www.darkreading.com
Open in
urlscan Pro
2606:4700::6811:7963
Public Scan
URL:
https://www.darkreading.com/endpoint/2023-at-t-cybersecurity-insights-report-edge-ecosystem
Submission: On May 12 via api from TR — Scanned from DE
Submission: On May 12 via api from TR — Scanned from DE
Form analysis
0 forms found in the DOMText Content
The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud ICS/OT Remote Workforce Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Physical Security IoT DR Global Middle East & Africa Middle East & Africa Black Hat news Omdia Research Security Now Events Close Back Events Events * Anatomy of a Data Breach - A Dark Reading June 22 Event * Black Hat USA - August 5-10 - Learn More Webinars * Puzzled by Patching: Solve Endpoint Pains May 16, 2023 * Building the SOC of the Future: Next-Gen Security Operations May 18, 2023 Resources Close Back Resources Dark Reading Library > Webinars > Reports > Slideshows > White Papers > Partner Perspectives: Microsoft Tech Library > Newsletter Sign-Up The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud ICS/OT Remote Workforce Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Physical Security IoT DR Global Middle East & Africa Middle East & Africa Black Hat news Omdia Research Security Now Events Close Back Events Events * Anatomy of a Data Breach - A Dark Reading June 22 Event * Black Hat USA - August 5-10 - Learn More Webinars * Puzzled by Patching: Solve Endpoint Pains May 16, 2023 * Building the SOC of the Future: Next-Gen Security Operations May 18, 2023 Resources Close Back Resources Dark Reading Library > Webinars > Reports > Slideshows > White Papers > Partner Perspectives: Microsoft Tech Library > The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud ICS/OT Remote Workforce Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Physical Security IoT DR Global Middle East & Africa Middle East & Africa Black Hat news Omdia Research Security Now Events Close Back Events Events * Anatomy of a Data Breach - A Dark Reading June 22 Event * Black Hat USA - August 5-10 - Learn More Webinars * Puzzled by Patching: Solve Endpoint Pains May 16, 2023 * Building the SOC of the Future: Next-Gen Security Operations May 18, 2023 Resources Close Back Resources Dark Reading Library > Webinars > Reports > Slideshows > White Papers > Partner Perspectives: Microsoft Tech Library > -------------------------------------------------------------------------------- Newsletter Sign-Up SEARCH A minimum of 3 characters are required to be typed in the search bar in order to perform a search. Announcements 1. 2. 3. Event How to Launch a Threat Hunting Program | Webinar <REGISTER> Event How to Accelerate XDR Outcomes: Bridging the Gap Between Network and Endpoint | Webinar <REGISTER> Report Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW> PreviousNext Endpoint 5 MIN READ Sponsored Article Sponsored 2023 AT&T CYBERSECURITY INSIGHTS REPORT: EDGE ECOSYSTEM The 2023 AT&T Cybersecurity Insights Report examines how edge use cases are evolving, how organizations are changing to deliver better business outcomes through digital first experiences, and how an integrated ecosystem can work together to put security at the core of edge computing. Theresa Lanowitz, Head of Cybersecurity Evangelism, AT&T Business May 11, 2023 PDF Each year, we look forward to the publication of the "AT&T Cybersecurity InsightsTM Report: Edge Ecosystem," a vendor-neutral and forward-looking report. It helps us gauge where the market is going, what lies ahead, and evolving business solutions — while understanding how cybersecurity connects to the ecosystem. RESEARCH METHODOLOGY This report is a vendor-neutral thought leadership piece offering a quantitative analysis of 1,418 global professionals in security, IT, application development, and line-of-business. It includes a qualitative analysis of cybersecurity subject matter experts. The report includes common edge use cases in seven verticals — healthcare; retail; finance; manufacturing; energy; transportation; and US state, local, and higher education (SLED) — and presents actionable advice for securing and connecting an edge ecosystem. Finally, it looks at cybersecurity and the broader edge ecosystem of networking, service providers, and top use cases. EMBRACING THE EDGE COMPUTING ECOSYSTEM We asked our respondents to help us define the key characteristics of edge computing. These characteristics define this new democratized version of computing with IoT devices (that