www.infosecurity-magazine.com
Open in
urlscan Pro
143.204.98.113
Public Scan
URL:
https://www.infosecurity-magazine.com/news/cybersecurity-reacts-kaspersky/
Submission: On March 05 via api from US — Scanned from DE
Submission: On March 05 via api from US — Scanned from DE
Form analysis
2 forms found in the DOM<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id1">
<table cellspacing="0" cellpadding="0" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr>
<td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; background: url("https://www.google.com/cse/static/images/1x/en/branding.png") left center no-repeat rgb(255, 255, 255); outline: none;"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>search</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="clear results"> </div>
</td>
</tr>
</tbody>
</table>
</form>
<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id2">
<table cellspacing="0" cellpadding="0" id="gs_id51" class="gstl_51 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr>
<td id="gs_tti51" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" id="gsc-i-id2" dir="ltr" spellcheck="false"
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; background: url("https://www.google.com/cse/static/images/1x/en/branding.png") left center no-repeat rgb(255, 255, 255); outline: none;"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st51" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb51" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>search</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="clear results"> </div>
</td>
</tr>
</tbody>
</table>
</form>
Text Content
Infosecurity Group Websites * * Magazine * Events * Infosecurity Europe * Infosecurity Leadership Summit * Infosecurity Magazine Events * Infosecurity North America * Infosecurity Netherlands * Infosecurity Belgium * Infosecurity Russia * Infosecurity Mexico * Infosecurity Middle East * Insight * Infosecurity Webinars * Infosecurity Whitepapers * Infosecurity Online Summits * Log In * Sign Up * × search * News * Magazine Features * Opinions * News Features * Interviews * Editorial * Blogs * Reviews * Slackspace * Next-Gen Infosec * Webinars * White Papers * Podcasts * Industry Events & Training * Magazine Events * Online Summits * Company Directory * Application Security * Automation * Big Data * Business Continuity * Cloud Security * Compliance * Cybercrime * Data Protection * Digital Forensics * Encryption * Human Factor * Identity Access Management * Industry Announcements * Internet Security * Malware * Managed Services * Mobile Security * Network Security * Payment Security * Physical and Information Security Convergence * Privacy * Risk Management * The Internet of Things * Infosec Blog * Log In * Sign Up Latest * Senate Passes Strengthening American Cybersecurity Act * Cyber-Criminals Exploit Invasion of Ukraine * Vulnerabilities in Over 100k Medical Infusion Pumps * Ask The Experts: How to Stay on Top of Cyber-Hygiene * Nearly All Cybersecurity Companies Expose AWS Assets - Report * * News * Topics * Features * Webinars * White Papers * Podcasts * Events & Conferences * Directory * Search * × search Infosecurity Magazine Home » News » Eugene Kaspersky's Statement Provokes Controversy Within Cybersecurity Industry 1 Mar 2022 News EUGENE KASPERSKY'S STATEMENT PROVOKES CONTROVERSY WITHIN CYBERSECURITY INDUSTRY JAMES COKER REPORTER, INFOSECURITY MAGAZINE * Follow @ReporterCoker Cybersecurity industry veteran Eugene Kaspersky has provoked a strong reaction from leading figures in the sector following a statement he made on the ongoing Russian invasion of Ukraine. Kaspersky, CEO of the Russian-headquartered IT security vendor of the same name, broke his silence on the conflict earlier today, tweeting: “We welcome the start of negotiations to resolve the current situation in Ukraine and hope that they will lead to a cessation of hostilities and a compromise. We believe that peaceful dialogue is the only possible instrument for resolving conflicts. War isn’t good for anyone.” This is a reference to peace talks that took place between Ukrainian and Russian officials yesterday on the border with Belarus, and a fresh agreement for the sides to meet again in the coming days. Kaspersky followed up his statement with another tweet: “Like the rest of the world, we are in shock regarding the recent events. The main thing we can do in this situation is provide uninterrupted functioning of our products and