Edgio reveals 2023’s key cyber-threats at Infosecurity Europe 2023
With cybersecurity threats rising rapidly, businesses face the challenge of balancing their security programmes with customer experience needs and expectations.
Edgio identifies two of the most common cyber threats that can be limited through edge computing and provide the best possible user experience.
Some of the most prominent threats today are zero-day application exploits, in which hackers identify a vulnerability in infrastructure and exploit it to target organisations. These are massive attacks that can be difficult to detect and very dangerous in terms of revenue and brand reputation. For example, in the second quarter of 2022, DDoS attacks against applications and networks increased by 72% and 109% respectively. In the last decade, around 40% of attacks took place in 2021 alone.
It is now vital to invest in solutions and capabilities, not only to prevent cyber-attacks, but also to detect and respond to them. Investing in a distributed edge network and a dual WAF solution allows new mitigation techniques to be tested while easily protecting the entire network. Organisations using solutions that detect threats through artificial intelligence (AI) and machine learning (ML), compared to those that do not, were able to close a breach in a shorter 74-day period, saving an average of $3 million more.
As the Internet of Things continues to advance, Internet-connected devices will continue to increase, granting unprecedented opportunities for hackers. With over 43 billion IoT devices, cybercriminals now have multiple attack vectors to exploit globally. Some states are even introducing stronger measures to help consumers understand the risks associated with specific IoT devices. For example, the government is already considering the Product Security and Telecommunications Infrastructure Bill, which formalises the previous Code of Practice for Consumer IoT Security.
It is not easy to fully understand the attack landscape and opportunities for cybercriminals. It is an ongoing challenge as systems and solutions continue to evolve as innovation grows and as organisations build their IoT infrastructure. However, moving security to the edge of the network can help filter sensitive data locally and send only crucial IoT data to the cloud.
Spotlight on Edge computing
"Despite its widespread global deployment, edge computing is still in its infancy and many decision-makers are unaware that by moving workflows to the Edge, organisations will achieve better performance, reduced latency, lower costs and greater scalability and reliability. The future of digital experiences is at the Edge. The use of this technology protects critical infrastructure and resists the growing threats from zero-day attacks and IoT hacking," said Ajay Kapur, Chief Technology Officer at Edgio.
It was once believed that implementing comprehensive security would slow down processes and compromise the user experience, but this is not the case. More than 40% of all Internet traffic is bot traffic; therefore, by blocking malicious bots, real users can access the site more easily and achieve better performance, as the site is not slowed down by bot requests.
This year will bring many security challenges, but there will also be possibilities to seize them, whether it be dealing with zero-day attacks, preparing for new IoT threats, or adopting innovative Edge solutions.