“Global cybercrime damage costs are expected to reach USD 10.5 trillion by 2025.” – Forbes The primary emerging priority for CISOs of late revolves around securing digital assets against cyber-attacks. As the number of devices and sensors continues to proliferate, … Read More
Alerts & Actions
Enhancing Cyber Security of the Complex Edge: Challenges and Strategies
Security Systems: Insecure?
An excellent timely post by Geoff Kohl in the SIA Newsletter. Great advice for Physical Security practitioners. Here’s a quick summary (with my comments bulletised): Imagine having to confess (in headline news) that a former employee was able to get into … Read More
Implementing NIST 2.0 (For the OT Implementors) Part 2/5 – “Identify”: CSF 2.0 for your Edge Landscape – Identify / Inventory
Part 1 Recap: Expanding Risk Management for the Growing Edge In my last post, we discussed how NIST CSF 2.0 goes beyond cybersecurity risks to encompass a broader spectrum of threats to an organization, essentially defining and managing risks. These … Read More
Implementing NIST 2.0 for the business ops folks out there – (1/5)
If your enterprise lives in the kind of retro-analog-world in the picture, you have nothing to worry. For the rest of us, enterprise mortals, the edge in all its glorious innovations is helping us with new experiences, new models of … Read More
Navigating the Digital Experience (DEX) Revolution: The Path to Seamless Automation using AIoT
In today’s hyper-digital world, delivering exceptional user experiences is more critical than ever. We are at the crossroads of physical and digital realities, where everyday interactions are increasingly powered by digital tools. As the Internet of Things (IoT) and Artificial … Read More
Top Challenges in IoT Security: Insights from Forrester’s 2024 Report
In today’s hyper-connected world, where emerging threats lurk around every corner, securing Edge and IoT devices has never been more critical. Increase in global adoption of Edge / IoT devices is contributing to the rising cybercrime rates, as they become … Read More
Make securing your edge an essential part of your Continuous Threat Exposure Management (CTEM) program
A recent Gartner® study, “Implement a Continuous Threat Exposure Management (CTEM) Program” revealed that enterprises fail at reducing their exposure to threats through self-assessment of risks because of unrealistic, siloed and tool-centric approaches. They recommend that the security and risk … Read More
Why Embrace Edge Computing in India: A Crucial Imperative
(Spoiler Alert: This may not answer all your questions, but may help you ask more questions) When Ray O’Farrell appeared before a Congressional committee in October 2017, little did he (or the legislators) imagine that our world would turn out the way … Read More
The Edge Pendulum
Someone asked recently, is the edge pendulum swinging? I looked at the person surprised, because this strong trend has been unfolding for a few years now, evident by investments by large compute providers like hardware servers, suppliers of edge compute / … Read More
Concerns at the PhySec Edge…
The complexities in our environment have seen a quantum leap in recent years. Even something that we take for granted, in our everyday world, physical security, has seen a huge change in technologies that are deployed to keep us all … Read More