On a razor’s edge
 
John E. Kaye
- Published
- Home, Technology


Though there are many potential advantages, organisations must see the dangers in edge computing writes Steve Durbin, Managing Director of Information Security Forum
The requirement for real-time data processing and analysis will soon drive businesses to adopt edge computing in order to ease latency and increase connectivity between devices. However, adopters will unintentionally bring about a renaissance of neglected security issues. Poorly secured edge computing environments will create multiple points of failure, and a lack of security oversight will allow attackers to significantly disrupt operations.
Organisations in industries such as manufacturing, utilities, or those using Internet of Things (IoT) and robotics, will be dependent upon edge computing to connect their ever-expanding technical infrastructure. However, many will not have the visibility, security or analysis capabilities that have previously been linked with cloud service providers – information risks will be transferred back within the purview of the organisation. Attackers will exploit security blind spots, targeting devices on the outside edge of the network environment. Operational capabilities will be crippled by sophisticated malware attacks, with companies suffering periods of substantial downtime and financial damage.
Poor implementation of edge computing solutions will leave organisations open to attack. Nation states, hacking groups, hacktivists and terrorists aiming to disrupt operations will target edge computing devices, pushing security to the brink of failure.
What is the reasoning for this threat?
As the world moves into the fourth industrial revolution, the requirement for high-speed connectivity, real-time data processing and analytics will be increasingly important for business and society. With the combined IoT market size projected to reach $520bn by 2021, the development of edge computing solutions alongside 5G networks will be essential to provide near-instantaneous network speed and to underpin computational platforms close to where data is created.
The transition of processing from cloud platforms to edge computing will be a requirement for organisations demanding speed and significantly lower latency between devices. With potential use cases of edge computing ranging from real-time maintenance in vehicles, to drone surveillance in defense and mining, to health monitoring of livestock, securing this architecture will be a priority.
With edge computing solutions, security blind spots will provide attackers with an opportunity to access vital operational data and intellectual property. Moreover, organisations will be particularly susceptible to espionage and sabotage from nation states and other adversarial threats. Edge computing environments, by their nature, are decentralised and unlikely to benefit from initiatives such as security monitoring. Many devices sitting within this type of environment are also likely to have poor physical security while also operating in remote and hostile conditions. This creates challenges in terms of maintaining these devices and detecting any vulnerabilities or breaches.
Businesses that adopt edge computing will see an expansion of their threat landscape. With many organisations valuing speed and connectivity over security, the vast number of IoT devices, robotics and other technologies operating within edge computing environments will become unmanageable and hard to secure.
Edge computing will underpin critical national infrastructure (CNI) and many important services, reinforcing the necessity to secure them against a range of disruptive attacks and accidental errors. Failures in edge computing solutions will result in financial loss, regulatory fines and significant reputational damage. An inability to secure this infrastructure will be detrimental to the operational capabilities of the business as attackers compromise both physical and digital assets alike. Human lives may also be endangered, should systems in products such as drones, weaponry and vehicles be compromised.
How should your business prepare?
Organisations that are planning to adopt edge computing should consider if this architectural approach is suitable for their requirements.
In the short term, organisations should review physical security and potential points of failure for edge computing environments in the context of operational resilience. Carry out penetration testing on edge computing environments, including hardware components. Finally, identify blind spots in security event and network management systems.
In the long term, generate a hybrid security approach that incorporates both cloud and edge computing. Create a secure architectural framework for edge computing and ensure security specialists are suitably trained to deal with edge computing-related threats.
Sign up to The European Newsletter
RECENT ARTICLES
- 
 Curium’s expansion into transformative therapy offers fresh hope against cancer Curium’s expansion into transformative therapy offers fresh hope against cancer
- 
 What to consider before going all in on AI-driven email security What to consider before going all in on AI-driven email security
- 
 GrayMatter Robotics opens 100,000-sq-ft AI robotics innovation centre in California GrayMatter Robotics opens 100,000-sq-ft AI robotics innovation centre in California
- 
 The silent deal-killer: why cyber due diligence is non-negotiable in M&As The silent deal-killer: why cyber due diligence is non-negotiable in M&As
- 
 South African students develop tech concept to tackle hunger using AI and blockchain South African students develop tech concept to tackle hunger using AI and blockchain
- 
 Automation breakthrough reduces ambulance delays and saves NHS £800,000 a year Automation breakthrough reduces ambulance delays and saves NHS £800,000 a year
- 
 ISF warns of a ‘corporate model’ of cybercrime as criminals outpace business defences ISF warns of a ‘corporate model’ of cybercrime as criminals outpace business defences
- 
 New AI breakthrough promises to end ‘drift’ that costs the world trillions New AI breakthrough promises to end ‘drift’ that costs the world trillions
- 
 Watch: driverless electric lorry makes history with world’s first border crossing Watch: driverless electric lorry makes history with world’s first border crossing
- 
 UK and U.S unveil landmark tech pact with £250bn investment surge UK and U.S unveil landmark tech pact with £250bn investment surge
- 
 International Cyber Expo to return to London with global focus on digital security International Cyber Expo to return to London with global focus on digital security
- 
 Cybersecurity talent crunch drives double-digit pay rises as UK firms count cost of breaches Cybersecurity talent crunch drives double-digit pay rises as UK firms count cost of breaches
- 
 Investors with €39bn AUM gather in Bologna to back Italy’s next tech leaders Investors with €39bn AUM gather in Bologna to back Italy’s next tech leaders
- 
 Axians and Nokia expand partnership to strengthen communications infrastructure across EMEA Axians and Nokia expand partnership to strengthen communications infrastructure across EMEA
- 
 Forterro buys Spain’s Inology to expand southern Europe footprint Forterro buys Spain’s Inology to expand southern Europe footprint
- 
 Singapore student start-up wins $1m Hult Prize for education platform Singapore student start-up wins $1m Hult Prize for education platform
- 
 UK businesses increase AI investment despite economic uncertainty, Barclays index finds UK businesses increase AI investment despite economic uncertainty, Barclays index finds
- 
 Speed-driven email security: effective tactics for phishing mitigation Speed-driven email security: effective tactics for phishing mitigation
- 
 Short circuit: humanoids go for gold at first 'Olympics for robots' Short circuit: humanoids go for gold at first 'Olympics for robots'
- 
 New IBM–NASA AI aims to forecast solar flares before they knock out satellites or endanger astronauts New IBM–NASA AI aims to forecast solar flares before they knock out satellites or endanger astronauts
- 
 AI is powering the most convincing scams you've ever seen AI is powering the most convincing scams you've ever seen
- 
 British firm Skyral to help Mongolia tackle pollution with AI traffic modelling British firm Skyral to help Mongolia tackle pollution with AI traffic modelling
- 
 The nuclear medicine breakthrough transforming cancer care The nuclear medicine breakthrough transforming cancer care
- 
 Second to none: the watchmaker who redefined time for women Second to none: the watchmaker who redefined time for women
- 
 How AI agents are supercharging cybercrime How AI agents are supercharging cybercrime
 
								

























