
From Niche to Necessity: How to lead the Charge in Security in the Digital Age
Opinions expressed by Entrepreneur contributors are their own.
You're reading Entrepreneur India, an international franchise of Entrepreneur Media.
Cybersecurity grew from a niche IT concern to a cornerstone of corporate strategy worldwide. As digital threats have grown more sophisticated, so has the need for advanced security measures, pushing companies to implement robust frameworks to protect their data and devices.
Broadcom, a leader in cybersecurity solutions, responds to this industry challenge by turning to Rajesh Devadasan's expertise as its Head of Program Management for Symantec Information and Network Security Division.
Devadasan uses his 20 years of experience in program portfolio management, project implementation, and team leadership to manage Broadcom's Network and Information security portfolio. His programs are a critical element in the company's offering for businesses battling against various cyber threats.
Expertise in Swift Transformation
Before diving into cybersecurity strategies, Rajesh Devadasan ensures that businesses are primed for digital transformation, understanding the need for preparation before transitioning to advanced security systems.
Fundamental to his role at Broadcom is guiding organizations through critical preparatory stages. These include refining executive decision-making processes and merging disparate program management groups.
For Devadasan, this foundational work is crucial as it sets the stage for a seamless integration of sophisticated cybersecurity measures. He ensures that the groundwork is laid by aligning leadership's strategic vision with the operational capabilities of diverse teams. This is essential for successfully adopting new technologies.
Furthermore, Devadasan adopts agile methodologies to facilitate system transitions. He helps organizations become more adaptive and responsive to the rapid changes typical in digital and cybersecurity landscapes. This approach accelerates the transformation process and enhances the effectiveness of new systems once they are implemented.
With these preparations, Devadasan ensures that the migration to advanced cybersecurity frameworks is smooth and optimal. Teams and executive processes are streamlined, positioning businesses better to protect their critical assets against emerging digital threats.
Implementing Cutting-Edge Strategies
In overseeing program management for Broadcom Network and Information Security portfolio, Devadasan transitions from guiding organizations through preparatory stages to leveraging his expertise in implementing security systems.
A critical part of his work involves creating a portfolio model that facilitates effective management of security solutions without relying on costly software or subscriptions.
According to Devadasan, this model optimizes resource allocation and enhances Symantec's agility in responding to emerging cybersecurity challenges. His strategic oversight ensures that Symantec's security solutions are both cutting-edge and cost-effective. It subsequently enables a broad spectrum of organizations to fortify their defenses without prohibitive expenses.
Within this framework, Devadasan has been instrumental in integrating the Secure Access Service Edge (SASE) through Symantec Web Protection. SASE is particularly vital for organizations increasingly relying on cloud services. Devadasan explains that SASE converges network and security functions with cloud-native capabilities, allowing companies to scale securely and efficiently as their workforce and data transition to the cloud.
He also explores implementing Zero Trust, ensuring comprehensive security across all dimensions—endpoint, network, information, and identity—whether on-premises or in the cloud.
This holistic approach secures the workforce, data, and workloads and maintains needed visibility and control. That is crucial for organizations implementing a robust yet accessible Zero Trust framework.
"The essence of our strategy lies in not just defending the perimeter but ensuring that every access point and data transaction is secured," Devadasan explains. "This means adopting a mindset where trust is never assumed, and verification is an ongoing process."
The Challenges of Modern Cybersecurity
Navigating the complexities of modern cybersecurity might appear straightforward, yet, as Devadasan points out, the reality is far from simple. He emphasizes the challenges brought about by the shift towards remote work, which has significantly broadened the security perimeter that organizations must defend.
"The transition towards remote work has changed the game of cybersecurity. Traditional security models are no longer sufficient in this distributed environment," he adds.
As cybersecurity technologies and threats evolve, so must the expertise of those who manage them. Devadasan highlights the need for continual learning and adaptability in his field and role at Broadcom.
