Immunizing Edge Computing

Categories: InsightsDigital TransformationTechnology

Edge computing aims to take computation execution resources out of traditional data centers and bring them as close as possible to the location where they are needed. Hand-held devices, appliances, or physical units, typically within or at the boundary (edge) of access networks are providing low latency, high bandwidth, and more secure computing and storage.

How can businesses in the telecom, automotive, manufacturing, and IoT industries protect themselves from cyber risks if they employ edge computing? Learn about edge computing in detail, its meaning to different sectors, and security threats such as DDoS, side-channel, malware injection, and authentication and authorization attacks. Each threat description includes possible defense mechanism solutions.

Authors

Edge computing

Author

Ashish Garg

View all Articles

Edge computing

Author

Bipin Gupta

View all Articles

Top Insights

Best practices for selecting a software engineering partner

Best practices for selecting a software engineering partner

SecurityDigital TransformationDevOpsCloudMedia
7 RETAIL TRENDS POWERED BY MOBILE

7 RETAIL TRENDS POWERED BY MOBILE

MobilityConsumer and RetailMedia
My Intro to the Amazing Partnership Between the US Paralympics and the Telecom Industry

My Intro to the Amazing Partnership Between the...

Experience DesignPerspectiveCommunicationsMediaTechnology
Adaptive and Intuitive Design: Disrupting Sports Broadcasting

Adaptive and Intuitive Design: Disrupting Sports Broadcasting

Experience DesignSecurityMobilityDigital TransformationCloudBig Data & AnalyticsMedia

Top Authors

Arun Viswanathan

Arun Viswanathan

Principal Architect

Hrushikesh Zadgaonkar

Hrushikesh Zadgaonkar

Solution Architect, Technology

Nimmanapalli Nikhil

Nimmanapalli Nikhil

Senior Software Engineer

Naveen Bhalla

Naveen Bhalla

Senior Consultant, Business Solutions

Vijai Verma

Vijai Verma

Senior Solution Architect

Blog Categories

  • URL copied!