The security posture in enterprises is such a dichotomy!
On one hand, Infosec teams, CISOs, CIOs, etc spend a lot of time, effort and rigor to come up with policies, processes & put systems in place to manage vulnerability and cybersecurity risks. However, most of it is focused on connected IT assets/assets owned by IT Teams – Laptops, Servers, Mobile devices, etc.
On the other hand, the people who have large edge infrastructure footprint is OT (Operational Teams). On a day-to-day basis, we are shocked to see how some of the most advanced companies ignore the security & continuous threat monitoring (CTM) of non-IT owned edge endpoints connected to their network.
You can’t build a strong fort while half of it is weak. Do something about it! Your Edge security posture is as strong as your weakest link!