Cyber Defense eMagazine October Edition for 2021
Cyber Defense eMagazine October Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES #CYBERSECURITYAWARENESSMONTH
Cyber Defense eMagazine October Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES #CYBERSECURITYAWARENESSMONTH
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Our industry has developed standard requirements of physical security, software security, access control,<br />
etc., that tend to be rolled up into a series of compliance schemes. These compliance programs<br />
absolutely apply in the era of edge computing and edge data centers.<br />
The edge tends to conjure up the image of an outdated server living in a remote office (perhaps shoved<br />
in a corner under a dusty desk). This is no longer true. Rather, massive deployments of hardware<br />
enabling real-time, low-latency experiences (regardless of geographic region) are becoming increasingly<br />
normal and, I would assert, will become more prevalent in the future.<br />
Your current compliance knowledge and your current expertise remains relevant. There are new<br />
concepts to learn, of course, and new considerations as data proliferates across the edge in global<br />
footprints. But the basis remains the same. It’s extremely important that the tools adopted in edge<br />
deployments support your desire to stay compliant with data regulations.<br />
When choosing a vendor, ensure that you have the required controls to define what data and events are<br />
cached, stored, and processed. And, given a global deployment, you are able to define this on a perregion<br />
basis. When the internal compliance requirements are met, and appropriate certifications are<br />
obtained, edge deployments enable a variety of new and exciting capabilities not yet feasible.<br />
With the basics achieved, what becomes even more interesting is what edge deployment paradigms<br />
mean <strong>for</strong> the security and compliance workflow offered by companies.<br />
First, it’s important to understand that these edge deployments are done to extend capabilities while also<br />
providing a fast round-trip response time. Today, it’s absolutely possible to achieve a P90 round trip<br />
latency of less than 50ms globally. This speed, when coupled with data controls, powers exciting new<br />
capabilities.<br />
Consider, <strong>for</strong> example, real-time event correlation.<br />
In a globally-deployed environment, you’re able to offer workflows that can detect complex event patterns<br />
and isolate threats across multiple nodes in real time. In an industry like financial services, the ability to<br />
offer both real-time decisioning and real-time compliance are dependent on strict event correlation. You<br />
can also imagine this being broadly applicable to FINRA compliance that requires mandatory reporting<br />
of communications and over-the-counter transactions.<br />
As another example, think about real-time threat & anomaly detection<br />
.<br />
At first glance, it may seem to be a subset of the above, but the ability to per<strong>for</strong>m real-time detection of<br />
complex event patterns and threat isolation enables security alerting in a powerful new fashion. Data<br />
manipulation functions are used to spot early trends or patterns in data and prevent or quickly respond<br />
to business opportunities and threats.<br />
<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>October</strong> <strong>2021</strong> <strong>Edition</strong> 68<br />
Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.