{"id":4399,"date":"2025-12-24T07:36:00","date_gmt":"2025-12-24T06:36:00","guid":{"rendered":"https:\/\/enthec.com\/?p=4399"},"modified":"2025-12-24T07:36:00","modified_gmt":"2025-12-24T06:36:00","slug":"edge-computing-what-it-is-and-why-it-poses-a-new-cybersecurity-challenge","status":"publish","type":"post","link":"https:\/\/enthec.com\/en\/edge-computing-what-it-is-and-why-it-poses-a-new-cybersecurity-challenge\/","title":{"rendered":"Edge computing: what it is and why it poses a new cybersecurity challenge"},"content":{"rendered":"
For years, the cloud computing model has been the driving force behind digital transformation. Centralizing data and processes appeared to be the most logical option. However, the growth of the Internet of Things (IoT), the need for real-time responses, and the proliferation of connected devices have spurred the adoption of another approach: <\/span>edge computing<\/b>.<\/span><\/p>\n Understanding what edge computing is, how it works, and its security implications is now crucial for any organization managing critical data or distributed infrastructure. While edge computing offers speed and efficiency, it also raises new cybersecurity challenges that cannot be ignored. <\/span><\/p>\n Before we get into the subject, it’s worth noting something important:<\/span> the more processing points and devices a system has, the larger the attack surface. <\/b>. And that’s where solutions like Kartos by Enthec begin to play a strategic role.<\/span><\/p>\n <\/p>\n When we ask the question, “What is edge computing?” we refer to a model in which data processing is performed as close as possible to its point of generation, rather than sending it to a centralized data center or the cloud.<\/span><\/p>\n In practice, this means that sensors,<\/span> IoT devices,<\/a> <\/span>local servers, or gateways<\/span> process information in real time, reducing latency and bandwidth consumption. <\/b>Only the necessary or already filtered data is then sent to the central systems.<\/span><\/p>\n This approach is instrumental in environments where<\/span> every millisecond counts, such as industry, healthcare, or intelligent transport systems.<\/span><\/p>\n <\/p>\n <\/p>\n To understand how edge computing works, it’s helpful to imagine a distributed architecture with several layers:<\/span><\/p>\n Devices located at the “edge” of the network (sensors, cameras, industrial machines, smart routers) collect and analyze data in real time. <\/span>Here, decisions are made quickly, without depending on the cloud.<\/b><\/p>\n Not all information travels to central servers. <\/span>Only aggregated data, alerts, or historical information are transmitted,<\/b> thereby reducing costs and improving efficiency.<\/span><\/p>\n Edge computing doesn’t eliminate cloud computing; it complements it. The cloud remains key for advanced analytics, long-term storage, and global coordination. <\/span><\/p>\n This hybrid model is powerful, but also<\/span> more complex to protect<\/b>.<\/span><\/p>\n <\/p>\n Examples of edge computing help to understand why this technology is spreading so rapidly:<\/span><\/p>\n All these cases share one characteristic: <\/span>sensitive data, distributed devices, and the need for continuous availability<\/b>.<\/span><\/p>\n <\/p>\n The edge computing applications are typically deployed in highly heterogeneous environments. <\/b>. Protecting a data center is not the same as protecting hundreds or thousands of devices spread across factories, streets, or homes.<\/span><\/p>\n Several challenges arise here:<\/span><\/p>\n From a cybersecurity perspective, this requires a shift from a reactive approach to a<\/span> continuous and proactive one<\/b>.<\/span><\/p>\n <\/p>\n One of the less visible aspects of edge computing is its risk exposure. Each new node is a potential entry point for an attacker. Not all edge devices have the same security capabilities as a traditional server. <\/span><\/p>\n This makes it<\/span> critical to know what you have exposed, where, and how.<\/b><\/p>\n <\/p>\n Although the operational advantages are clear, it is essential not to overlook the<\/span> disadvantages of edge computing, especially in matters of security:<\/span><\/p>\n Managing hundreds of nodes requires specialized tools and mature processes. Without them, human error multiplies. <\/span><\/p>\n Many organizations lack up-to-date inventories of their edge assets, making it difficult to detect vulnerabilities.<\/span><\/p>\n Maintaining the same level of security at all points is a real challenge, especially in hybrid environments.<\/span><\/p>\n These disadvantages do not invalidate edge computing, but <\/span>they force a rethinking of the cybersecurity strategy<\/b>.<\/span><\/p>\n <\/p>\n This is where an increasingly relevant concept comes into play: the<\/span> Continuous Threat Exposure Management (CTEM)<\/b>.<\/p>\n In edge environments, one-off audits or sporadic scans are no longer enough. What’s needed is: <\/span><\/p>\n Kartos, Enthec’s solution for businesses, is positioned precisely within this approach, not as an isolated tool, but as a system that helps to <\/span>maintain controlled risk exposure in dynamic infrastructures,<\/b> such as those that arise with edge computing.<\/p>\n <\/p>\n In scenarios where processing is decentralized,<\/span> visibility becomes a strategic asset.<\/b>. Kartos allows organizations to:<\/span><\/p>\n This is especially useful in edge computing projects, where changes are constant, and mistakes are costly.<\/span><\/p>\n It’s not just about knowing what vulnerabilities exist, but about understanding which ones really matter and which ones can wait.<\/b><\/p>\n You may be interested in\u2192<\/span> Real-time vulnerability management: a step forward in cybersecurity<\/span><\/a>.<\/span><\/p>\n <\/p>\n Before deploying solutions, it is advisable to ask some key questions:<\/span><\/p>\n Answering these questions is not just a technical exercise, but a strategic one.<\/span><\/p>\n Returning to the starting point, to understand what edge computing is, we must see it not only as a technological evolution but also as a profound change in how data and risks are managed.. Its adoption will continue to grow, driven by the need for immediacy and efficiency.<\/span><\/p>\n However, that growth must be accompanied by a<\/span> cybersecurity approach aligned with the distributed reality.<\/b>. Continuous exposure management, supported by solutions such as Kartos by If your organization is exploring or already working with edge computing applications, it might be time to review how you are managing your attack surface.<\/span><\/p>\nEdge computing, what exactly is it?<\/b><\/h2>\n
<\/p>\nHow edge computing works in practice<\/b><\/h2>\n
Edge processing<\/b><\/h3>\n
Selective communication with central systems<\/b><\/h3>\n
Cloud integration
<\/b><\/h3>\nEdge computing and examples in different sectors<\/b><\/h2>\n
\n
Edge computing applications and their impact on security<\/b><\/h2>\n
\n
Why edge computing expands the attack surface<\/b><\/h2>\n
Disadvantages of edge computing from a cybersecurity perspective<\/b><\/h2>\n
Greater operational complexity<\/b><\/h3>\n
Limited visibility<\/b><\/h3>\n
Difficulty in applying homogeneous policies<\/b><\/h3>\n
From one-off security measures to continuous exposure management<\/b><\/h2>\n
\n
<\/span><\/li>\nKartos and edge computing: a necessary relationship<\/b><\/h2>\n
\n
What should companies consider before investing in edge computing?<\/b><\/h2>\n
\n
<\/span>Enthec<\/span><\/a>, allows you to proceed without losing control.<\/span><\/p>\n