The Latest in IT Security

6 essential elements of edge computing security


In 2017, a thermometer in a fish tank at a casino hotel lobby was hacked, enabling attackers to penetrate the casino’s network and transport its “high roller” database to the cloud.

In May, 2018, a denial of service attackknocked out a corporate website for four days. The attack was orchestrated through a network of internet of things (IoT) devices that included routers, security cameras and digital video recorders.

Both of these incidents illustrate why edge security is a growing concern for IT, which inevitably gets charged with controlling corporate security. This job gets tougher as more compute moves out to the edge in the form of IoT devices, robotics and other localized systems and networks used in remote facilities and user areas.

Read More

Leave a reply


MONDAY, MARCH 27, 2023

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments