Blog

Miles per Cyberattack

December 23, 2021

By Srinivas Kumar
Chief Technology & Product Officer at Mocana Corporation

If cybersecurity was an automobile, a key performance indicator would be “miles per cyberattack," with infinite as the desired metric (i.e., miles before the next cyberattack)!

The cybersecurity challenge for information technology (IT) stakeholders is enforcement of digital security across all managed assets (computers and network elements) to prevent malware infections and consequences thereof. In contrast, what is the cybersecurity challenge for operational technology (OT) stakeholders?

Read More

Rationalizing Trust in Cyberspace

November 22, 2021

By Srinivas Kumar
Chief Technology & Product Officer at Mocana Corporation

All our knowledge begins with the senses, proceeds then to the understanding, and ends with reason. There is nothing higher than reason.

– Immanuel Kant

Read More

Cybersecurity Déjà Vu

November 1, 2021

By Srinivas Kumar
Chief Technology & Product Officer at Mocana Corporation

In 1996, 25 years ago, the invention of cryptovirology paved the way for modern day ransomware. Major cyberattacks were reportedly staged that year against the U.S. Department of Justice, the U.S. Air Force, the CIA, and the U.S. Department of Defense.

The recent high profile and publicized cyberattacks on mission critical infrastructure assets and thousands of unreported ransomware attacks each day across the globe is staggering and alarming. The necessary investments and collective will to foster transformative technology innovations in cyber defense by government bureaucrats and corporate boardrooms have been lackluster.

Read More

Zero Trust is a Paradigm Shift

October 11, 2021

By Srinivas Kumar
Chief Technology & Product Officer at Mocana Corporation

Zero trust is a paradigm shift, and not a disruptive technology. Does it imply decommissioning brownfield devices? Does it require field device updates? Does it require costly upgrades to field devices? Does it mean a quarantine colony for non-compliant devices like network admission controls?

Read More

Protecting IoT Devices in Operational Technologies

September 23, 2021

By Srinivas Kumar
Chief Technology & Product Officer at Mocana Corporation

History serves as an early warning system. Cyberwars are as old as the internet itself and originated with simple tools designed to exploit vulnerabilities in operating systems, applications, and network services. In 1988, they landed as viruses through portable media and spread over the network as worms. By 2010, they acquired broadcast capability as botnets. In 2012 they were referred to as complex malware. They continued their evolution from tools to smart weapons. By 2015, they transformed into advanced persistent threats (APTs) and kill chains.

Read More
COMMENTS