Immunizing Edge Computing

Edge computing aims to take computation execution resources out of traditional data centers and bring them as close as possible to the location where they are needed. Hand-held devices, appliances, or physical units, typically within or at the boundary (edge) of access networks are providing low latency, high bandwidth, and more secure computing and storage.

How can businesses in the telecom, automotive, manufacturing, and IoT industries protect themselves from cyber risks if they employ edge computing? Learn about edge computing in detail, its meaning to different sectors, and security threats such as DDoS, side-channel, malware injection, and authentication and authorization attacks. Each threat description includes possible defense mechanism solutions.

Authors

Edge computing

Author

Ashish Garg

View all Articles

Edge computing

Author

Bipin Gupta

View all Articles

Insight category

Top Categories

Top Authors

Orkhan Gasimov

Orkhan Gasimov

Head of CEE Technology Office, Director

Volodymyr Trishyn

Volodymyr Trishyn

Senior Software Engineer

Viktor Klymenko

Viktor Klymenko

Consultant

Alex Pereverzyev

Alex Pereverzyev

Software Architect

Gene Leybzon

Gene Leybzon

Chief Architect

Archive

Check out our previous articles

Load Archives