Veteran programmer currently developing network-based security tools
Mahdi Pourzaferani’s network programming expertise has fueled the development of some of the world’s most popular games. He has now turned to an even more impactful challenge: developing and delivering new approaches to network security.
As a security researcher at OpTic Gaming and a network programmer at EA Sports, Pourzaferani was responsible for the security and performance of two esports luminaries. In such a fast-paced, high-stakes environment, its teams could not afford to sacrifice speed, reliability, or rock-solid security. The techniques and methods he helped design and implement as an esports programmer shaped Pourzaferani’s career and led him to consider approaches to network security that could provide similar benefits. to organizations of all types.
“At OpTic Gaming and EA Sports, we had a tremendous opportunity to develop new methods of network security,” Pourzaferani recalls. “The requests were huge, but the user base, especially at OpTic, was more limited and better known than most companies. very knowledgeable users who had direct contact and an ongoing interest in contributing to network security.
The challenge for organizations with larger, more disparate user bases is more complex, according to Pourzaferani, who has continued to serve the gaming community through his latest venture, FiveM Store.
“The weakest link in any network security system is its user base,” ne notes. “It’s not a criticism of everyone taking the proper security measures. Most end users do. But it only takes a moment of weakness on the part of a user to compromise an entire network. Applications with discrete user bases can increase their security without unduly compromising access and performance, but larger, more open systems still struggle with this aspect of things.”
To complement the training and monitoring that large systems rely on to mitigate human error, Pourzaferani is currently developing network-based tools capable of identifying the fingerprints of serious security breaches and tracing security threats that result within the network. He likens his approach to the human immune system.
“No matter how cautious we are in the world, we are constantly exposed to a wide range of threats, from irritants like pollen to viruses like the one that caused a global pandemic. We have to be smart enough not to take undue risk, but we also have to rely on our own internal defenses. I think the same should be true for network security. Ten years ago, we didn’t have the tools to empower networks to their own effective defense systems.position to develop them.I am excited about the prospects of the work I have done so far in this area, and I look forward to sharing the results with the world.