01.10.2021 Views

Cyber Defense eMagazine October Edition for 2021

Cyber Defense eMagazine October Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES #CYBERSECURITYAWARENESSMONTH

Cyber Defense eMagazine October Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES #CYBERSECURITYAWARENESSMONTH

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Our industry has developed standard requirements of physical security, software security, access control,<br />

etc., that tend to be rolled up into a series of compliance schemes. These compliance programs<br />

absolutely apply in the era of edge computing and edge data centers.<br />

The edge tends to conjure up the image of an outdated server living in a remote office (perhaps shoved<br />

in a corner under a dusty desk). This is no longer true. Rather, massive deployments of hardware<br />

enabling real-time, low-latency experiences (regardless of geographic region) are becoming increasingly<br />

normal and, I would assert, will become more prevalent in the future.<br />

Your current compliance knowledge and your current expertise remains relevant. There are new<br />

concepts to learn, of course, and new considerations as data proliferates across the edge in global<br />

footprints. But the basis remains the same. It’s extremely important that the tools adopted in edge<br />

deployments support your desire to stay compliant with data regulations.<br />

When choosing a vendor, ensure that you have the required controls to define what data and events are<br />

cached, stored, and processed. And, given a global deployment, you are able to define this on a perregion<br />

basis. When the internal compliance requirements are met, and appropriate certifications are<br />

obtained, edge deployments enable a variety of new and exciting capabilities not yet feasible.<br />

With the basics achieved, what becomes even more interesting is what edge deployment paradigms<br />

mean <strong>for</strong> the security and compliance workflow offered by companies.<br />

First, it’s important to understand that these edge deployments are done to extend capabilities while also<br />

providing a fast round-trip response time. Today, it’s absolutely possible to achieve a P90 round trip<br />

latency of less than 50ms globally. This speed, when coupled with data controls, powers exciting new<br />

capabilities.<br />

Consider, <strong>for</strong> example, real-time event correlation.<br />

In a globally-deployed environment, you’re able to offer workflows that can detect complex event patterns<br />

and isolate threats across multiple nodes in real time. In an industry like financial services, the ability to<br />

offer both real-time decisioning and real-time compliance are dependent on strict event correlation. You<br />

can also imagine this being broadly applicable to FINRA compliance that requires mandatory reporting<br />

of communications and over-the-counter transactions.<br />

As another example, think about real-time threat & anomaly detection<br />

.<br />

At first glance, it may seem to be a subset of the above, but the ability to per<strong>for</strong>m real-time detection of<br />

complex event patterns and threat isolation enables security alerting in a powerful new fashion. Data<br />

manipulation functions are used to spot early trends or patterns in data and prevent or quickly respond<br />

to business opportunities and threats.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>October</strong> <strong>2021</strong> <strong>Edition</strong> 68<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!