{"id":2040,"date":"2022-05-11T06:26:00","date_gmt":"2022-05-11T06:26:00","guid":{"rendered":"\/cybersecurity-blog\/?p=2040"},"modified":"2024-07-24T08:03:46","modified_gmt":"2024-07-24T08:03:46","slug":"expert-qa-lapshin","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/expert-qa-lapshin\/","title":{"rendered":"Expert Q&#038;A:Aleksey Lapshin, ANY.RUN"},"content":{"rendered":"\n<p>The interview series is going on. We continue to discuss cybersecurity topics with various experts from the industry. <\/p>\n\n\n\n<p>Today is a special post. We would like to share an interview that Aleksey Lapshin, CEO of ANY.RUN gave to <a href=\"https:\/\/www.privateinternetaccess.com\/blog\/interview-with-aleksey-lapshin-any-run\/\">Private Internet Access<\/a>. Aleksey is telling the company&#8217;s journey and his thoughts on cybersecurity. Thank you, PIA, for having us on your blog! <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"private-internet-access-what-motivated-you-to-start-your-company\">What motivated you to start your company?<\/h2>\n\n\n\n<p><strong>Aleksey Lapshin<\/strong>: I have seen many products out there, and quite often, they have only one goal: to achieve business purposes. Of course, it is natural but not convenient for engineers. Going after success, designers or developers stop caring for users. And just imagine a guy that works day after day, all these long hours with the software designed not for him but only for financial objectives. Employees fall into stress and suffer while working with tools that are complicated, useless, and stingy with design.<\/p>\n\n\n\n<p>Those feelings are very relatable to me, as I used to be one of those guys. In my opinion, this situation is a real issue, and I find it disappointing and sad. I believe a person can be more productive if they feel cared for. And keeping this in mind, I got an idea for the company. Finding a solution or relief to this pain has become the key value in our product\u2019s philosophy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"pia-what-do-you-love-about-working-in-cybersecurity\">What do you love about working in cybersecurity?<\/h2>\n\n\n\n<p><strong>AL<\/strong>: Cybersecurity is a very dynamic and ever-changing sphere. The constant defense and offense race certainly keeps you on your toes. You won\u2019t stay put like in a classical business. Today there is one way to research malware, and you build a feature for it, but tomorrow a need to analyze attacks differently appears, so you create something new. These ongoing challenges motivate us to develop further, stay focused and do more.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"pia-what-does-your-company-do\">What does your company do?<\/h2>\n\n\n\n<p><strong>AL<\/strong>: Our product,&nbsp;<a href=\"http:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=in-house&amp;utm_content=expert_qa_aleksey_lapshin\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ANY.RUN<\/a>&nbsp;is a service for the analysis of malicious content. At first sight, it seems to be a usual online sandbox, but we added <a href=\"https:\/\/any.run\/cybersecurity-blog\/interactive-malware-analysis\/\">interaction<\/a> with the virtual machine. Besides that, all data is showcased in real-time, and there is no need to wait for the end of the analysis process.<\/p>\n\n\n\n<p>You would think that the idea is very simple. However, it goes a lot deeper. We are very careful with information that a user gets and tend to be as transparent as possible. We try not to complicate the service to keep the product\u2019s entry bar low. On the one hand, we decrease the cost of employees for business: 90% of tasks can be completed even by junior specialists. They don\u2019t need a bunch of certificates to finish everyday tasks, a clear and simple tool is more than enough. On the other hand, we grow the community by making cybersecurity more accessible.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"pia-why-do-individuals-and-companies-need-a-good-vpn\">Why do individuals and companies need a good VPN?<\/h2>\n\n\n\n<p><strong>AL<\/strong>: In&nbsp;<a href=\"http:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=in-house&amp;utm_content=expert_qa_aleksey_lapshin\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ANY.RUN<\/a>, we utilize VPN to secure our perimeter. Besides that, VPN is used inside the service, and it allows launching virtual machines for analysis as if they were run in other geo-locations. Therefore, a malware analyst has an opportunity to research malicious software more properly and get much more information.<\/p>\n\n\n\n<p>It\u2019s worth mentioning that lately, \u201cresidential VPN\u201d services have become more popular. We use them to get close enough to the working station of the attacked side and monitor the real situation precisely.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"pia-what-are-the-worst-cyberthreats-out-there-today\">What are the worst cyber threats out there today?<\/h2>\n\n\n\n<p>AL: We can talk about different trends concerning modern cyber threats here in&nbsp;ANY.RUN, we deal with them daily. There is even a<a href=\"https:\/\/any.run\/malware-trends\/\"> Malware Trends Tracker<\/a> that we created to monitor threat activities in real-time. Ransomware, Trojans, Loaders, Miners \u2013 some types of malware disappear, and others become widespread.<\/p>\n\n\n\n<p>But I would like to pay attention to the real threat at all times \u2013 the lack of cybersecurity awareness in the most vulnerable part of a company, such as the accounting or HR departments. The absence of basic knowledge opens a door for any cyber threat, whether trendy or old-school. And only constant training can fix it. We know that it is much harder to compromise an experienced SOC specialist than an ill-informed accountant, and the numerous names of malicious files that we can see in spam confirm this fact. Here is just a small list: \u201cQuote request,\u201d \u201cRemittance Advice,\u201d \u201cSWIFT DETAILS,\u201d \u201cNew Order PO119225\u201d, \u201cInvoice.