DIGITAL ATTACKS: Staying secure behind a cybersecurity mesh | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware


Tech industry has a penchant for coming up with unique buzzwords every now and then; in the realm of cybersecurity, first it was Zero Trust, a security framework requiring all users to be authenticated, authorised, and continuously validated for security configuration before being granted or keeping access to apps and data.


Cut to present. The digital transformation of the global economy is significantly increasing the number of potential attack surfaces. In such a scenario, the latest buzzword doing the rounds is cybersecurity mesh, or cybersecurity mesh architecture (CSMA). A recent report released by Gartner stated, “By 2024, organisations adopting a cybersecurity mesh architecture to integrate security tools to work as a collaborative ecosystem will reduce the financial impact of individual security incidents by an average of 90%.”


A new approach to security


Vijendra Katiyar, country manager, India & SAARC, Trend Micro, a leading player in data security and cybersecurity solutions, says cybersecurity mesh is a collaborative ecosystem of tools and controls to secure a modern and distributed enterprise. “It’s a term that has been around for quite a long time but has gained popularity and is a hot topic of discussion in the industry these days,” says Katiyar.


Also read: Google, Microsoft big tech layoffs, Samsung Galaxy A14 5G India launch, new Twitter rules and more | FE Tech Bytes top news of the week


Cybersecurity mesh architecture helps provide a common, integrated security structure and posture to secure all assets, whether they’re on-premises, in data centres or in the cloud. It is gaining popularity as the current rate of digital acceleration and the rise of hybrid workspaces have rendered traditional network infrastructure obsolete, posing the most difficult challenge for businesses, he says. Data is becoming less centralised due to the multi-cloud ..

Support the originator by clicking the read the rest link below.