The pandemic accelerated technological advancements like mobility, IoT, cloud and edge solutions that are helping organizations tread water as the health crisis continues, but those same technologies and rapid advancement will also have a major effect on cybersecurity, according to cybersecurity company Radware.
In a Jan. 6 blog, the company said massive shifts to the clouds and edges will continue through this year and beyond, and cloud providers are decentralizing their clouds and are distributing intelligence and computer resources to the edge of the network and closer to the customer.
While those benefits include real time and low-latency applications, smaller lower-cost endpoint devices, localized data storage, increased privacy and security, a movement toward a cloud-based API economy will require a Zero Trust security model in which each user – including employees, customers or bad actors – is accessing information is on the outside looking in.
“In this model, each user and application flow must be authenticated and then studied for intent to determine that they are not abusing access to information or exfiltrating data independent of whatever public cloud is being accessed,” read’s the company’s blog. ”Within this complex threat surface area, every API needs to be monitored and secured.”
Read Next: Making the Business Case for Cybersecurity
As clouds become decentralized and are pushed to the edges for increased speed, web-scale and service providers are creating Secure Access Service Edges (SASE) to host these super responsive applications, the company’s blog says.
“In a business environment, these could be SASE point of presence combining security and SD-WAN into one software configurable, scalable service providing a full suite of traffic engineering, throughput, and security services for enterprise applications,” the blog says.
“This approach gives businesses a simpler, cheaper, and more efficient way to provide secure and available access across all applications.”
“The challenge is that the edge/5G combination creates an environment in which mobile and IoT devices connected can launch attacks just as powerful as if they were wireline based, something virtually unheard of before.”
With proper security, the combination of these technologies will result in more responsive and secure networks that will enable the monitoring of users and behaviors closer to the edge and mitigate risks before deeper penetration, but the rapid acceleration of these technologies threatens to outpace our ability to secure them all, according to Radware.