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"pia-how-is-the-pandemic-changing-the-way-your-company-deals-with-cybersecurity\">How is the pandemic changing the way your company deals with cybersecurity?<\/h2>\n\n\n\n<p><strong>AL<\/strong>: It\u2019s tough to estimate the pandemic impact now. For us, as a startup, every year is a new challenge. We were able to adapt last year as well as the year before. Some departments had to reduce the budget, and others increased it due to the remote work that turned out to be a new standard.<\/p>\n\n\n\n<p>I can note that companies have become more and more focused on the quality of service in this new reality. Startups step into the spotlight, taking it away from the big names in the industry. In general, the cybersecurity sphere tends to grow horizontally, and the pandemic even accelerated the process. And that is good news \u2013 new companies with attractive solutions are still welcome here.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The interview series is going on. We continue to discuss cybersecurity topics with various experts from the industry. Today is a special post. We would like to share an interview that Aleksey Lapshin, CEO of ANY.RUN gave to Private Internet Access. Aleksey is telling the company&#8217;s journey and his thoughts on cybersecurity. Thank you, PIA, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":8314,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,67],"tags":[10,66],"class_list":["post-2040","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lifehacks","category-interviews","tag-cybersecurity","tag-expert-interview"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Expert Q&amp;A:Aleksey Lapshin, ANY.RUN - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"Aleksey Lapshin, CEO of ANY.RUN is telling the company&#039;s journey and his thoughts on cybersecurity. Check out the interview in our blog.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/expert-qa-lapshin\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/expert-qa-lapshin\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/expert-qa-lapshin\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Expert Q&#038;A:Aleksey Lapshin, ANY.RUN\",\"datePublished\":\"2022-05-11T06:26:00+00:00\",\"dateModified\":\"2024-07-24T08:03:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/expert-qa-lapshin\/\"},\"wordCount\":880,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"cybersecurity\",\"expert interview\"],\"articleSection\":[\"Cybersecurity Lifehacks\",\"Interviews\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/expert-qa-lapshin\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/expert-qa-lapshin\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/expert-qa-lapshin\/\",\"name\":\"Expert Q&A:Aleksey Lapshin, ANY.RUN - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2022-05-11T06:26:00+00:00\",\"dateModified\":\"2024-07-24T08:03:46+00:00\",\"description\":\"Aleksey Lapshin, CEO of ANY.RUN is telling the company's journey and his thoughts on cybersecurity. Check out the interview in our blog.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/expert-qa-lapshin\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/expert-qa-lapshin\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/expert-qa-lapshin\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Lifehacks\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Expert Q&#038;A:Aleksey Lapshin, ANY.RUN\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Expert Q&A:Aleksey Lapshin, ANY.RUN - ANY.RUN&#039;s Cybersecurity Blog","description":"Aleksey Lapshin, CEO of ANY.RUN is telling the company's journey and his thoughts on cybersecurity. Check out the interview in our blog.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/expert-qa-lapshin\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/expert-qa-lapshin\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/expert-qa-lapshin\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Expert Q&#038;A:Aleksey Lapshin, ANY.RUN","datePublished":"2022-05-11T06:26:00+00:00","dateModified":"2024-07-24T08:03:46+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/expert-qa-lapshin\/"},"wordCount":880,"commentCount":1,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["cybersecurity","expert interview"],"articleSection":["Cybersecurity Lifehacks","Interviews"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/expert-qa-lapshin\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/expert-qa-lapshin\/","url":"https:\/\/any.run\/cybersecurity-blog\/expert-qa-lapshin\/","name":"Expert Q&A:Aleksey Lapshin, ANY.RUN - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2022-05-11T06:26:00+00:00","dateModified":"2024-07-24T08:03:46+00:00","description":"Aleksey Lapshin, CEO of ANY.RUN is telling the company's journey and his thoughts on cybersecurity. Check out the interview in our blog.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/expert-qa-lapshin\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/expert-qa-lapshin\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/expert-qa-lapshin\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Lifehacks","item":"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/"},{"@type":"ListItem","position":3,"name":"Expert Q&#038;A:Aleksey Lapshin, ANY.RUN"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/2040"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=2040"}],"version-history":[{"count":2,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/2040\/revisions"}],"predecessor-version":[{"id":8315,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/2040\/revisions\/8315"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/8314"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=2040"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=2040"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=2040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}