John Martin, CISSP-ISSAP, CISM
Richard Nealon, CISSP-ISSMP, SSCP, SCF
In part one of this blog series, we discussed privacy, remote access (aka Work from Home), insider threats, data leakage, Zero Trust Architecture (ZTA) and security architecture. To continue this discussion, we believe that 2021 will still see folks working from home; thus, the risks due to insider threats and data leakage will continue to grow. However, we believe that there are other concerns for information security professionals, including edge computing, 5G, IoMT/IoT, AI and ransomware.
Edge Computing is a distributed computing framework that brings enterprise applications closer to data sources such as IoT devices or local edge servers. This proximity to data at its source can deliver strong business benefits, including faster insights, improved response times and better bandwidth availability. Gartner estimates that by 2025, 75% of data will be processed outside the traditional data center or even cloud platforms. Sending all that device-generated data to a centralized data center or to the cloud causes bandwidth and latency issues. Edge computing offers a more efficient alternative. Data is processed and analysed closer to the point where it is created. Because data does not transverse over a network to a cloud or data center to be processed, latency is significantly reduced.
Some of the issues to be faced are likely to be machine to machine communication, as well as person to machine communication. Can we trust the authentication capabilities from a machine to another machine to actually exchange information securely? This means Zero T ..