The cybersecurity expert points out that the true measure of success in his role is not just routine operations. It is also in how effectively these systems perform during cyberattacks while preventing substantial loss and delays.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Forbes
4 hours ago
- Forbes
FBI Warning—Do Not Reply To These Texts On Your Smartphone
American smartphones are under attack from malicious text messages. This industrial scale campaign is driven by organized criminal gangs in China, well beyond the reach of U.S. law enforcement. If you do succumb to an unpaid toll, DMV or Amazon refund text, your phone, your data and even your identity could be at risk. But there's a different wave of text attacks now targeting phones, and it's harder to detect. These messages do not pretend to come from a DMV or bank or retailer, but from someone you know. There's no link to click. The attacker just wants you to reply. The FBI's warning is clear. 'Verify the identity of the person calling you or sending text or voice messages" before you reply.' If the text shows up on your phone with the usual contact details you'd expect, then it's fine. The issue is where the sender is unknown. If that's the case, the FBI says, 'before responding, research the originating number, organization, and/or person purporting to contact you. Then independently identify a phone number for the person and call to verify their authenticity.' The team at MalwareBytes has just published a useful report on these 'innocent' texts that are anything but. 'All the messages are carefully crafted to seem plausible—so you don't immediately feel suspicious — and short — to trigger your curiosity.' The text may a single word, a 'hey' or a 'hello.' Or it might be a message that appears to either be a wrong number or a lost contact or a continuation of a thread you've started elsewhere. It doesn't matter what lure is used. Once you reply, even if it's just to inform the sender they have the wrong number then you fall into the trap. The lure could be more specific, 'a doctor's appointment, a social event, a funeral, a hospital visit, a message after a long absence,' but the objective is the same. The end result could be financial scam such as a crypto investment, or a romance scam where the by-chance encounter with a wrong number seems to lead to more, or that could escalate into a sextortion scam, if the exchange includes sharing images. As the FBI explains, 'the scammers behind the fake wrong-number text messages are counting on you to continue the conversation. They want to exploit your friendliness. Once they've made a connection, they'll work to become friends or even cultivate a remote romantic relationship.' And while 'they're posing as regular people who entered the wrong numbers on their phones,' in reality these 'fake wrong-number text scams use extremely sophisticated technology to commit their crimes.' The FTC reports that 'losses to text scams hit $470 million' last year, including 'wrong number scams that start as a seemingly misdirected message," but which 'evolve into a conversation with romantic undertones that can lead to investment and other scams.' McAfee warns 'these messages may seem harmless, but they're often the first step in long-game scams designed to steal personal data—or even life savings.' And they're surging, with '1 in 4 Americans having received one.' At any point you 'believe you are a victim of a scam,' the FBI tells phone users, 'end all communication with the perpetrator' immediately and contact law enforcement.
Yahoo
6 hours ago
- Yahoo
Postman, engineer, cleaner: Are hackers sneaking into your office?
When you think of a cyber attack, most of us imagine a classic hacker—a man in a hoodie, hunched alone over his computer, accessing a company's network remotely. But that's not always the case. Despite office security desks, it's easy to disguise yourself and simply walk in, a cyber security trainer told Euronews. 'Many people, when they see a high vis top, they think: 'Oh this person's an engineer' or something like that, and then just let them walk through.' While we're all aware of cyber attacks and the increasing threat they pose to businesses—particularly in light of recent attacks on Pandora, Chanel, Adidas and Victoria's Secret—most of us significantly underestimate the physical ways our defences can be breached. Global cyber security spending is projected to reach $213 billion (€183bn) in 2025, up from $193 billion (€166bn) in 2024, according to the latest data from Gartner, Inc. Despite this, according to Cisco's 2025 cybersecurity readiness index, only 4% of organisations globally are fully prepared for modern threats. According to security experts Sentinel Intelligence, physical security is a critical blindspot in our defences, and the consequences of ignoring this attack vector can be disastrous. The physical frontline of digital security The overall cyber threat in Europe is estimated to cost €10 trillion in 2025 and it's only set to grow, according to a recent interview with software company Splunk. In terms of physical cyber attacks, the threat is real and dangerous, as shown by the World Security Report 2023. Research found that large global companies, meaning those with combined revenues of $20 trillion, reported $1tn (€860bn) in lost revenue during 2022, directly caused by physical security incidents. That could mean a hacker gaining access to your office building in order to target your digital infrastructure. Related Defence sector outpaces overall job market in Europe amid rising security priorities Businesses set to fail if cyber resilience not most important thing says Splunk strategy head Penetration testing is a common service, commissioned by business leaders to test their internal defences. If you work in a big office, it has probably happened around you, without you even knowing. Euronews Business spoke to Daniel Dilks, director of operations at Sentinel Intelligence, to learn exactly what some of their recent tests have entailed. Case 1: Tailgating & access breach at a corporate headquarters 'Sentinel operatives dressed in business attire entered the building by tailgating staff during the morning rush, carrying fake ID badges and a laptop bag to blend in. Once inside, they located an unsecured meeting room, connected to the guest Wi-Fi, and left a rogue device (a network implant),' Dilks told Euronews. Case 2: Out-of-hours lock picking & data exposure 'During off-hours, testers gained access by picking a standard euro-cylinder lock on the side door. Once inside, they accessed an unlocked filing cabinet containing printed client contracts and passwords. No alarms were triggered,' Dilks explained. And for a criminal, once they've figured out how to enter a building, they can potentially do it on numerous occasions, each time gathering more information or causing more damage. Case 3: Social engineering & credential theft simulation 'An operative posed as a contractor for the building's heating and ventilation system. After entering with a high-vis vest and fake work order, the individual was escorted into a server room by staff who believed the visit was scheduled. While inside, they photographed exposed credentials and connected a USB 'dropbox' to a workstation,' he added, explaining that it's common for penetration testers to leave USB pens scattered around offices. Many workers, in the hope of being helpful, will plug them into their computers to see who it belongs to. In a real world attack scenario, this could introduce malware directly into your company network. In all of these examples, poor physical security measures, reluctance to challenge or verify unknown people, and making basic mistakes like writing passwords on post-it notes could all lead to serious consequences. Related How long could it take a hacker to crack one of your passwords in 2025? What are the consequences of a cyber attack? Though it's tricky to break down the exact cost of a security breach, attacks have short- and long-term consequences for a business. There are the initial direct costs which could be linked to physical damage. 'Somebody manages to break in, and they sabotage your system, they basically smash it up, right? So there's a direct cost there to the actual equipment,' the cyber security expert explained. 'But if damage to the equipment means you're not able to function for several days, that's loss of business. And sometimes when a customer can't reach you several times, they may decide to go elsewhere.' The expert explained that consequences can quickly intensify if data is wiped and backups don't work, adding that organisations can crumble without their systems. Indirect costs could also have enduring ramifications. 'Let's say someone steals your data and then there's intellectual property or confidential documents and then they get leaked. What's the cost to the organisation? There's a reputational cost there, they may lose contracts when the customers lose trust in them.' Companies can also be fined for these sorts of data breaches. Related Defence sector outpaces overall job market in Europe amid rising security priorities Surprising attack vectors The cyber security expert shared some particularly surprising ways that criminals have hacked into company systems in recent years. 'There was this case where in a casino in the US, attackers gained access to the network, not through going directly through the main part of the network, but they compromised a water-regulating device in an aquarium that was connected to the system.' And whilst we might not all have aquariums in our homes and offices, smart devices can be vulnerable too. 'When smart kettles first came out, the security community was very interested,' the expert explained. 'If you go to a cyber security conference, sometimes you'll see a demo of them hacking a kettle and then extracting the WiFi password, and then using the WiFi passport to then go into a network, and many things can snowball from there' If you're running a company, it's worth identifying all the possible ways you could be attacked. Even so, the expert emphasised that while we need to exercise caution, it doesn't mean we need to be rude or unkind to strangers in the workplace out of fear. 'Just be wary and be aware. We don't need to change our nature and be unkind to everyone, but we just need to be aware that there are some malicious people out there.' Sign in to access your portfolio
Yahoo
6 hours ago
- Yahoo
Postman, engineer, cleaner: Are hackers sneaking into your office?
