Cyber Security

Edgio reveals 2023’s key cyber-threats

4th April 2023
Sheryl Miles
0

With the ever-developing cyber threat landscape and increasingly demanding consumer expectations, balancing cyber security and customer experience needs can be very challenging for an organisation.

Edgio, the platform for speed, security, and simplicity at the Edge, identifies two of the most common cyber threats that can be limited through edge computing and provide the best possible user experience.

Zero-day attacks

Some of the most prominent threats today are zero-day application exploits, in which hackers identify a vulnerability in infrastructure and exploit it to target organisations. These are massive attacks that can be difficult to detect and very dangerous in terms of revenue and brand reputation.

For example, in the second quarter of 2022, DDoS attacks against applications and networks increased by 72% and 109% respectively. In the last decade, around 40% of attacks took place in 2021 alone.

It is now vital to invest in solutions and capabilities, not only to prevent cyber-attacks, but also to detect and respond to them. Investing in a distributed edge network and a dual WAF solution allows new mitigation techniques to be tested while protecting the entire network. Organisations using solutions that detect threats through artificial intelligence (AI) and machine learning (ML), compared to those that do not, were able to close a breach in a shorter 74-day period, saving an average of $3 million more.

IoT devices

As the Internet of Things (IoT) continues to advance, Internet-connected devices will continue to increase, granting unprecedented opportunities for hackers. With over 43 billion IoT devices, cyber criminals now have multiple attack vectors to exploit globally. Some states are even introducing stronger measures to help consumers understand the risks associated with specific IoT devices. For example, the government is already considering the ‘Product Security and Telecommunications Infrastructure Bill,’ which formalises the previous Code of Practice for Consumer IoT Security. 

It is not easy to fully understand the attack landscape and opportunities for cyber criminals. It is an ongoing challenge as systems and solutions continue to evolve as innovation grows and as organisations build their IoT infrastructure. However, moving security to the edge of the network can help filter sensitive data locally and send only crucial IoT data to the cloud.

2023: the year of edge computing

"Despite its widespread global deployment, edge computing is still in its infancy and many decision-makers are unaware that by moving workflows to the edge, organisations will achieve better performance, reduced latency, lower costs, and greater scalability and reliability. The future of digital experiences is at the Edge. The use of this technology protects critical infrastructure and resists the growing threats from zero-day attacks and IoT hacking," said Ajay Kapur, Chief Technology Officer at Edgio.

It was once believed that implementing comprehensive security would slow down processes and compromise the user experience, but this is not the case. More than 40% of all Internet traffic is bot traffic; therefore, by blocking malicious bots, real users can access the site more easily and achieve better performance, as the site is not slowed down by bot requests.

Whether it's fighting zero-day attacks, preparing for new IoT threats, or adopting new edge solutions, the coming years will see many threats ahead, but at the same time great opportunities to be seized.

Featured products

Upcoming Events

View all events
Newsletter
Latest global electronics news
© Copyright 2024 Electronic Specifier