By Srinivas Kumar
Chief Technology & Product Officer at Mocana Corporation
It is not a battle anymore; it is all-out war!
The gradual spike of ransomware attacks in the United States targeting critical infrastructure signals a new normal. With the level of coordinated risk countermeasures and awareness training required across private and public institutions, from the board of directors to rank-and-file employees, the prospect of getting the situation under control in the short-term appears bleak for a variety of reasons. More attacks must be anticipated in the months and years ahead until there is a cyber elixir.Read More
The cybersecurity industry is buzzing with the four pillars of zero initiatives – from zero-trust architecture to zero passwords, zero perimeter (perimeter-less) and zero-touch provisioning. Amid all this, information technology (IT) and operational technology (OT) budgets and service cycles are spinning with policies and audits on the strength of user passwords, subscriptions to harvested zero-day threat intelligence for perimeter-based defenses, and device discovery.Read More
The convergence of information technology (IT) and operational technology (OT) to secure the Internet of Things (IoT), the Industrial IoT (IIoT), and OT solutions will eventually follow the route towards continuous surveillance that the IT world navigated over the past two decades.
Across all the major industry sectors, chief risk officers, product managers, solution architects and subject matter experts have to confront the economic, political, intellectual and commercial challenges of industrial and non-industrial IoT with a subjective assessment of the following fundamental introspections.Read More
Digital transformation of traditional original equipment manufacturer (OEM) product and solution offerings requires hardening of connected and edge devices with a horizontal platform that provides a "single pane of glass" for operational technology (OT) security.
Deploying greenfield devices in traditional network silos alongside legacy brownfield devices in OT environments introduces major risks and exposes a huge attack surface for cyber warfare.Read More