Currently the cybersecurity is reactive. It reacts to the presence of certain signatures in the operating system, applications, middleware, protocols, frameworks and networks. When these signatures are detected, the appropriate patches are applied to plug the vulnerabilities represented by the signatures.

In this reactive approach, the initiative remains with the attacker. The defense is reactive to what the attacker does. And there is always a time lag between the initiative by the attacker and the construction of the corresponding signatures.

This is not a winning strategy.

Cybersecurity has taken many directions, trends, and new ideas. But this scenario has not changed, the strategy remain a strategy that is not a winning strategy.

In human based decision making, the law enforcement preempts the offender, and arrests the offender before the offence has taken place.

In cybersecurity, we need such a strategy. This would preempt the attacker. It would stop the attack before it begins.

Choudhary Associates in Bowie, MD, have a product that can accomplish this. That constitutes a winning strategy. The details and operations are proprietary. They cannot be disclosed. But the product can be demonstrated in operational scenarios.

Who do you think is a potential customer? How do you think the product can be marketed (currently there is no sales and marketing budget).

Would you be willing to invest in further development, marketing and sales? Who would be interested? Who could be a financier?

More Abdur Rahim Choudhary's questions See All
Similar questions and discussions