The Conundrums of Trust
By Srinivas Kumar
The convergence of information technology (IT) and operational technology (OT) to secure the Internet of Things (IoT), the Industrial IoT (IIoT), and OT solutions will eventually follow the route towards continuous surveillance that the IT world navigated over the past two decades.
Read MoreWhen the Supply Chain Becomes the Kill Chain
By Srinivas Kumar
Tragically, the hackers have won yet again defeating security professionals, processes, and technology. The recent wave of successful cybersecurity attacks on key U.S. agencies, large organizations, and security companies underscores the fundamental inadequacies of the detection and forensic analysis (post breach) tool chest that is pervasive in the information technology (IT) industry today.
Read MoreThe State of Digital Transformation and OT/IT Convergence
By Srinivas Kumar
As we approach the end of an unforgettable year, all industries are recovering from the aftereffects of the global pandemic and contemplating the meaning and purpose of digital transformation. The goals of OT/IT (operational technology/information technology) convergence are far from cohesive, the associated investment costs remain constraining, and pathways to revenues appear fluid – for key stakeholders to commit to and execute on a roadmap. The collaborative nature of such an endeavor to transform legacy systems in critical infrastructure crammed with heterogeneous brownfield and greenfield devices is a daunting prospect. It will require equipment manufacturers, service providers, cloud platform vendors, and device owners/operators to agree on fundamental aspects of change (whose turf is this to lead the charge?).
Read MoreThe Uphill Road to OT/IT Convergence
By Srinivas Kumar
Across all the major industry sectors, chief risk officers, product managers, solution architects and subject matter experts have to confront the economic, political, intellectual and commercial challenges of industrial and non-industrial IoT with a subjective assessment of the following fundamental introspections.
Read MoreThe Seven Habits of Highly Trustworthy Devices
By Srinivas Kumar
Digital transformation of traditional original equipment manufacturer (OEM) product and solution offerings requires hardening of connected and edge devices with a horizontal platform that provides a "single pane of glass" for operational technology (OT) security.
Deploying greenfield devices in traditional network silos alongside legacy brownfield devices in OT environments introduces major risks and exposes a huge attack surface for cyber warfare.
Read More