When you think of a cyber attack, most of us imagine a classic hacker—a man in a hoodie, hunched alone over his computer, accessing a company's network remotely. But that's not always the case. Despite office security desks, it's easy to disguise yourself and simply walk in, a cyber security trainer told Euronews. 'Many people, when they see a high vis top, they think: 'Oh this person's an engineer' or something like that, and then just let them walk through.' While we're all aware of cyber attacks and the increasing threat they pose to businesses—particularly in light of recent attacks on Pandora, Chanel, Adidas and Victoria's Secret—most of us significantly underestimate the physical ways our defences can be breached. Global cyber security spending is projected to reach $213 billion (€183bn) in 2025, up from $193 billion (€166bn) in 2024, according to the latest data from Gartner, Inc. Despite this, according to Cisco's 2025 cybersecurity readiness index, only 4% of organisations globally are fully prepared for modern threats. According to security experts Sentinel Intelligence, physical security is a critical blindspot in our defences, and the consequences of ignoring this attack vector can be disastrous. The physical frontline of digital security The overall cyber threat in Europe is estimated to cost €10 trillion in 2025 and it's only set to grow, according to a recent interview with software company Splunk. In terms of physical cyber attacks, the threat is real and dangerous, as shown by the World Security Report 2023. Research found that large global companies, meaning those with combined revenues of $20 trillion, reported $1tn (€860bn) in lost revenue during 2022, directly caused by physical security incidents. That could mean a hacker gaining access to your office building in order to target your digital infrastructure. Related Defence sector outpaces overall job market in Europe amid rising security priorities Businesses set to fail if cyber resilience not most important thing says Splunk strategy head Penetration testing is a common service, commissioned by business leaders to test their internal defences. If you work in a big office, it has probably happened around you, without you even knowing. Euronews Business spoke to Daniel Dilks, director of operations at Sentinel Intelligence, to learn exactly what some of their recent tests have entailed. Case 1: Tailgating & access breach at a corporate headquarters 'Sentinel operatives dressed in business attire entered the building by tailgating staff during the morning rush, carrying fake ID badges and a laptop bag to blend in. Once inside, they located an unsecured meeting room, connected to the guest Wi-Fi, and left a rogue device (a network implant),' Dilks told Euronews. Case 2: Out-of-hours lock picking & data exposure 'During off-hours, testers gained access by picking a standard euro-cylinder lock on the side door. Once inside, they accessed an unlocked filing cabinet containing printed client contracts and passwords. No alarms were triggered,' Dilks explained. And for a criminal, once they've figured out how to enter a building, they can potentially do it on numerous occasions, each time gathering more information or causing more damage. Case 3: Social engineering & credential theft simulation 'An operative posed as a contractor for the building's heating and ventilation system. After entering with a high-vis vest and fake work order, the individual was escorted into a server room by staff who believed the visit was scheduled. While inside, they photographed exposed credentials and connected a USB 'dropbox' to a workstation,' he added, explaining that it's common for penetration testers to leave USB pens scattered around offices. Many workers, in the hope of being helpful, will plug them into their computers to see who it belongs to. In a real world attack scenario, this could introduce malware directly into your company network. In all of these examples, poor physical security measures, reluctance to challenge or verify unknown people, and making basic mistakes like writing passwords on post-it notes could all lead to serious consequences. Related How long could it take a hacker to crack one of your passwords in 2025? What are the consequences of a cyber attack? Though it's tricky to break down the exact cost of a security breach, attacks have short- and long-term consequences for a business. There are the initial direct costs which could be linked to physical damage. 'Somebody manages to break in, and they sabotage your system, they basically smash it up, right? So there's a direct cost there to the actual equipment,' the cyber security expert explained. 'But if damage to the equipment means you're not able to function for several days, that's loss of business. And sometimes when a customer can't reach you several times, they may decide to go elsewhere.' The expert explained that consequences can quickly intensify if data is wiped and backups don't work, adding that organisations can crumble without their systems. Indirect costs could also have enduring ramifications. 'Let's say someone steals your data and then there's intellectual property or confidential documents and then they get leaked. What's the cost to the organisation? There's a reputational cost there, they may lose contracts when the customers lose trust in them.' Companies can also be fined for these sorts of data breaches. Related Defence sector outpaces overall job market in Europe amid rising security priorities Surprising attack vectors The cyber security expert shared some particularly surprising ways that criminals have hacked into company systems in recent years. 'There was this case where in a casino in the US, attackers gained access to the network, not through going directly through the main part of the network, but they compromised a water-regulating device in an aquarium that was connected to the system.' And whilst we might not all have aquariums in our homes and offices, smart devices can be vulnerable too. 'When smart kettles first came out, the security community was very interested,' the expert explained. 'If you go to a cyber security conference, sometimes you'll see a demo of them hacking a kettle and then extracting the WiFi password, and then using the WiFi passport to then go into a network, and many things can snowball from there' If you're running a company, it's worth identifying all the possible ways you could be attacked. Even so, the expert emphasised that while we need to exercise caution, it doesn't mean we need to be rude or unkind to strangers in the workplace out of fear. 'Just be wary and be aware. We don't need to change our nature and be unkind to everyone, but we just need to be aware that there are some malicious people out there.' Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data