are also evolving) that will process and deliver a previously unseen velocity, volume, and variety of data. * Edge computing relies on a distributed model of management, intelligence, and networks. * Applications, workloads, and hosting are closer to where data is generated and consumed. * It's software-defined, which can mean the dominant use of private, public, or hybrid cloud environments. This doesn't rule out on-premises environments. BUSINESS IS REALIZING THE VALUE OF EDGE DEPLOYMENTS Edge deployments and use cases are increasing because business recognizes their value. In 2023, the primary use case in each industry evolved from the previous year. Fifty-seven percent of survey respondents are in proof of concept, partial, or full implementation phases with their edge computing use cases. One of the most pleasantly surprising findings is how organizations are investing in security for edge. We asked survey participants how they allocated their budgets for the primary edge use cases across four areas: strategy and planning, network, security, and applications. The results show that security is an integral part of edge computing. This balanced investment strategy prioritizes much-needed security for ephemeral edge applications as a key component of strategic planning. Edge project budgets are nearly balanced across four key areas: 30% network, 23% overall strategy and planning, 22% security, and 22% applications. A ROBUST PARTNER ECOSYSTEM SUPPORTS EDGE COMPLEXITY Across all industries, external trusted advisers are being called upon as critical extensions of the team. During the edge project planning phase, 64% use an external partner. During the production phase, that same number increases to 71%. These findings demonstrate that organizations are seeking help because the complexity of edge demands more than a do-it-yourself approach. A surprise finding comes in the form of the changing attack surface and changing attack sophistication. Our data shows that distributed denial-of-service (DDoS) attacks are now the top concern (when examining the data in the aggregate vs. by industry). Surprisingly, ransomware dropped to eighth place out of eight in attack type. The qualitative analysis points to an abundance of organizational spending on ransomware prevention over the past 24 months and enthusiasm for ransomware containment. However, ransomware criminals and their attacks are relentless. Additional qualitative analysis suggests cyber adversaries may be cycling different types of attacks. This is a worthwhile issue to discuss in your organization. BUILDING RESILIENCE IS CRITICAL FOR SUCCESSFUL EDGE INTEGRATION Resilience is about adapting quickly to a changing situation. Together, resilience and security address risk, support business needs, and drive operational efficiency at each stage of the journey. As use cases evolve, resilience gains importance, and the competitive advantage that edge applications provide can be fine-tuned. Future evolution will involve more IoT devices, faster connectivity and networks, and holistic security tailored to hybrid environments. Our research finds that organizations are fortifying and future-proofing their edge architectures and adding cyber resilience as a core pillar. Empirically, our research shows that as the number of edge use cases in production grows, there is a strong need and desire to increase protection for endpoints and data. For example, the use of endpoint detection and response grows by 12% as use cases go from ideation to full implementation. KEY TAKEAWAYS You may not realize you've already encountered edge computing — whether through telemedicine, finding available parking places, or working in a smart building. Edge brings us to a digital-first world rich with new and exciting possibilities. By embracing edge computing, you'll help your organization gain important and often competitive business advantages. This report is designed to help you start and further the conversation. Use it to develop a strategic plan that includes these key development areas. * Start developing your edge computing profile. * Develop an investment strategy. * Align resources with emerging security priorities. * Prepare for ongoing, dynamic response. Download the newly released "AT&T Cybersecurity Insights Report: Edge Ecosystem" here. About the Author Theresa Lanowitz is a proven global influencer and speaks on trends and emerging technology poised to help today’s enterprise organizations flourish. Theresa