Blog

Zero Trust is a Paradigm Shift

October 11, 2021

By Srinivas Kumar
Chief Technology & Product Officer at Mocana Corporation

Zero trust is a paradigm shift, and not a disruptive technology. Does it imply decommissioning brownfield devices? Does it require field device updates? Does it require costly upgrades to field devices? Does it mean a quarantine colony for non-compliant devices like network admission controls?

Read More

Protecting IoT Devices in Operational Technologies

September 23, 2021

By Srinivas Kumar
Chief Technology & Product Officer at Mocana Corporation

History serves as an early warning system. Cyberwars are as old as the internet itself and originated with simple tools designed to exploit vulnerabilities in operating systems, applications, and network services. In 1988, they landed as viruses through portable media and spread over the network as worms. By 2010, they acquired broadcast capability as botnets. In 2012 they were referred to as complex malware. They continued their evolution from tools to smart weapons. By 2015, they transformed into advanced persistent threats (APTs) and kill chains.

Read More

A Definitive Guide to OT/IoT Modernization

July 13, 2021

By Srinivas Kumar
Chief Technology & Product Officer at Mocana Corporation


Band-aids may serve as a dressing on open wounds but do not heal infections. Don't put a band-aid on your network to
cover fissures on your device instead of providing treatment to the device. Whether you are a CISO, CTO or product security architect, the difficult decisions you must make to deal effectively with sophisticated cyber risks from supply chain compromise to ransomware requires strategy.

Resist the temptation to settle for a solution based on popular brand names, a vendor’s annual revenues, or the vendor’s stock price after a high-profile breach. In the long term, untreated fissures will break open.

Read More

Ransomware Attacks Becoming the New Normal

June 7, 2021

By Srinivas Kumar
Chief Technology & Product Officer at Mocana Corporation


It is not a battle anymore; it is all-out war!

The gradual spike of ransomware attacks in the United States targeting critical infrastructure signals a new normal. With the level of coordinated risk countermeasures and awareness training required across private and public institutions, from the board of directors to rank-and-file employees, the prospect of getting the situation under control in the short-term appears bleak for a variety of reasons. More attacks must be anticipated in the months and years ahead until there is a cyber elixir.

Read More

The Big Zero: How to Protect the Cybersecurity Chain of Trust

May 24, 2021
By Srinivas Kumar
Chief Technology & Product Officer at Mocana Corporation

 

The cybersecurity industry is buzzing with the four pillars of zero initiatives – from zero-trust architecture to zero passwords, zero perimeter (perimeter-less) and zero-touch provisioning. Amid all this, information technology (IT) and operational technology (OT) budgets and service cycles are spinning with policies and audits on the strength of user passwords, subscriptions to harvested zero-day threat intelligence for perimeter-based defenses, and device discovery.

Read More
COMMENTS