Cyber security Mesh: Clusters of network monitoring redefining security By Aditya Abeysinghe   Conventional network security monitoring involves establishing a security perimeter around all devices of a network. This method has been followed since the kindergarten days of computer networks and is the de facto standard used to monitor and secure most internal networks at present too. While this may sound easy for monitoring and securing devices in a network, the main disadvantage is that if the perimeter is hacked in some way, then the entire network could be vulnerable to attacks. Furthermore, security policies are often imposed at the edge of the network rather than at identity or other access management levels. Cyber security mesh is a concept that addresses these issues by enforcing security at each access point or similar level, thereby clustering these networks into a mesh of networks that are monitored separately.   Covid-19 and network ...

Read More →