InformationWeek: Many Ways to Defeat Multi-Factor Authentication (Oct 4th)
Cisco News

When you are reading about 'the Edge,' do you always know what is meant by that term?

The edge is a very abstract term. For example, to a service provider, the edge could mean computing devices close to a cell tower. For a manufacturing company, the edge could mean an IoT gateway with sensors located on their shop floor.

There is a need to categorize the edge more, and fortunately there are some approaches. One of them is coming from the Linux Foundation (LF Edge), which is categorizing the edge into a User Edge and Service Provider Edge. The Service Provider Edge means to provide server-based compute for the global fixed or mobile networking infrastructure. It is usually consumed as a service provided by a communications service provider (CSP).

Cisco and AWS demonstrate shared responsibility that identifies Security 'of' the Cloud versus Security 'in' the Cloud.

Shared responsibility remains central to every cloud initiative and defines how cloud providers and customers work together to achieve maximum security across all aspects of the cloud. While shared responsibility is a common term, surprisingly few people understand the model and fewer still have implemented it correctly. The lack of consistent security controls across cloud services does not go unnoticed by attackers, as they probe for vulnerabilities and slip undetected through unsecured cracks.

Ransomware and other advanced attacks continue to evolve and threaten organizations around the world.

Effectively defending your endpoints from these attacks can be a complex undertaking, and a seemingly endless number of security acronyms only compounds that complexity. There are so many acronyms - EPP, EDR, MEDR, MDR, XDR, and more - for various cybersecurity products and services that it becomes difficult to understand the differences between them and choose the right solution for your organization. Deciphering all these acronyms is a task on its own and deciding which solution works best for you is even more challenging.

See all Archived Cisco News articles See all articles from this issue