Edge security: There’s lots of attack surfaces to worry about
The problem of edge security isn’t unique – many of the issues being dealt with are the same ones that have been facing the general IT sector for decades.But the edge adds its own wrinkles to those problems, making them, in many cases, more difficult to address. Yet, by applying basic information security precautions, most edge deployments can be substantially safer. More about edge networking How edge networking and IoT will reshape data centers Edge computing best practices How edge computing can help secure the IoT The most common IoT vulnerability occurs because many sensors and edge computing devices are running some kind of built-in web server to allow for remote access and management. This is an issue because many end-users don’t – or, in some cases, can’t – change default login and password information, nor are they able to seal them off from the Internet at large. There are dedicated gray-market search sites out there to help bad actors find these unsecured web servers, and they can even be found with a little creative Googling, although Joan Pepin, CISO at security and authentication vendor Auth0, said that the search giant has taken steps recently to make that process Continue reading
The edge computing company is open sourcing some of the code through the Telecom Infra Project.
The boost is a virtual security processing unit (SPU) technology that powers VNFs for delivering...
The startup will boost Palo Alto Networks’ ability to use artificial intelligence and machine...
The executive missives come as some European operators have expressed concern that their 5G plans...
Pure Storage today announced ObjectEngine and DirectFlash Fabric, products aimed at improving...
Alooma developed a data pipeline tool that helps enterprises move their data from multiple sources...