Page 102 - Cyber Defense eMagazine September 2022
P. 102

Potential solutions to these issues

            One  possible  solution  for  companies  who  wish  to  enhance  the  security  of  their  complex  enterprise
            structure could be to adopt confidential computing.

            This privacy preserving technology encrypts data while it is still in its processing stage, enabling firms to
            securely aggregate their datasets to solve shared business problems without revealing the raw enterprise
            data to anyone.

            Additionally, it secures the processed and consolidated data from multiple databases as well as the
            insights  generated  from  them,  disallowing  access  from  any  party  and  minimizing  the  risk  of  data
            manipulation.

            This  new  form  of  data  processing  can  protect  policymakers  and  relevant  stakeholders  from  data
            breaches, since raw data is not being distributed or made available to external parties. In fact, many
            enterprises are starting to realise the benefits of adopting confidential computing in today’s distributed
            work environment.

            A report published by Everest Group, for example, forecasts that the confidential computing market could
            grow from US1.9 billion in 2021 to US$54 billion by 2026.

            Alongside confidential computing, a “zero trust” approach could also be used to compliment the protection
            it provides and strengthen its impact. A ‘Zero trust’ security model requires that a transaction be verified
            for it to be successful to prevent any security breaches. This implies that all transactions made – even if
            from within the network - must be verified. Between 2020 and 2026, the market is expected to grow from
            US$19.6 billion to US $51.6 billion.

            However, one challenge of the ‘zero trust’ architecture includes the strict requirements of a ‘zero trust’
            network  and  its  implementation.  Some  of  these  requirements  include  ensuring  network  security,
            infrastructure security and identity security. But we can expect this to be made easier thanks to emerging
            technologies that are keeping up with the demand for enhanced security.



            Looking ahead

            With the rise of remote work and a hybrid cloud environment, traditional networks are increasingly unable
            to keep up with the ever-growing security needs of firms.

            If firms wish to effectively adapt to this “new normal” of hybrid working and promote growth in a post
            pandemic  world,  confidence  in  data  sharing  must  improve.  To  effectively  accomplish  this,  privacy-
            enhancing technology like confidential computing should be the answer.












            Cyber Defense eMagazine – September 2022 Edition                                                                                                                                                                                                         102
            Copyright © 2022, Cyber Defense Magazine. All rights reserved worldwide.
   97   98   99   100   101   102   103   104   105   106   107