• Welcome to the Online Discussion Groups, Guest.

    Please introduce yourself here. We'd love to hear from you!

    If you are a CompTIA member you can find your regional community here and get posting.

    This notification is dismissable and will disappear once you've made a couple of posts.
  • We will be shutting down for a brief period of time on 9/24 at around 8 AM CST to perform necessary software updates and maintenance; please plan accordingly!

Brianna White

Administrator
Staff member
Jul 30, 2019
4,655
3,454
Cybersecurity is all about protecting data, but it’s clear organizations need to make a greater effort to protect that data where it is, not where they’d like it to be or think it could end up. As more organizations are making the transition to edge computing, that’s where security needs to focus. However, moving security to the edge can be complicated, leaving many organizations hesitant to make the switch.
“Reading any recent Cybersecurity and Infrastructure Security Agency (CISA) vulnerability alert illustrates the challenges of managing our traditional attack surface; adversaries are having a field day exploiting known unpatched vulnerabilities,” said Rick Holland, chief information security officer, vice president strategy at Digital Shadows, in an email interview.
“Attack surface management is even more difficult as we transition to edge computing,” Holland added. “To effectively manage this new attack surface, defenders must discover assets, understand the sensitivity of data on those assets and be able to conduct configuration and vulnerability management on those assets.”
Continue reading: https://securityboulevard.com/2021/09/challenges-securing-the-edge/
 

Attachments

  • p0005047.m04715.canstockphoto33129846_770x300.jpg
    p0005047.m04715.canstockphoto33129846_770x300.jpg
    24.2 KB · Views: 44
  • Like
Reactions: Brianna White