A Guide to Enhancing Security at the IoT Edge (Part 2)

Written by jasonshepherd | Published 2020/10/06
Tech Story Tags: iot | internet-of-things | edge-computing | security | cybersecurity | cyber-security | cyber-threats | cyber-security-awareness

TLDR In part 1 of this blog series, we covered some of the characteristics that make security different at the edge compared to the cloud. The next generation of computing is now upon us, representing both a return to the familiar distributed model and a breakthrough in rethinking how we handle data. In this blog, we’ll be going over ten baseline recommendations for securing IoT edge deployments. For example, the Mirai botnet attack that leveraged a DDoS attack that took down a portion of the internet in 2016 involved millions of cameras that shared a small number of common credentials.via the TL;DR App

no story

Written by jasonshepherd | VP of Ecosystem, ZEDEDA
Published by HackerNoon on 2020/10/06