The Latest in IT Security

6 essential elements of edge computing security

18
Jul
2018

cloud-computing-security-large
In 2017, a thermometer in a fish tank at a casino hotel lobby was hacked, enabling attackers to penetrate the casino’s network and transport its “high roller” database to the cloud.

In May, 2018, a denial of service attackknocked out a corporate website for four days. The attack was orchestrated through a network of internet of things (IoT) devices that included routers, security cameras and digital video recorders.

Both of these incidents illustrate why edge security is a growing concern for IT, which inevitably gets charged with controlling corporate security. This job gets tougher as more compute moves out to the edge in the form of IoT devices, robotics and other localized systems and networks used in remote facilities and user areas.

Read More

Leave a reply


Categories

TUESDAY, APRIL 23, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments