Locking down the edge The Register

Review and manage your consent Here's an overview of our use of cookies, similar technologies and how to manage them.
The attack surface is expanding as more operational functions migrate out of centralized locations and into distributed sites and devices.
With increasing numbers of organizations choosing to host data at their fringes, the network edge is more vulnerable than ever without the right protection.
Just think how many more risks data faces in, say, an airport, a factory, a power plant or a hospital compared with a heavily defended datacenter backed by robust access controls.
Long supply chains which also span edge locations, perhaps involving multiple partners and contractors, can create added risk.
While many vertical sectors such as healthcare, energy and manufacturing present edge-related security vulnerabilities, they can simultaneously lack the expert and dedicated IT security professionals usually resident in head offices and centralized hosting facilities.
Any serious data breach at the edge has the potential to result in a heavy price for the organization affected.
Edge breaches can also have an immediate negative impact on ordinary people's lives, perhaps more so than with other types of security incident, due to the instant disruption to their data flow.
With additional regulatory and data protection implications to consider, it's clear that edge locations need a high level of cyber security protection.
If you want to learn about these challenges and possible solutions in more detail, Dell Technologies has developed a webinar presented by Jeroen Mackenbach, Technical Staff with the company's Infrastructure Solutions Group Edge Portfolio.
Mackenbach describes a need to reimagine edge protection, outlining a Zero Trust approach where nothing and nobody is automatically trusted, and all devices must be constantly verified.
He believes that edge security must operate at massive scale, while a successful Zero Trust strategy needs complete visibility of all data and devices at all times.
Automation is equally key to maintaining adequate protection and keeping the security management overhead to a minimum.
The webinar maps out the role of Dell's NativeEdge platform in restoring trust at the edge, reducing attack surfaces and bringing that visibility and automation to the party.


This Cyber News was published on go.theregister.com. Publication date: Wed, 06 Dec 2023 16:43:05 +0000


Cyber News related to Locking down the edge The Register

Edge Computing: Data and Connectivity - Edge computing is a distributed computing model that brings processing capabilities closer to the data source, be it IoT devices, sensors, or end-user devices, rather than relying on centralized data centers. By decentralizing data processing, edge ...
6 months ago Feeds.dzone.com
Edge Computing: Enhancing Data Processing - Edge computing revolutionizes data processing by bringing computational power closer to where data is generated, enhancing efficiency and responsiveness. Discover how edge computing is reshaping technology and our interactions with it, unlocking a ...
3 months ago Securityzap.com
CVE-2013-0135 - Multiple SQL injection vulnerabilities in PHP Address Book 8.2.5 allow remote attackers to execute arbitrary SQL commands via the id parameter to (1) addressbook/register/delete_user.php, (2) addressbook/register/edit_user.php, or (3) ...
6 years ago
10 Best Security Service Edge Solutions - Security Service Edge is an idea in cybersecurity that shows how network security has changed over time. With a focus on customized solutions, Security Service Edge Solutions leverages its expertise in multiple programming languages, frameworks, and ...
4 months ago Cybersecuritynews.com
CVE-2024-26624 - In the Linux kernel, the following vulnerability has been resolved: ...
3 months ago
CVE-2024-26732 - In the Linux kernel, the following vulnerability has been resolved: net: implement lockless setsockopt(SO_PEEK_OFF) syzbot reported a lockdep violation [1] involving af_unix support of SO_PEEK_OFF. Since SO_PEEK_OFF is inherently not thread safe (it ...
3 months ago Tenable.com
CVE-2024-38589 - In the Linux kernel, the following vulnerability has been resolved: netrom: fix possible dead-lock in nr_rt_ioctl() syzbot loves netrom, and found a possible deadlock in nr_rt_ioctl [1] Make sure we always acquire nr_node_list_lock before ...
2 weeks ago Tenable.com
CVE-2017-17713 - Trape before 2017-11-05 has SQL injection via the /nr red parameter, the /nr vId parameter, the /register User-Agent HTTP header, the /register country parameter, the /register countryCode parameter, the /register cpu parameter, the /register isp ...
6 years ago
CVE-2017-17714 - Trape before 2017-11-05 has XSS via the /nr red parameter, the /nr vId parameter, the /register User-Agent HTTP header, the /register country parameter, the /register countryCode parameter, the /register cpu parameter, the /register isp parameter, ...
6 years ago
CVE-2023-52780 - In the Linux kernel, the following vulnerability has been resolved: net: mvneta: fix calls to page_pool_get_stats Calling page_pool_get_stats in the mvneta driver without checks leads to kernel crashes. First the page pool is only available if the bm ...
1 month ago Tenable.com
Locking down the edge The Register - Review and manage your consent Here's an overview of our use of cookies, similar technologies and how to manage them. The attack surface is expanding as more operational functions migrate out of centralized locations and into distributed sites and ...
6 months ago Go.theregister.com
Locking down the edge The Register - Review and manage your consent Here's an overview of our use of cookies, similar technologies and how to manage them. The attack surface is expanding as more operational functions migrate out of centralized locations and into distributed sites and ...
5 months ago Go.theregister.com
SUSE announces new enhancements to help users manage business-critical workloads - SUSE announced enhancements across its cloud native and Edge portfolio to enable customers to securely deploy and manage business-critical workloads anywhere. New capabilities in Rancher Prime 3.0, SUSE's commercial offering of Rancher and SUSE Edge ...
3 months ago Helpnetsecurity.com
CVE-2024-26781 - In the Linux kernel, the following vulnerability has been resolved: mptcp: fix possible deadlock in subflow diag Syzbot and Eric reported a lockdep splat in the subflow diag: WARNING: possible circular locking dependency detected ...
3 months ago Tenable.com
Integrated Industrial Edge Compute - The future of edge compute is more like a locomotive with a predictable future. In early 2023 Grand View Research identified that the edge compute market had grown from $1.9B in 2020 to $11.24B in 2022. These edge compute numbers may explain my ...
7 months ago Feedpress.me
CVE-2022-48719 - In the Linux kernel, the following vulnerability has been resolved: ...
2 weeks ago
CVE-2021-47169 - In the Linux kernel, the following vulnerability has been resolved: ...
3 months ago
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
6 months ago Esecurityplanet.com
CVE-2021-47598 - In the Linux kernel, the following vulnerability has been resolved: ...
2 weeks ago
Should You Shut Down Your Computer Every Night? - Although PCs benefit from an occasional reboot, it's not necessary to turn off your computer every night. The decision to let your computer sleep vs. shut down depends on considerations such as the device's age, your usage habits, and whether you ...
5 months ago Pandasecurity.com
CVE-2024-26706 - In the Linux kernel, the following vulnerability has been resolved: parisc: Fix random data corruption from exception handler The current exception handler implementation, which assists when accessing user space memory, may exhibit random data ...
3 months ago Tenable.com
CVE-2023-52598 - In the Linux kernel, the following vulnerability has been resolved: ...
3 months ago
New Relic warns customers it's experienced a cyber incident The Register - Web tracking and analytics outfit New Relic has issued a scanty security advisory warning customers it has experienced a scary cyber something. "We value our New Relic community and want to make our customers aware of a recent cyber security incident ...
7 months ago Theregister.com
Vulnerability Summary for the Week of March 4, 2024 - Published 2024-03-06 CVSS Score not yet calculated Source & Patch Info CVE-2023-52584416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67 PrimaryVendor - ...
3 months ago Cisa.gov
Microsoft Edge to Use Adobe Acrobats PDF Rendering Technology - Microsoft and Adobe have joined forces to incorporate Adobe Acrobat's PDF rendering engine directly into the Edge browser, replacing the existing PDF engine. Starting in March 2023, new versions of Microsoft Edge for Windows 10 and Windows 11 will be ...
1 year ago Bleepingcomputer.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)