Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security //

Automation

5/16/2017
06:40 PM
Curtis Franklin
Curtis Franklin
Curt Franklin
50%
50%

Mocana Lands $11M Funding for IoT Security

New round of funding brings IoT security company's total to $93.6 million.

Mocana Corporation, IoT security provider and winner of the Most Innovative Security Strategy Leading Lights Award at Light Reading's Big Communications Event 2017, announced $11 million in new venture funding from Sway Ventures, Shasta Ventures, Trident Capital Fund and GE Ventures. The new funding brings the investment total to $93.6 million.

Mocana's approach to IoT security is based on its Mocana IoT Security Platform, which provides trusted device status and software update capabilities for IoT devices through a gateway. This allows these features to be applied to IoT end points that may be too limited in capability to allow for software updates or advanced security within the device itself.

The Mocana platform allows both the device and its data to be trusted by securing the boot process and firmware. In addition, the platform secures data transmission among the device, gateway and cloud. Rather than solely providing a separate service to the end-using customer, Mocana has been awarded contracts to integrate its platform into the industrial IoT offerings of companies such as Dell, GE, General Dynamics, Panasonic, Schneider Electric, Siemens and Yokogawa.

Mocana is working with other companies to build an ecosystem of interoperable IoT devices and an open framework for IoT edge computing. The company is a founding member of EdgeX Foundry , alongside Dell, AMD, Canonical and 40 other companies.

Founded in 2002, Mocana now has hundreds of customers in the industrial IoT space and is expanding its presence into IoT fields such as avionics, through a partnership with DDC-I. In a written statement announcing the funding, William Diotte, CEO of Mocana, explained the dynamic that is leading the company to grow: "Hackers are taking advantage of weak security in IoT devices and industrial control systems, and the pace and impact of cyber attacks is only increasing."

— Curtis Franklin, Security Editor, Light Reading. Follow him on Twitter @kg4gwa.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
News
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
News
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-28026
PUBLISHED: 2021-03-05
jpeg-xl v0.3.2 is affected by a heap buffer overflow in /lib/jxl/coeff_order.cc ReadPermutation. When decoding a malicous jxl file using djxl, an attacker can trigger arbitrary code execution or a denial of service.
CVE-2021-27907
PUBLISHED: 2021-03-05
Apache Superset up to and including 0.38.0 allowed the creation of a Markdown component on a Dashboard page for describing chart's related information. Abusing this functionality, a malicious user could inject javascript code executing unwanted action in the context of the user's browser. The javasc...
CVE-2021-20663
PUBLISHED: 2021-03-05
Cross-site scripting vulnerability in in Role authority setting screen of Movable Type 7 r.4705 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.4705 and earlier (Movable Type Advanced 7 Series), Movable Type 6.7.5 and earlier (Movable Type 6.7 Series), Movable Type Premium 1.39 and ea...
CVE-2021-20664
PUBLISHED: 2021-03-05
Cross-site scripting vulnerability in in Asset registration screen of Movable Type 7 r.4705 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.4705 and earlier (Movable Type Advanced 7 Series), Movable Type 6.7.5 and earlier (Movable Type 6.7 Series), Movable Type Premium 1.39 and earlie...
CVE-2021-20665
PUBLISHED: 2021-03-05
Cross-site scripting vulnerability in in Add asset screen of Contents field of Movable Type 7 r.4705 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.4705 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.39 and earlier, and Movable Type Premium Advanced 1.39 and ear...