Cybersecurity at the Edge

Cybersecurity at the Edge

Cybersecurity at the Edge

Published on November 1, 2019

David Smith
Chief Executive of Global Futures and Foresight, Futurist, Strategist and Keynote Speaker

The future of computing lies at the edge of networks, such as with IoT linked devices and infrastructure. While today only about 20 percent of enterprise data is being produced and processed outside of centralised datacentres, by 2025, that is expected to rise to 75 percent and could reach 90 percent[i].  

These forecasts, if realised, would imply even handheld devices will have AI capabilities built into them without outsourcing the heavy lifting to large servers, something that would otherwise be next to impossible.’ All data could therefore be processed in near real-time, at the edge of networks such as the IoT. Information technology strategies, consumer behaviour and the architecture within which to operate would all shift as a result, some in unpredictable ways as the edge economy potentially approaches $4.1Tn by 2030[ii]. As it grows in prominence, so will cybersecurity issues associated with it.

I.T ecosystems will increasingly need to exist ‘out there’ – at the edge- rather than within the organisational walls. With most IoT using organisations having limited visibility to their network, let alone their exposure to IoT cyber risk, new standards will likely be needed. Security and privacy controls will need to be built at the edge and intrinsically part of every device and network. Where possible security will have to be inbuilt into the edge device itself, which brings up some potentially interesting collaboration models and partnership possibilities.

Edge computing will also bring about significant changes to organisational IT architecture[iii]. Given both the networked nature of the edge, the likely creation of ecosystems around edge data, and the increasingly intertwined nature of IT systems, approaching edge cybersecurity at the ecosystem level is increasingly necessary to protect potentially weaker links in the cybersecurity chain, such as third parties.

71 percent of CEOs already state that they see information security as a strategic function and a source of competitive advantage[iv]. However, data breaches could potentially reach $5Tn yearly by 2024[v], complicated by edge technology ‘…as dependency on complex internet-enabled business models outpaces the ability to introduce adequate safeguards that protect critical assets[vi].’ If infosec strategy is to thrive in an edge era, new security and data architectures that span multiple organisations and even industries will need to emerge. Until then it is likely that organisations will have to impose ‘…zero trust concepts where they can’t trust the network, have to authenticate use, and have to understand what data is actually resident there[vii],’ and plan for the fact that the edge is dynamic. As with other technologies, organisational change would seem a must if edge yields are to accumulate effectively.

[i] https://searchcio.techtarget.com/feature/The-shift-to-edge-computing-is-happening-fast-heres-why

[ii] https://www.fiercewireless.com/wireless/edge-internet-economy-to-reach-4-1t-by-2030-analyst

[iii] https://searchcio.techtarget.com/feature/Edge-computing-architecture-takes-on-a-partner-ecosystem

[iv] https://home.kpmg/xx/en/blogs/home/posts/2019/09/cyber-as-a-competitive-advantage.html

[v] https://www.siliconrepublic.com/enterprise/data-breaches-cost-2024-juniper-research

[vi] https://www.raconteur.net/technology/cybercrime-business

[vii] https://www.information-age.com/cyber-security-for-iot-and-edge-computing-123485616/


Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Translate »