Disrupting Reactive Cybersecurity Models with Chaos
Home > Cybersecurity > Article

Disrupting Reactive Cybersecurity Models with Chaos

Share it!
Cinthya Alaniz Salazar By Cinthya Alaniz Salazar | Journalist & Industry Analyst - Fri, 06/03/2022 - 10:31

The traditional, signature-based threat identification approach to cybersecurity leaves companies at a reactionary disadvantage. The Mathematical Chaos model breaks with the classical detection and response approach to cybersecurity, pushing forward a highly sensitive zero-trust model that is continuously reacting to anomalies in real-time, said Sneer Rozenfled, CEO, Cyber 2.0.

“The cybersecurity world is based on a vulnerable biological model that intrinsically always places hackers one step ahead,” said Rozenfled. 

Existing cybersecurity solutions that concentrate singularly on detection and response will always fail eventually because 100 percent detection is not possible given the continuous innovation of malicious software. Although this field has made significant progress with anomaly detection through behavioral analysis and deep-packet inspection, these tools fundamentally rely on the identification of malicious software before preventing its spread throughout an organization. In other words, the traditional reactionary approach is designed to fail in the face of an ever-evolving cybersecurity landscape, which is churning out increasingly sophisticated cybersecurity threats on a daily basis. 

“The overarching objective of Cyber 2.0 is to shift the primary focus of cybersecurity from detection to containment, shutting down an invasion before it can spread an exact greater damage,” said Rozenfled. 

The Mathematical Chaos model is based on the Zero Trust security model, which operates under the assumption it does not know where the next cybersecurity threat will emerge from. This algorithm essentially verifies every software that requests to interact with a system’s network, even when Cyber 2.0 is removed from the system. This model is more adept to protect computers, which function and communicate based on numbers “rather than the biological approach that attempts to protect them as a human body,” said Rozenfled. This approach is complemented with over capacities including network obscurement, security operation centers and forensic capabilities, but these are all secondary to the chaos algorithm that does most of the heavy lifting.

To prove the validity of its cybersecurity approach, Cyber 2.0 has invited over 5,500 white-hat hackers over four years from 30 countries to attack its system, giving them administrator passwords as a starting point. All of them have failed so far. 

You May Like

Most popular

Newsletter