Edge computing & IoT

Cyber Resilience Act, a European regulation to ensure the cybersecurity of Edge Computing and IoT

Today, there are several regulations to secure connected objects in their use. Until now, the IoT was not secured as soon as it was produced, which created security weaknesses and therefore concerns about its development. But this time is soon over. A European regulation for cybersecurity in IoT and Edge Computing is about to be adopted. What is it? What is its purpose? We explain. The cybersecurity regulation in the IoT that may change everything Today's society is increasingly fond of new technologies, including an exaltation for connected objects. But the market is unfortunately not as controlled as it should be, and this in different areas of activity. The IoT sector is no exception. In search of cost savings, professionals or individuals favor the consumption of American or Chinese equipment. Where costs are lower but the transparency of the manufacturing process is rather opaque. Because of this lack of visibility, consumers have no control and are therefore subject to major risks. Once adopted, the Cyber Resilience Act, or European regulation for cyber resilience in the IoT, will have a major impact on the entire chain [...]

2024-01-09T15:29:05+01:00November 15, 2022|Headlines|0 comment

Edge computing and cybersecurity: beware of risks

On September 24, at the Microsoft Ignite conference, cybersecurity was in the spotlight! The company announced the pre-launch of a new tool: Azure Data Box Edge. Dedicated to connected objects, Microsoft's tool is a mini Data Center focused on edge computing. What is the interest of this solution? Since the emergence of connected objects, the collection and processing of data in complete security are more central than ever. From Cloud computing, companies have moved to Edge computing. What does this change mean? What are the consequences in terms of cybersecurity? Edge computing in the age of IoT What is edge computing? In a nutshell, it is an open distributed computing architecture. Data is not gathered and processed in one place. It is processed at the edge of the network, hence the term "edge". The goal is to process the data close to where it is produced. According to Cisco or Helder Antunes, it is impossible today to guarantee that the large amount of new data will be sent and processed in a fast or stable way to data centers. However, in certain industries, such as healthcare, telecommunications or finance, data must be processed quickly, even in real time. IT architects have therefore thought of a mesh network of micro Data Centers placed near the connected objects that would process the data as quickly as possible. [...]

2024-01-10T08:18:21+01:00October24,2018|Data, Digital, Risk management|0 comment
Go to top