smarthub

admin

Make securing your edge an essential part of your Continuous Threat Exposure Management (CTEM) program

Article

A recent Gartner® study, “Implement a Continuous Threat Exposure Management (CTEM) Program” revealed that enterprises fail at reducing their exposure to threats through self-assessment of risks because of unrealistic, siloed and tool-centric approaches. They recommend that the security and risk management leaders must initiate and mature a continuous threat exposure management program to stay ahead […]

Make securing your edge an essential part of your Continuous Threat Exposure Management (CTEM) program Read More »

Why Embrace Edge Computing in India: A Crucial Imperative

Article

(Spoiler Alert: This may not answer all your questions, but may help you ask more questions) When Ray O’Farrell appeared before a Congressional committee in October 2017, little did he (or the legislators) imagine that our world would turn out the way it did, in just a few years. But he had made some interesting statements about

Why Embrace Edge Computing in India: A Crucial Imperative Read More »

The Edge Pendulum

Article

Someone asked recently, is the edge pendulum swinging? I looked at the person surprised, because this strong trend has been unfolding for a few years now, evident by investments by large compute providers like hardware servers, suppliers of edge compute / gateways and edge software stack for the edge, like Redhat, who are all betting on

The Edge Pendulum Read More »

Got Edge ?

Article

This is not about all the edges in human existence, that’s another post coming soon, a prequel.  This one is about raising awareness to the fact we need awareness about all the devices in our lives – at the edge of our peripheral vision. If you have a role related to #security, #safety of assets (physical

Got Edge ? Read More »

Edge Technology Trends for Museums

Article News Solution Infer

In an era where technology is rapidly transforming every aspect of our lives, museums stand at a unique crossroads. These venerable institutions, traditionally seen as bastions of history and culture, have an unprecedented opportunity to harness cutting-edge technologies to enhance their mission. Here’s why embracing these technologies is not just beneficial, but essential for museums

Edge Technology Trends for Museums Read More »

Navigating the Complexities of Zero Trust architecture & computing, for Distributed Energy Resources (DERs)

Solution Energy

According to analysts, the global DER market is estimated to reach around $500m USD+ by 2028. This massive growth means there are more Edge endpoints that have to be monitored, managed  & secured across its lifecycle. More attack surface/endpoints = more cybersecurity risks for Utility companies. Sometime back, I had given a presentation to several delegates on Zero

Navigating the Complexities of Zero Trust architecture & computing, for Distributed Energy Resources (DERs) Read More »

ZEROTRUST FOR EDGE USING CERTIFICATEMANAGEMENT

Solution Defend

Our customers often ask us about Certificate Management for their Edge endpoints and it is interesting to see why they want to roll out certificate management for their Edge devices. In our mind, bringing Zero Trust paradigm to Edge Infrastructure is critical to cybersecurity at the Edge. Fundamentally, we believe that ZeroTrust principles for Edge

ZEROTRUST FOR EDGE USING CERTIFICATEMANAGEMENT Read More »

Two-Face CyberSecurity Posture in Enterprises Today…

Solution Defend

The security posture in enterprises is such a dichotomy! On one hand, Infosec teams, CISOs, CIOs, etc spend a lot of time, effort and rigor to come up with policies, processes & put systems in place to manage vulnerability and cybersecurity risks. However, most of it is focused on connected IT assets/assets owned by IT

Two-Face CyberSecurity Posture in Enterprises Today… Read More »

Enhancing Cyber Security of the Complex Edge: Challenges and Strategies

Uncategorized

“Global cybercrime damage costs are expected to reach USD 10.5 trillion by 2025.” – Forbes. The primary emerging priority for CISOs of late revolves around securing digital assets against cyber-attacks. As the number of devices and sensors continues to proliferate, alongside the rise of edge computing, the focus of safeguarding these assets—and the attention of potential

Enhancing Cyber Security of the Complex Edge: Challenges and Strategies Read More »