CIO Influence Interview with TK Keanini, CTO of DNSFilter

TK is a leader in technical innovation, specializing in the identification and protection of intellectual properties. With a background in game development and information security, he balances design’s social and technical aspects. Known for his ability to acquire top talent and build high-performing teams at DNSFilter.

Hello, TK Keanini! Welcome to the CIO Influence Interview Series. Please share how your extensive experience in IT architecture and passion for information security have influenced your approach as CTO at DNSFilter.

I’ve created a reputation for myself of being incredibly passionate about my work. Something I ​​learned early on in my career is that if you do right by the customer, they’ll do right by you. And the product we create, after all, is for the customer. Putting customers and partners at the center of every decision and performance measurement has never failed me as a guiding principle. It is also easy to get burned out with all the work you have to put in, and that is where passion comes into play. I truly love what I do and I love working with folks who share that same passion.

 

Search
  • There are no suggestions because the search field is empty.
Categories
Latest posts
As Traffic to Threat Websites Continues to Rise, Don’t Overlook the Importance of DNS As Traffic to Threat Websites Continues to Rise, Don’t Overlook the Importance of DNS

At the scale of the Internet, threats are relentless. Domain Name System (DNS) technology is over 40 years old, but it remains just as relevant today—if not more so—to help organizations stay secure from malicious threats. What most people don’t know is that more than 70% of attacks involve the DNS layer. Every malicious request blocked represents a real attack prevented, real harm avoided, and real people protected. This underscores the power of...

Scammers using AI to create fake IRS sites. Here's other scams to watch out for. Scammers using AI to create fake IRS sites. Here's other scams to watch out for.

Cybersecurity experts expect a significant surge in tax-related scams in the final month before Tax Day.

From Weakest Link to Strongest Defense: Building a Human-Centric Cybersecurity Approach From Weakest Link to Strongest Defense: Building a Human-Centric Cybersecurity Approach

There's a contradiction in cybersecurity: humans can be both the weakest link and the strongest. For instance, humans are highly susceptible to deception. This is an age-old problem; look no further than the Trojan Horse of Greek lore or the Ghost Army of World War II. In the latter case, Allied forces created inflatable tanks and faked radio traffic, among other deceptive tactics across Europe, to confuse, distract and divert enemy forces and sa...

Explore More Content

Ready to brush up on something new? We've got even more for you to discover.