smarthub

admin

Top Challenges in IoT Security: Insights from Forrester’s 2024 Report

Article Solution Defend

In today’s hyper-connected world, where emerging threats lurk around every corner, securing Edge and IoT devices has never been more critical. Increase in global adoption of Edge / IoT devices is contributing to the rising cybercrime rates, as they become prime targets for cyberattacks. According to the recent Forrester report, the spotlight is on the […]

Top Challenges in IoT Security: Insights from Forrester’s 2024 Report Read More »

Unless you still live in the above analog world, you wouldn’t share the edge cybersecurity concerns that I am writing about.

Article

(Disclaimer: I still love the art & music of the above analog world!) This write-up is the first part of a five-part series that explains how to translate and use, the NIST Cybersecurity Framework (CSF) 2.0 to identify, manager and secure devices & data at the “edge” of your enterprise (outside of data centers). It

Unless you still live in the above analog world, you wouldn’t share the edge cybersecurity concerns that I am writing about. Read More »

Make securing your edge an essential part of your Continuous Threat Exposure Management (CTEM) program

Article

A recent Gartner® study, “Implement a Continuous Threat Exposure Management (CTEM) Program” revealed that enterprises fail at reducing their exposure to threats through self-assessment of risks because of unrealistic, siloed and tool-centric approaches. They recommend that the security and risk management leaders must initiate and mature a continuous threat exposure management program to stay ahead

Make securing your edge an essential part of your Continuous Threat Exposure Management (CTEM) program Read More »

Implementing NIST 2.0 for Edge IoT and OT: Part 2 – Identify

Article

In the latest installment of our series, we delve into the crucial “Identify” stage of NIST CSF 2.0 for edge IoT and OT assets. This stage focuses on building a comprehensive view of your edge landscape, essential for effective risk management and security. Key Points to note in translating the NIST CSF 2.0 for your

Implementing NIST 2.0 for Edge IoT and OT: Part 2 – Identify Read More »

Why Embrace Edge Computing in India: A Crucial Imperative

Article

In October 2017, when Ray O’Farrell appeared before a Congressional committee, little did he or the legislators realize the profound impact edge computing would have on the global tech landscape, including India. Yet, O’Farrell’s insights remain pertinent, especially in the context of India’s evolving digital landscape. The Congressional committee quizzed industry experts about emerging threats

Why Embrace Edge Computing in India: A Crucial Imperative Read More »

The Edge Pendulum

Article

Someone asked recently, is the edge pendulum swinging? I looked at the person surprised, because this strong trend has been unfolding for a few years now, evident by investments by large compute providers like hardware servers, suppliers of edge compute / gateways and edge software stack for the edge, like Redhat, who are all betting on

The Edge Pendulum Read More »

Concerns at the PhySec Edge…

Article

Further to Mark Morrison ‘s post on managing complexities in our connected environment, the complexities in our environment has seen a quantum leap in recent years. Even something that we take for granted, in our everyday world, #physicalsecurity, has seen a huge change in technologies that are deployed to keep us all safe. Learning from several professionals in

Concerns at the PhySec Edge… Read More »

Got Edge ?

Article

This is not about all the edges in human existence, that’s another post coming soon, a prequel.  This one is about raising awareness to the fact we need awareness about all the devices in our lives – at the edge of our peripheral vision. If you have a role related to #security, #safety of assets (physical

Got Edge ? Read More »

Edge Technology Trends for Museums

Article News Solution Infer

In an era where technology is rapidly transforming every aspect of our lives, museums stand at a unique crossroads. These venerable institutions, traditionally seen as bastions of history and culture, have an unprecedented opportunity to harness cutting-edge technologies to enhance their mission. Here’s why embracing these technologies is not just beneficial, but essential for museums

Edge Technology Trends for Museums Read More »

Navigating the Complexities of Zero Trust architecture & computing, for Distributed Energy Resources (DERs)

Solution Energy

According to analysts, the global DER market is estimated to reach around $500m USD+ by 2028. This massive growth means there are more Edge endpoints that have to be monitored, managed  & secured across its lifecycle. More attack surface/endpoints = more cybersecurity risks for Utility companies. Sometime back, I had given a presentation to several delegates on Zero

Navigating the Complexities of Zero Trust architecture & computing, for Distributed Energy Resources (DERs) Read More »