The Edge Is A Hacker’s Delight, A Dream Come True For Cybercriminals

The Edge Is A Hacker's Delight, A Dream Come True For Cybercriminals

Cybersecurity Ventures predicts that the world will store 200 zettabytes of data in 2025. Half of enterprise data will be produced and processed at the edge within this year, according to Control Engineering.

This poses some serious security challenges. After 15 years of robust investment in the cloud, we have a well-established foundation of cloud security and centralized data protection. By comparison, the edge is still the Wild West, riddled with vulnerabilities that you should be concerned about, writes Srinivas Shekar, Founder and CEO at Bengaluru, India-based Pantherun Technologies, in a recent Forbes article.

Shekar, a data protection advocate, calls the edge a hacker’s delight. a dream come true for cybercriminals, with potentially terrifying consequences. Bad actors could take over a Jeep remotely with a cell phone, drive away with a Tesla Model 3 using simple hacking tools, or open, start and track connected vehicles from Kia, Skoda, Toyota and many other makers.

It doesn’t stop with autos. Commercial drones, ATMs, medical devices, remote cameras, control system devices for water, oil and gas infrastructure, are all at risk.

What’s an enterprise to do? Step up their encryption game, urges Shekar. To avoid becoming the next headline, businesses and government institutions must extend robust security to their edge operations. All data collected, processed, transmitted or stored by edge devices must be securely encrypted without introducing significant latency that could compromise performance.

Read the Full Story



Source link