adaptive, behavioral systems. A10’s strategy centers on deploying AI-enhanced observability and automation to detect—and respond to—subtle indicators of attack. This includes analyzing normal vs. anomalous behavior in encrypted web traffic, API interactions, and even traffic flow between legacy systems.
As Utter puts it, the goal is to “catch the attack at reconnaissance”—before damage is done. Our discussion also explored A10’s evolving threat detection philosophy, embodied in its Mind of a Hacker initiative. Rather than emphasizing tools and signatures, this approach centers on adversarial thinking—understanding how modern attackers navigate your environment, and baking that awareness into every control point.
This approach is especially critical as legacy infrastructure meets modern app delivery. Utter outlines how sharing telemetry across traditionally siloed systems—load balancers, firewalls, DDoS protection—creates a powerful collective intelligence, capable of flagging suspicious behavior in real time.
It’s a shift from static to dynamic, from reactive to anticipatory. And it’s precisely what today’s threat actors fear most: being understood. For a full drill down, please give the accompanying podcast a listen.
Acohido
Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.
(LW provides consulting services to the vendors we cover.)
August 6th, 2025 | Black Hat | Black Hat Podcasts | Fireside Chat | Podcasts | Top Stories | Uncategorized
Original Post URL: https://www.lastwatchdog.com/black-hat-fireside-chat-inside-the-mind-of-a-hacker-a10s-plan-for-unified-threat-detection/
Category & Tags: Black Hat,Black Hat Podcasts,Fireside Chat,Podcasts,Top Stories,Uncategorized – Black Hat,Black Hat Podcasts,Fireside Chat,Podcasts,Top Stories,Uncategorized
Views: 3