services globally.” His description of the conflict as a “situation” and apparent attempt to advertise his firm led to a number of furious responses from leading members of the infosec community. Rik Ferguson, VP of security research at Trend Micro (@rik_ferguson) wrote: “Better to have stayed silent than to have called an invasion a “situation” that requires a “compromise" or to assert that it 'isn’t good for anyone'. Russians are not being murdered.” Brian Honan, CEO, BH Consulting, also spoke out about Kaspersky’s neutral choice of language and refusal to condemn the actions of the Kremlin. “Eugene there is no 'current situation' in Ukraine. It is an invasion leading to a war in which innocents being killed by Russian soldiers. Russia needs to stop its war and leave Ukraine to the Ukrainian people #StandWithUkraine️” he tweeted. A similar sentiment was expressed by Regina Bluman, security analyst at Algolia (@RegGBlinker): “This is not the statement you think this is. There’s no room for compromise in an invasion.” Eugene Kaspersky’s comments follow a statement issued by the company to Motherboard on Monday, which confirmed its neutral status. This read: “As a technology and cybersecurity service provider the company is not in a position to comment or speculate on geopolitical developments outside of its area of expertise.” Following Kaspersky’s tweet, the hashtag #BoycottKaspersky appeared on the social media site. Using the hashtag, one user wrote: “This is an awful statement by #Kaspersky that reduces an invasion of a sovereign nation to a "situation" and asks for "compromise" instead of full withdrawal by Russia Please ditch Kaspersky today.” The Russian invasion of Ukraine is now in its sixth day, with Russia so far unable to capture a city and reportedly suffering significant losses. The conflict has also involved a significant number of cyber operations. Related to This Story * Russian Claims YouTube "Misinformation" to Blame for Protests * Anonymous Hacking Group Declares “Cyber War” Against Russia * Russian Fake News Targeted Ukraine Elections * Russian Spies Target Ukraine Military * Cyber-Criminals Exploit Invasion of Ukraine WHAT’S HOT ON INFOSECURITY MAGAZINE? * Read * Shared * Watched * Editor's Choice 1 8 Jul 2021 News NEW PRINTNIGHTMARE PATCH CAN BE BYPASSED, SAY RESEARCHERS 2 8 Jul 2021 News CYBERCRIME COSTS ORGANIZATIONS NEARLY $1.79 MILLION PER MINUTE 3 8 Jul 2021 News CTOS KEEPING QUIET ON BREACHES TO AVOID CYBER BLAME GAME 4 7 Jul 2021 News OVER 170 SCAM CRYPTOMINING APPS CHARGE FOR NON-EXISTENT SERVICES 5 7 Jul 2021 News MOST INSIDER DATA BREACHES AREN'T MALICIOUS 6 7 Jul 2021 News KREMLIN HACKERS REPORTEDLY BREACHED REPUBLICAN NATIONAL COMMITTEE 1 4 Mar 2022 News SENATE PASSES STRENGTHENING AMERICAN CYBERSECURITY ACT 2 4 Mar 2022 News CYBER-CRIMINALS EXPLOIT INVASION OF UKRAINE 3 4 Mar 2022 News VULNERABILITIES IN OVER 100K MEDICAL INFUSION PUMPS 4 4 Mar 2022 Magazine Feature ASK THE EXPERTS: HOW TO STAY ON TOP OF CYBER-HYGIENE 5 4 Mar 2022 News NEARLY ALL CYBERSECURITY COMPANIES EXPOSE AWS ASSETS - REPORT 6 4 Mar 2022 News OVER 60% OF SOC ANALYSTS ARE PLANNING TO QUIT NEXT YEAR 1 8 Jul 2021 Webinar OVERCOMING 'SHADOW IT' NEED AND RISK 2 23 Sep 2021 Webinar HOW TO RETHINK END-USER PROTECTION AND ELIMINATE PHISHING AND RANSOMWARE 3 21 Oct 2021 Webinar MACHINE ID MANAGEMENT AND DIGITAL TRANSFORMATION: BUILDING A SECURE FUTURE 4 16 Sep 2021 Webinar NEW STRATEGIES FOR MANAGING MACHINE IDENTITIES 5 7 Oct 2021 Webinar THIRD-PARTY VULNERABILITIES: DEMYSTIFYING THE UNKNOWN 6 24 Jun 2021 Webinar DEFINING THE ZERO TRUST AND SASE RELATIONSHIP 1 14 Feb 2022 Digital Edition INFOSECURITY MAGAZINE, DIGITAL EDITION, Q1, 2022, VOLUME 19, ISSUE 1 2 24 Feb 2022 Webinar HACKERS ARE STRIKING GOLD WITH YOUR EMPLOYEES' PII 3 3 Feb 2022 Podcast INTOSECURITY CHATS, EPISODE 8: BRIAN HONAN, BROUGHT TO YOU BY HP 4 14 Feb 2022 News Feature AS NATION-STATE AND CYBERCRIME THREATS CONFLATE, SHOULD CISOS BE WORRIED? 5 14 Feb 2022 Editorial EDITORIAL: ONLY THE GOOD DIE YOUNG (Q1 2022 ISSUE) 6 17 Mar 2022, 14:00 EDT, 11:00 PDT Webinar THE JOURNEY BEYOND THE ENDPOINT * The Magazine * About Infosecurity * Subscription * Meet the Team * Contact Us * Cookie Settings * Advertisers * Media Pack * Contributors * Forward Features * Op-ed * Next-Gen Submission * Copyright © 2022 Reed Exhibitions Ltd. * Terms and Conditions * Privacy Policy * Intellectual property statement * Cookie Policy * Sitemap * Please wait…