Corsha - Experts & Thought Leaders

Latest Corsha news & announcements

Corsha's cybersecurity for DOE manufacturing initiative

Corsha Inc., a Washington D.C.-based cybersecurity firm, known for its innovative Identity Provider for Machines of all kinds, has been awarded a new contract through a competitive RFP released by the Cybersecurity Manufacturing Innovation Institute (CyManII) for the Department of Energy (DOE). Corsha will join a diverse team led by Michigan Tech University, collaborating with experienced organisations in manufacturing, cybersecurity, and sustainability. Cybersecurity playbook The aim of the project’s Industrial Use Case is to demonstrate a secure digitalisation of a small-to-medium manufacturer’s (SMM) existing equipment to improve energy efficiency through a cybersecurity playbook and program. Smart Manufacturing implementations can be effective in helping achieve positive economic impact only if the systems are secure, interoperable, low complexity, cost-effective, and technically sustainable.  Corsha Platform Corsha Platform will provide the cybersecurity measures to securely connect the digitised data The thermal curing process of the FRP rebar at Neuvokas Corp in Ahmeek, MI will be the focus of the Michigan Tech-led project. By digitising and securing Neuvokas’ digitised composite rebar conveyor oven curing process, the project will demonstrate and share the significant improvements in process feedback, quality control, throughput, and energy efficiency. The Corsha Platform will provide the cybersecurity measures to securely connect the digitised information across the transformed Neuvokas digital thread.  Dr. Vinh Nguyen at Michigan Tech University will lead the project and serve as Principal Investigator: “I’m excited to lead a real-world project inclusive to academia, industry, and the public sector who represent the stakeholders needed to meet the goals of US manufacturing,” Dr. Nguyen said. “We’re seeing rapid advancements in manufacturing technologies and need to make sure we’re measuring ourselves to cost-effectiveness, security, and sustainability metrics.” Digital ecosystem Corsha’s platform will be critical to managing access to the digital thread at Neuvokas Corp. developed on this project. “Manufacturers want to move to a more digital ecosystem but often find that transformation daunting,” said Eric Kumar, Head of Customer Success at Corsha. “We love to help our customers implement the right identity and access management measures to bring data assurance and confidence in connectivity they need to jump into Industry 4.0.” “We are thrilled to collaborate with Michigan Tech, Neuvokas Corp, and CyManII on an important priority for the Department of Energy,” said Anusha Iyer, CEO and Founder of Corsha. “Our goal is to show that cyber can act as a bridge to protect and even better -- enhance the operational efficiency of small and medium manufacturers.”

Corsha Inc. secures SBIR phase III contract for M2M security

Corsha Inc., a Washington D.C.-based cybersecurity firm, known for its innovative Identity Provider for Machines, pioneering the way in Machine-to-Machine (M2M) security solutions, has been awarded an SBIR Phase III contract by the United States Air Force Sustainment Centre (AFSC).  This initiative will focus on developing a blueprint for streamlining how to get Authority to Operate (ATO) and Interim Authority to Test (IATT) certifications for new technologies on the Industrial Depot Maintenance (IDM) shop floor. This effort aims to enhance the introduction of new technologies into operational technology (OT) networks propelling the Air Force into Industry 4.0. Advancing innovation and cybersecurity “We are excited to support the United States Air Force Sustainment Centre on this important initiative that represents a pivotal step towards simultaneously advancing innovation and cybersecurity of operational technology systems,” said Anusha Iyer, CEO & Founder, Corsha. “Developing a blueprint for getting ATO certifications will set a new standard for security efficiency and resilience within the Air Forces Industrial Depot Maintenance (IDM) networks while accelerating technology adoption on the manufacturing shop floor.” SBIR Phase II and TACFI programs The team is uniquely positioned to perform this work due to its successful outcomes Corsha will be collaborating with System Innovation, LLC to jointly bring deep cybersecurity and model-based systems engineering (MBSE) expertise to the AFSC. The team is uniquely positioned to perform this work due to its successful outcomes on prior and current SBIR Phase II and TACFI programs.  They are already integrating systems for enforcing strict identity and access management security for connecting AFSC OT and IT systems. As part of these efforts, Corsha’s platform efficiently achieved the pivotal Interim Authority to Test (IATT) with production shop floor equipment at the AFSC Warner Robins Air Logistics Complex (ALC).  Corsha’s Zero Trust Security Platform Corsha has been working with AFSC to securely connect digital engineering systems and operational technology (OT) enclaves. Current efforts are leveraging Corsha’s Zero Trust Security Platform for Machines to automate the secure transfer of data directly from controllers, both modern and legacy alike.   The data includes real-time telemetry and backups and can now be securely transmitted automatically into data repositories easing the burden on OT operators. This enhanced secure connectivity supports AFSC IDM modernisation efforts around supply chain management, manufacturing, and data-sharing activities.

