Cybersecurity Mesh Adds Decentralized Security and Swarm AI for Remote Enterprises

Join leaders July 26-28 for Transform AI and Edge Week. Hear high-level leaders discuss topics around AL/ML technology, conversational AI, IVA, NLP, Edge, and more. Book your free pass now!

Cybersecurity mesh has been named one of the top strategic technology trends for 2022 by Gartner. According to Gartner's report, cybersecurity mesh is an advanced conceptual security architecture method that enables today's dispersed enterprises to extend and implement security where it is needed most. /p>

David Carvalho, CEO and founder of cybersecurity network Naoris Protocol, told VentureBeat via email that the cybersecurity mesh is a flexible, composable architecture that integrates widely distributed security services. It enables standalone security solutions to work together and improve overall security by bringing control points closer to the assets they are meant to protect. It added that it can quickly and reliably verify identity, context, and policy compliance in cloud and non-cloud environments.

Cybersecurity Mesh for Web3 Decentralization

Carvalho noted that cybersecurity needs to be rethought and revamped, and that by 2025, the global cyber damage problem will exceed $10 trillion. He further noted that despite the increase in investment year on year, cybersecurity is still struggling to keep up with the endless arms race between defenders and attackers, with the cost of cyber disasters eclipsing any investment. .

The cost effect of individual security events would be reduced by 90% on average by 2024, according to Gartner, if organizations adopted a cybersecurity mesh architecture to integrate security products into a cooperative ecosystem.

Event

MetaBeat 2022

MetaBeat will bring together thought leaders from across the Metaverse to advise on how Metaverse technology will transform the way all industries communicate and do business on October 3-4 in San Francisco, CA.

> register here

In a press release, Naoris Protocol said it provides decentralized and remote enterprises with decentralized cybersecurity mesh technology, which can mitigate attacks on all devices, networks and all types of institutions, offering a solid solution for any zero-trust architecture. .

The company added that each validator in its mesh tracks and protects the value of the networks it covers using a decentralized proof-of-security (dPoSec) consensus method between peer-to-peer nodes of the network. Using distributed consensus and cybersecurity mesh technology, threats can be detected quickly, preserving up to 90% of the value lost in a single cybersecurity incident.

Traditional centralized cybersecurity model

Currently, the underlying governance and ownership of cybersecurity solutions and tools is centralized, meaning that the entity and the technology are centrally owned and controlled. This is no longer reliable and has become a single point of failure for online attackers. Carvalho noted that every second 127 gadgets are connected to the Internet for the first time.

Actually...

Cybersecurity Mesh Adds Decentralized Security and Swarm AI for Remote Enterprises

Join leaders July 26-28 for Transform AI and Edge Week. Hear high-level leaders discuss topics around AL/ML technology, conversational AI, IVA, NLP, Edge, and more. Book your free pass now!

Cybersecurity mesh has been named one of the top strategic technology trends for 2022 by Gartner. According to Gartner's report, cybersecurity mesh is an advanced conceptual security architecture method that enables today's dispersed enterprises to extend and implement security where it is needed most. /p>

David Carvalho, CEO and founder of cybersecurity network Naoris Protocol, told VentureBeat via email that the cybersecurity mesh is a flexible, composable architecture that integrates widely distributed security services. It enables standalone security solutions to work together and improve overall security by bringing control points closer to the assets they are meant to protect. It added that it can quickly and reliably verify identity, context, and policy compliance in cloud and non-cloud environments.

Cybersecurity Mesh for Web3 Decentralization

Carvalho noted that cybersecurity needs to be rethought and revamped, and that by 2025, the global cyber damage problem will exceed $10 trillion. He further noted that despite the increase in investment year on year, cybersecurity is still struggling to keep up with the endless arms race between defenders and attackers, with the cost of cyber disasters eclipsing any investment. .

The cost effect of individual security events would be reduced by 90% on average by 2024, according to Gartner, if organizations adopted a cybersecurity mesh architecture to integrate security products into a cooperative ecosystem.

Event

MetaBeat 2022

MetaBeat will bring together thought leaders from across the Metaverse to advise on how Metaverse technology will transform the way all industries communicate and do business on October 3-4 in San Francisco, CA.

> register here

In a press release, Naoris Protocol said it provides decentralized and remote enterprises with decentralized cybersecurity mesh technology, which can mitigate attacks on all devices, networks and all types of institutions, offering a solid solution for any zero-trust architecture. .

The company added that each validator in its mesh tracks and protects the value of the networks it covers using a decentralized proof-of-security (dPoSec) consensus method between peer-to-peer nodes of the network. Using distributed consensus and cybersecurity mesh technology, threats can be detected quickly, preserving up to 90% of the value lost in a single cybersecurity incident.

Traditional centralized cybersecurity model

Currently, the underlying governance and ownership of cybersecurity solutions and tools is centralized, meaning that the entity and the technology are centrally owned and controlled. This is no longer reliable and has become a single point of failure for online attackers. Carvalho noted that every second 127 gadgets are connected to the Internet for the first time.

Actually...

What's Your Reaction?

like

dislike

love

funny

angry

sad

wow