RSAC 2024: Abnormal Intros Unified Account Takeover Protection

Sanjay Jeyakumar, co-founder and CTO of Abnormal Security, joins Dark Reading's Terry Sweeney at News Desk during RSA Conference to discuss why email is so popular with attackers and how email account takeovers plague business and government.

10 Min View

Sanjay Jeyakumar, co-founder and CTO of Abnormal Security, joins Dark Reading's Terry Sweeney at News Desk during RSA Conference to discuss why email is so popular with attackers and how email account takeovers plague business and government. Jeyakumar shares details of the company’s newest product, Complete Account Takeover Protection, and what customers can expect from it. And he talks about the biggest threats in the pipeline and what organizations to prepare and blunt their advantage.

Sanjay is the CTO and co-founder of Abnormal Security, as well as the Head of Research and Development. An engineering leader with more than 17 years of experience, Sanjay has helped some of the world’s largest software companies grow and innovate. Prior to Abnormal, Sanjay was the systems architect at Twitter, responsible for the distributed data processing and machine learning systems that powered Twitter’s business. Sanjay was also the founding engineer and architect at TellApart, which was acquired by Twitter for $500M+ and a senior software engineer at Google, where he worked on next-generation Google Search technology and the launch of Android. He holds a BS in Electrical Engineering and Computer Science from the University of California at Berkeley and an MS in Computer Science from Stanford University.

About the Author(s)

Terry Sweeney, Contributing Editor

Terry Sweeney is a Los Angeles-based writer and editor who has covered technology, networking, and security for more than 20 years. He was part of the team that started Dark Reading and has been a contributor to The Washington Post, Crain's New York Business, Red Herring, Network World, InformationWeek and Mobile Sports Report.

In addition to information security, Sweeney has written extensively about cloud computing, wireless technologies, storage networking, and analytics. After watching successive waves of technological advancement, he still prefers to chronicle the actual application of these breakthroughs by businesses and public sector organizations.


Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights