Cookies must be enabled to use this web application.

To allow this site to use cookies, use the steps that apply to your browser below. If your browser is not listed below, or if you have any questions regarding this site, please contact us.

Microsoft Internet Explorer
  • 1. Select "Internet Options" from the Tools menu.
  • 2. Click on the "Privacy" tab.
  • 3. Click the "Default" button.
  • 4. Click "OK" to save changes.
Chrome Chrome
  • 1. Click the "Spanner" icon in the top right of the browser.
  • 2. Click Options and change to the "Under the Hood" tab.
  • 3. Scroll down until you see "Cookie settings:".
  • 4. Set this to "Allow all cookies".
Firefox Firefox
  • 1. Go to the "Tools" menu and select "Options".
  • 2. Click the "Privacy" icon on the top of the window.
  • 3. Click on the "Cookies" tab.
  • 4. Check the box corresponding to "Allow sites to set Cookies.
  • 5. Click "OK" to save changes.
Opera Opera
  • 1. Click on the "Tools" menu and then click Preferences.
  • 2. Change to the Advanced tab, and to the cookie section.
  • 3. Select "Accept cookies only from the site I visit" or "Accept cookies".
  • 4. Ensure "Delete new cookies when exiting Opera" is not ticked.
  • 5. Click OK.
Netscape and Mozilla Suite Netscape and Mozilla Suite
  • 1. Select "Preferences" from the Edit menu.
  • 2. Click on the arrow next to "Privacy & Security".
  • 3. Under "Privacy & Security" select "Cookies".
  • 4. Select "Enable all cookies".
  • 5. Click "OK" to save changes.
Safari Safari
  • 1. Click on the "Cog" icon in Safari.
  • 2. Click Preferences.
  • 3. Change to the Security tab.
  • 4. Select "Only from sites I visit" or "Allow".
  • 5. Close the dialog using the cross.
Book Image Not Available Book Image Not Available

See inside

Book details
  • Genre:COMPUTERS
  • SubGenre:Security / Cryptography
  • Language:English
  • Pages:162
  • Format:Hardcover
  • Hardcover ISBN:9781098370190

Digital Transformers

Digital Transformation Begins with Device Transformation

by Srinivas Kumar

Book Image Not Available Book Image Not Available

See inside

Overview
Smart devices designed for the Internet of Things (IoT), industrial IoT, and operational technology (OT) in the emerging era of digital transformation require protection by design for cyber resilience. Cyberattacks by nation state actors and cybercrime syndicates cause system outages and disruption of essential services. This book is a call to action – for silicon chip makers, equipment manufacturers, managed security service providers, device owners and operators, to begin the journey towards collaborative cyber protection. The traditional information technology (IT) detection and prevention methods based on threat models are inadequate to defend the billions of devices that are an intrinsic part of our daily regimen. It's essential to adopt protection models based on risk for modernization across all sectors – smart factories, smart cities, smart grids, smart transportation, smart homes, healthcare systems, aviation systems, public utility systems, defense systems, and law enforcement systems. The power of scientific and technological innovations offers opportunities to transform and reform the way things are and the way they ought to be. If the past three decades are a gauge of the power of innovation, then the next three decades will be a harbinger of the power of transformation.
Description
Smart devices designed for the Internet of Things (IoT), industrial IoT, and operational technology (OT) in the emerging era of digital transformation require protection by design for cyber resilience. Cyberattacks by nation state actors and cybercrime syndicates cause system outages and disruption of essential services. This book is a call to action – for silicon chip makers, equipment manufacturers, managed security service providers, device owners and operators, to begin the journey towards collaborative cyber protection. The traditional information technology (IT) detection and prevention methods based on threat models are inadequate to defend the billions of devices that are an intrinsic part of our daily regimen. It's essential to adopt protection models based on risk for modernization across all sectors – smart factories, smart cities, smart grids, smart transportation, smart homes, healthcare systems, aviation systems, public utility systems, defense systems, and law enforcement systems. The power of scientific and technological innovations offers opportunities to transform and reform the way things are and the way they ought to be. If the past three decades are a gauge of the power of innovation, then the next three decades will be a harbinger of the power of transformation. Over the years, there have been multiple waves of technological evolution. We've seen evolutions from analog to digital over copper, and then from copper to fiber, and fiber to wireless. Soon after that, we advanced from on-premises to cloud data centers, and then from local applications to online applications, then local storage advanced to cloud storage. All these advancements were remarkable endeavors. The second wave of inventions included virtualization, cloud computing, high speed connections, software defined networking, online applications and remote services. All these advancements have shaped a global economy. This book emphasizes that the third wave is coming. Recent advances in silicon technologies, field-programmable gate arrays, edge computing, zero trust models, artificial intelligence (AI) and machine learning (ML) collectively provide a platform for digital transformation at scale. Data is the new oil and explicit trust in data is paramount. Devices power every aspect of our daily living – at home, in public and at work – and explicit trust in devices is imperative. "Digital Transformers" is a must-read for anyone with an interest in the rise of technological advancements and the inherent need for cybersecurity keep up with the on-going processes of digital transformation.
About the author
Srinivas Kumar is the Chief Technology and Product Officer at Mocana Corporation and has more than 30 years of hands-on engineering and management experience in computer networking and security. Prior to joining Mocana, he was the CTO of TaaSera. He founded TaaSware in 2011 (acquired by TaaSera in 2012). During his time at TaaSware he served as an entrepreneur-in-residence at SRI International. Prior to that, he was a solutions architect in the networking and security business unit at VMware. He was previously the VP of engineering and solutions architect for identity-based access controls at Applied Identity, until it was acquired by Citrix. He has served in senior project and architect roles at Nortel, Lucent and TranSwitch. Earlier in his career, as engineering manager at Firearms Training Systems (acquired by Meggitt Training Systems), he led the design and development of real time marksmanship and squad engagement simulators for training law enforcement personnel and the military. He holds 28 U.S. patents in the field of cyber-protection for IoT, cybersecurity, user and application identity-based access controls, network and endpoint security, and evidence based predictive analytics. He has led engineering efforts to certify products for common criteria, FIPS, DO-178, US DoD and NATO standards. He holds a BE degree in electrical engineering from Bombay University, and an MS degree in electrical and computer engineering from Clemson University.

Book Reviews

to submit a book review
Thanks for submitting a review!

Your review will need to be approved by the author before being posted.

See Inside
Front Cover

Loading book cover...

Book Image Not Available Book Image Not Available
Session Expiration WarningYour session is due to expire.

Your online session is due to expire shortly.
Would you like to extend your session and remain logged in?

Session Expired

Your session has expired.We're sorry, but your online session has expired.
Please log back into your account to continue.

This site uses cookies. Continuing to use this site without changing your cookie settings means that you consent to those cookies to enhance site navigation and the overall user experience. Learn more about our privacy policy or learn more about how to turn off cookies.