is currently the head of cybersecurity evangelism at AT&T Business. Prior to joining AT&T, Theresa was an industry analyst with boutique analyst firm Voke and Gartner. While at Gartner, Theresa spearheaded the application quality ecosystem, championed application security technology, and created the successful Application Development conference. As a product manager at Borland International Software, Theresa launched the iconic Java integrated development environment, JBuilder. While at Sun Microsystems, Theresa led strategic marketing for the Jini project, a precursor to IoT (Internet of Things). Theresa's professional career began with McDonnell Douglas where she was a software developer on the C-17 military transport plane and held a US Department of Defense Top Secret security clearance. Theresa holds a Bachelor of Science in Computer Science from the University of Pittsburgh. Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. Subscribe More Insights White Papers * Proof-Based Scanning: No noise, just facts * Top 5 Reasons to Prioritize Privileged Access Management More White Papers Webinars * Puzzled by Patching: Solve Endpoint Pains * Building the SOC of the Future: Next-Gen Security Operations More Webinars Reports * How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment * Successfully Managing Identity in Modern Cloud and Hybrid Environments More Reports Editors' Choice 7 Things Your Ransomware Response Playbook Is Likely Missing Becky Bracken, Editor, Dark Reading Samsung Engineers Feed Sensitive Data to ChatGPT, Sparking Workplace AI Warnings Jai Vijayan, Contributing Writer, Dark Reading LastPass Breach Reveals Important Lessons Mike Walters, VP of Vulnerability and Threat Research & Co-Founder, Action1 Corporation FIN7, Former Conti Gang Members Collaborate on 'Domino' Malware Jai Vijayan, Contributing Writer, Dark Reading Webinars * Puzzled by Patching: Solve Endpoint Pains * Building the SOC of the Future: Next-Gen Security Operations * Everything you Need to Know about DNS Attacks * Why Threat Modeling Is Critical for Enterprise Cyber Defense * Securing the Remote Worker: How to Monitor and Mitigate Offsite Cyberattacks More Webinars Reports * How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment * Successfully Managing Identity in Modern Cloud and Hybrid Environments * The 10 Most Impactful Types of Vulnerabilities for Enterprises Today * The Promise and Reality of Cloud Security * 10 Hot Talks From Black Hat USA 2022 More Reports White Papers * Proof-Based Scanning: No noise, just facts * Top 5 Reasons to Prioritize Privileged Access Management * 2023 Gartner Market Guide for Cloud-Native Application Protection Platforms (CNAPP) * The Cloud Security Workflow Handbook * 2023 Cloud Threat Report More White Papers Events * Anatomy of a Data Breach - A Dark Reading June 22 Event * Black Hat USA - August 5-10 - Learn More More Events More Insights White Papers * Proof-Based Scanning: No noise, just facts * Top 5 Reasons to Prioritize Privileged Access Management More White Papers Webinars * Puzzled by Patching: Solve Endpoint Pains * Building the SOC of the Future: Next-Gen Security Operations More Webinars Reports * How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment * Successfully Managing Identity in Modern Cloud and Hybrid Environments More Reports DISCOVER MORE FROM INFORMA TECH * Interop * InformationWeek * Network Computing * ITPro Today * Data Center Knowledge * Black Hat * Omdia WORKING WITH US * About Us * Advertise * Reprints FOLLOW DARK READING ON SOCIAL * * * * * * * Home * Cookies * Privacy * Terms Copyright © 2023 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG. Cookies Button ABOUT COOKIES ON THIS SITE We and our partners use cookies to enhance your website experience, learn how our site is used, offer personalised features, measure the effectiveness of our services, and tailor content and ads to your interests while you navigate on the web or interact with us across devices. You can choose to accept all of these cookies or only essential cookies. To learn more or manage your preferences, click “Settings”. For further information about the data we collect from you, please see our Privacy Policy Accept All Settings COOKIE PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Cookies Details FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookies Details Back Button BACK Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label * View Cookies * Name cookie name Confirm My Choices