smarthub

Blogs

Navigating the Complexities of Zero Trust architecture & computing, for Distributed Energy Resources (DERs)

Blogs Solution Energy

According to analysts, the global DER market is estimated to reach around $500m USD+ by 2028. This massive growth means there are more Edge endpoints that have to be monitored, managed  & secured across its lifecycle. More attack surface/endpoints = more cybersecurity risks for Utility companies. Sometime back, I had given a presentation to several delegates on Zero […]

Navigating the Complexities of Zero Trust architecture & computing, for Distributed Energy Resources (DERs) Read More »

ZEROTRUST FOR EDGE USING CERTIFICATEMANAGEMENT

Blogs Solution Defend

Our customers often ask us about Certificate Management for their Edge endpoints and it is interesting to see why they want to roll out certificate management for their Edge devices. In our mind, bringing Zero Trust paradigm to Edge Infrastructure is critical to cybersecurity at the Edge. Fundamentally, we believe that ZeroTrust principles for Edge

ZEROTRUST FOR EDGE USING CERTIFICATEMANAGEMENT Read More »

Two-Face CyberSecurity Posture in Enterprises Today…

Blogs Solution Defend

The security posture in enterprises is such a dichotomy! On one hand, Infosec teams, CISOs, CIOs, etc spend a lot of time, effort and rigor to come up with policies, processes & put systems in place to manage vulnerability and cybersecurity risks. However, most of it is focused on connected IT assets/assets owned by IT

Two-Face CyberSecurity Posture in Enterprises Today… Read More »

Enhancing Cyber Security of the Complex Edge: Challenges and Strategies

Blogs

“Global cybercrime damage costs are expected to reach USD 10.5 trillion by 2025.” – Forbes. The primary emerging priority for CISOs of late revolves around securing digital assets against cyber-attacks. As the number of devices and sensors continues to proliferate, alongside the rise of edge computing, the focus of safeguarding these assets—and the attention of potential

Enhancing Cyber Security of the Complex Edge: Challenges and Strategies Read More »