Dell Technologies builds ecosystem to speed zero trust adoption

Navigating security is like trying to make way through a high-stakes labyrinth. There are so many different, complicated passageways that make it hard to reach the destination. Zero Trust can help ease this journey. Zero Trust Dell is leading a paradigm shift in security, but it will take a village to bring it to life. This paradigm is Zero Trust, and it is helping pull together the village through a robust partner ecosystem. Zero Trust is a cybersecurity framework that automates an organisaton’s security architecture and orchestrates a response as soon as systems are attacked. The challenge, however, lies in implementing a complete solution guided by the seven pillars of Zero Trust. No company can do this alone. Zero Trust ecosystem Dell brings together more than 30 leading technology and security companies to create a unified solution To help private and public sector organisatons simplify the adoption, Dell is building a Zero Trust ecosystem. It brings together more than 30 leading technology and security companies to create a unified solution across infrastructure platforms, applications, clouds, and services. An advanced private cloud solution Through this ecosystem, Dell and its partners are paving the way to adoption. Together with the Maryland Innovation Security Institute (MISI), it is providing best-in-class technology at the Zero Trust Center of Excellence and constructing an advanced private cloud solution focused on integrating and orchestrating customer security. This approach will help organisatons implement the technology and tap the expertise needed to build and configure the architecture. Integration of technology Dell is enabling organisatons to defeat cyber criminals while meeting the U.S. government’s Zero Trust mandate Leading the integration of the Zero Trust ecosystem, Dell brings together technology and capabilities from partners including Corsha, Gigamon, Intel, Juniper Networks, MISI, Nomad GCS, NVIDIA, Palo Alto Networks, VMware, and others. By replicating the Department of Defence-approved architecture with technology from leading providers, Dell is enabling organisatons to defeat cyber criminals while meeting the U.S. government’s Zero Trust mandate. Capabilities The ecosystem will help execute the Department of Defence Zero Trust requirements, including capabilities such as: Continuous authentication: Continuously authenticates user access using multifactor authentication. Comply to connect, device detection, and compliance: Any device attempting to connect to a network or access a resource is detected and assessed for compliance status. Continuous monitoring and ongoing authorisation: Automated tools and processes continuously monitor applications and assess their authorisation to determine security control effectiveness. Data encryption and rights management: Data rights management tooling encrypts data at rest and in transit to reduce the risk of unauthorised data access. Software-defined networking: Enables the control of packets to a centralised server, provides additional visibility into the network, and enables integration requirements. Policy decision point and policy orchestration: Collects and documents all rule-based policies to orchestrate across the security stack for effective automation. Threat intelligence: Integration of threat intelligence data with other security information and event management (SIEM) data provides a consolidated view of threat activity. End-to-end solution Zero Trust is a journey, and the destination is a well-defined set of integrated and automated security activities validated by the U.S. government and recognised worldwide.  The partner ecosystem is a critical component of Dell’s project to scale an end-to-end validated Zero Trust solution for organisatons worldwide. It looks forward to sharing more on the Zero Trust strategy at Dell Technologies World 2023 in Las Vegas, May 22-25, 2023.

Quick poll
What is the most significant challenge facing smart building security today?