AI Infrastructure

ArmorText’s CEO calls for a post-breach approach to cybersecurity

0

Despite growing awareness of post-breach preparedness, 70% of companies still lack robust out-of-band communication strategies. In this episode, Navroop Mitter, CEO of ArmorText, delves into the evolution of enterprise collaboration tools, the surge in insider threats, and how ArmorText’s secure, encrypted communication channels align with regulatory standards. The conversation explores the shift from pre-breach to post-breach strategies, the changing dynamics of cyberattacks, regulatory impacts, and the limitations of current cybersecurity tools. Mitter emphasizes, “We are seeing a shift in mindset, understanding that if breaches are inevitable, investing in effective post-breach preparedness is essential.”

ArmorText’s origins and vision for secure enterprise communication

  • Mitter shares the company’s origins and purpose. Mitter recounts working in a European telecom setting, where he foresaw the need for advanced enterprise collaboration tools like Teams and Slack.
  • Mitter explains the early limitations of enterprise communication platforms, emphasizing their outdated security frameworks, which left organizations vulnerable to insider threats.
  • ArmorText was created to deliver secure, encrypted communication channels that comply with strict regulatory and legal requirements, setting it apart from consumer-focused apps like Signal and WhatsApp.

The need for post-breach strategies for modern organizations

  • Mitter talks about the industry’s shift from a pre-breach to post-breach mindset and the best approaches for organizations. Mitter highlights that despite heavy spending on pre-breach measures, breaches are now seen as inevitable, with many organizations underprepared for post-breach scenarios.
  • Mitter points to a growing trend of tabletop exercises, which engage C-suite executives and boards, driven by regulations such as The Securities and Exchange Commission (SEC) guidelines and the Network and Information Security (NIS2) Directive in Europe.
  • Organizations should prioritize out-of-band communication solutions as part of their post-breach preparedness strategies.

Key preparations for handling post-breach scenarios

  • Many companies lack robust, tested out-of-band communication systems, and Mitter cites findings from tabletop exercises by Dragos.
  • Mitter emphasizes the value of secure communication lines for incident response, regulatory disclosures, and public relations, which can reduce financial and operational disruptions.
  • Mitter suggests investing in communication systems that are resilient against credential attacks and not tied to identity provider platforms to avoid compromise during incidents.

Shifts in cyber attack sophistication and threat evolution

  • Mitter discusses the evolution of cyber attacks and how they are becoming both more sophisticated and more accessible, with attackers building mature ecosystems and offering specialized services.
  • Mitter mentions the rise of ransomware and credential attack services, where attackers recruit and retain talent, mirroring the incentives seen in corporate roles.
  • This shift underscores the need for companies to strengthen both defense mechanisms and response strategies to keep pace with these increasingly organized threats.

Regulatory Influence on Cybersecurity Measures and Strategy

  • Mitter discusses the growing impact of regulations on cybersecurity, particularly in the U.S. and EU. Mitter explains that new regulations are driving cybersecurity and incident response discussions at the executive level, demanding robust organizational oversight.
  • Mitter highlights the positive effects of frameworks like Network and Information Security (NIS2) and Digital Operational Resilience Act (DORA), which emphasize resilience without mandating specific technologies, pushing organizations toward operational readiness.
  • The conversation also touches on the role of end-to-end encryption in regulatory compliance and encourages companies to adapt their security investments in line with emerging standards.

Navigating Zero Trust and IDP Challenges in Incident Response

  • Mitter discusses the balance between zero trust architecture and identity provider (IDP) systems in incident response. Mitter explains that zero trust enhances daily operations but can pose risks during breaches, where attackers may weaponize IDP access.
  • Mitter describes how attackers can leverage IDP vulnerabilities to disrupt communication or track organizations across platforms, underscoring the need for alternative, resilient communication channels.
  • Mitter stresses the importance of systems that function independently of IDP, ensuring continuity in communications during critical incidents.

Evaluating Generative AI’s Role and Risks in Cybersecurity

  • While generative AI has generated excitement, it often adds to cybersecurity analysts’ workloads, with potential hallucinations increasing complexity.
  • Mitter believes that generative AI could be valuable in finance and insurance, where it helps assess information and risk, but warns it could be weaponized by attackers.
  • The conversation underscores the importance of cautious generative AI implementation in cybersecurity, as it may introduce new vulnerabilities rather than purely enhancing defense.

Tackling Seasonal Cybersecurity Challenges and Strategic Adjustments

  • Mitter examines the cybersecurity implications of seasonal business cycles, such as holiday retail peaks, explaining how high-demand periods, like Black Friday, necessitate precise planning, particularly in post-holiday return logistics and systems.
  • Mitter highlights the need for cybersecurity measures that account for these fluctuations, adapting to various seasonal risks and attack patterns.
  • Mitter believes that adversaries often exploit businesses during peak times, emphasizing the importance of round-the-clock cybersecurity readiness.

Guest: Navroop Mitter (LinkedIn)
Company: ArmorText (Twitter)
Show: Let’s Talk


📹 Going on record for 2026? We're recording the TFiR Prediction Series through mid-February. If you have a bold take on where AI Infrastructure, Cloud Native, or Enterprise IT is heading—we want to hear it. [Reserve your slot

This summary was written by Emily Nicholls

Opsera partners with Databricks to streamline DevOps processes by automating data orchestration

Previous article

Increasing adoption of open source in the EV charging market

Next article