Risk management

Edge computing and cybersecurity: beware of risks

On September 24, at the Microsoft Ignite conference, cybersecurity was in the spotlight! The company announced the pre-launch of a new tool: Azure Data Box Edge. Dedicated to connected objects, Microsoft's tool is a mini Data Center focused on edge computing. What is the interest of this solution? Since the emergence of connected objects, the collection and processing of data in complete security are more central than ever. From Cloud computing, companies have moved to Edge computing. What does this change mean? What are the consequences in terms of cybersecurity? Edge computing in the age of IoT What is edge computing? In a nutshell, it is an open distributed computing architecture. Data is not gathered and processed in one place. It is processed at the edge of the network, hence the term "edge". The goal is to process the data close to where it is produced. According to Cisco or Helder Antunes, it is impossible today to guarantee that the large amount of new data will be sent and processed in a fast or stable way to data centers. However, in certain industries, such as healthcare, telecommunications or finance, data must be processed quickly, even in real time. IT architects have therefore thought of a mesh network of micro Data Centers placed near the connected objects that would process the data as quickly as possible. [...]

2024-01-10T08:18:21+01:00October24,2018|Data, Digital, Risk management|0 comment

Risk Management: Cybersecurity must be at the heart of the global strategy

According to AMRAE (association du management des risques et assurances de l'entreprise), cybersecurity-related risks moved up from 7th place to the top 3 of risk managers' main concerns in 2017. This is hardly surprising: in recent years, the production, use and storage of data have become strategic topics for companies. With the digital transformation of companies, the issue of data security now affects all business lines, further multiplying the associated risks. In addition, regulatory pressure is forcing organizations to structure data protection, as was the case in May 2018 with the implementation of the RGPD. Also read: our article on the RGPD and sensitive data. Another growing phenomenon: cyberattacks, which are becoming increasingly frequent and taking on new forms, are using new vectors, to hack, destroy or kidnap data. With phenomenal speed of propagation, as we saw in 2017. Remember "WannaCry": this attack alone claimed 200,000 victims in 2 days, including the British healthcare system, Telefonica in Spain and Renault in [...]

2024-01-10T08:16:35+01:00July26, 2018|Data, Risk management|0 comment
Go to top