Edge computing demands a more integrated security response

SMART Cybersecurity Handbook 2022 Information Security

One of the new battlefields of today is the rise of the edge. On the one hand this domain brings significant functional and economic benefits, enabling the emergence of a new breed of real-time applications, but at the same time such a plethora of devices augments the attack surface, creating new entry doors into the corporate network.

The laptops, smartphones, security cameras and sensors in items that you’re tracking all make it easier to do business and manage your operations. They also vastly increase the playground that hackers can target, warns Alain Sanchez, EMEA chief information security officer, senior evangelist at Fortinet.

Speaking during Fortinet’s recent Security Day Africa event, Sanchez highlighted some pros and cons behind the massive growth in edge computing, which allows companies to capture, store, process and analyse data where it is generated, instead of in a centralised data-processing warehouse.

Ecosystem of the edge

It’s being enabled by the high speeds and low latency of 5G network architecture. That low latency has created an ecosystem at the edge of the network that empowers people and AI (artificial intelligence) by letting them make decisions as close as possible to the operations without generating traffic back and forth. It’s making organisations flatter with faster decision-making processes, but it opens up more routes for attackers to infiltrate. 5G also makes swarm-based attacks more likely because its distributed architecture uses building blocks that can be shared amongst telecommunications services.

Edge computing is generating investments worth $4,68 billion in the US only in 2020. “We are living in a moment of digital acceleration that will not stop. But these digital transformations carry threats by increasing the number of touchpoints to attack,” Sanchez warned. “This rise of the edge is something very important that we have to deal with in the coming months and years.”

The Covid-19 pandemic that pushed people into working from home accelerated the move to edge computing. It also increased the risk, by putting people who don’t understand the sophistication of cybercriminals and the threats they pose in charge of their own security.

“Everyone has the temptation to adopt one single password for every application because it’s easier to remember, but look at the damage it can cause. It’s a series of open doors into all your information,” Sanchez said. “Many people are connecting to business-critical applications through home-grade routers. Some are doing video conferences with a PC that one hour ago was downloading games from a not-so-clean server.”

In Africa last year, many of the recorded attacks took advantage of the presence of Covid-19 by specifically targeting this new architecture. The switch towards remote working has also accelerated cloud computing, which carries other risks as data is distributed more broadly. The benefits of the cloud must be protected by a security posture, rules and strategy that sit on top of it, he said.

Security-driven networking

Traditional security strategies can’t keep up with the risks posed by this expanding attack surface, given the ever-increasing professionalism and volume of cyber-attacks. Protecting a business now requires what Fortinet dubs ‘security-driven networking’ that tightly integrates a security architecture and the network infrastructure into one platform containing all the necessary components to keep a network secure as it scales and changes. The networking and security functions will merge into one connectivity layer involving a series of hybrid, moving clouds.

At the moment, multi-cloud strategy is emerging as a massive trend, 71% of organisations are embarked on a multi-cloud transformation. Now if this mitigates the risks, it also adds management complexity and increases the attack surface. In this context the need for a single management pane is crucial; 78% of security professionals see it as extremely helpful, according to the 2021 Cloud Security report. “Security is a common strength across all the elements of the information system and has to provide end-to-end visibility and the ability to understand, analyse and act,” he said.

To help achieve that, Fortinet has developed solutions that leverage ML (machine learning) that learn a user’s normal behaviour and flag any behaviour that doesn’t match their credentials.

This trend towards security-driven networking will benefit companies by protecting their edge computing endeavours and let the security officers deal with the various scenarios that will unfold in the future.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

Read more...
Factories, grids, and finance: Critical infrastructure cyber lessons of 2025
Asset Management Information Security Industrial (Industry)
Africa has seen an accelerated, large-scale digitisation of our overall industrial base, and this rapid convergence of IT and OT is happening on a foundation that, in essence, was not designed to be cybersecure.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Eight African cybersecurity trends for 2026
Information Security
Check Point Software Technologies has released eight critical trends shaping Africa’s digital turning point in 2026, noting that their implementation will require the government, the private sector, and key civic institutions to cooperate.

Read more...
The year of the agent
Information Security AI & Data Analytics
The dominant attack patterns in Q4 2025 included system-prompt extraction attempts, subtle content-safety bypasses, and exploratory probing. Indirect attacks required fewer attempts than direct injections, making untrusted external sources a primary risk vector heading into 2026.

Read more...
AI cybersecurity predictions for 2026
AI & Data Analytics Information Security
The rapid development of AI is reshaping the cybersecurity landscape in 2026, for both individual users and businesses. Large language models (LLMs) are influencing defensive capabilities while simultaneously expanding opportunities for threat actors.

Read more...
SMARTpod Talks to Check Point Technologies about the African Perspectives on Cybersecurity report
SMART Security Solutions News & Events Information Security Videos
SMART Security Solutions spoke with Check Point's Hendrik de Bruin about the report, the risks African organisations face, and some mitigation measures.

Read more...
Securing the smart fleet
Information Security Transport (Industry) Logistics (Industry) IoT & Automation
Contributing around 10 to 12% of South Africa’s GDP, the transport and logistics sector supports almost every part of the country’s economic activity. The stakes for keeping these systems secure are higher than ever before.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.