paint-brush
A Guide to Enhancing Security at the IoT Edge (Part 2)by@jasonshepherd
155 reads

A Guide to Enhancing Security at the IoT Edge (Part 2)

by Jason Shepherd5mOctober 6th, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

In part 1 of this blog series, we covered some of the characteristics that make security different at the edge compared to the cloud. The next generation of computing is now upon us, representing both a return to the familiar distributed model and a breakthrough in rethinking how we handle data. In this blog, we’ll be going over ten baseline recommendations for securing IoT edge deployments. For example, the Mirai botnet attack that leveraged a DDoS attack that took down a portion of the internet in 2016 involved millions of cameras that shared a small number of common credentials.

Coin Mentioned

Mention Thumbnail
featured image - A Guide to Enhancing Security at the IoT Edge (Part 2)
Jason Shepherd HackerNoon profile picture
Jason Shepherd

Jason Shepherd

@jasonshepherd

VP of Ecosystem, ZEDEDA

Learn More
LEARN MORE ABOUT @JASONSHEPHERD'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Jason Shepherd HackerNoon profile picture
Jason Shepherd@jasonshepherd
VP of Ecosystem, ZEDEDA

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Learnrepo
Coffee-web
Zededa