[ This article was originally published here ]
RSAC 2023 was a huge success. We launched our , which was met with enthusiasm by the industry and the media. In fact, Will Townsend, , noted that our report joined other great research by industry peers who are striving to do more than just provide security solutions.
“RSAC 2023 could be best characterized by its emphasis on the advantages and disadvantages of AI and numerous published cybersecurity reports designed to raise awareness of threats and subsequent remediation, in addition to cybersecurity platform enhancements. These subjects are a definite departure from the past few RSAC events, which seemed to be zero-trust “me too” conventions. It is a welcome change, given that the emphasis on improving security outcomes benefits everyone.”
Townsend perfectly captures the AT&T Cybersecurity mission to help business leaders understand both the business and security landscape – and how it’s evolving as technology continues to change the way we work and live. After listening to the challenges organizations are encountering, it’s clear that research and understanding the business landscape are essential parts of a responsible cybersecurity vendor strategy.
DDoS versus ransomware – how does edge computing change the equation?
I participated in a panel discussion hosted by Channel Futures examining the challenges of securing critical infrastructure. The discussion kicked off with a Gartner , “by 2025, 30% of critical infrastructure organizations will experience a security breach resulting in the halting of operations and/or mission-critical cyber-physical system.,” I spoke about our research findings that indicate a change in perceived attacks: when it comes to edge computing, DDoS is perceived as a greater attack concern than ransomware.
“One of the reasons cybercriminals are gravitating to is it’s cheaper and easier than ransomware.” Read more >>
I did a video interview with discussing how edge computing and innovative use cases are changing the way we’re dealing with cyber resilience.
“Organizations are investing in the edge but they also know that their endpoints are changing,” said Lanowitz. “They want to make sure they are futureproofing themselves and going to be dynamic in their cyber resilience. That’s because the security edge is not linear or a straight line. It’s a circuitous, often confusing, and an often-changing environment that you will have to live with.”
Watch the webcast discussing the AT&T Cybersecurity Insights Report findings.
If you prefer to listen to the research results, for you. Along with my colleague, Mark Freifeld, I take you through the characteristics of edge computing, the challenges edge computing creates because it’s so different from traditional computing, and key takeaways to help you develop your edge computing security strategy.
Here are a few highlights of other coverage that provide context for our research findings.
Articles
- Channel Futures:
- Dark Reading:
- Help Net Security: (paid media initiative)
- The CyberWire Daily Newsletter:
- Beta News, Ian Barker:
- BankInfoSecurity:
Podcasts
- The CyberWire Daily Podcast:
Video
- Techstrong TV:
- SC Media:
- BizTalks:
Finally, we have that provides a graphic look at the results and recommendations. If you have questions about the study, let me know! The best way to get my attention is via .
Ad