Securing the IoT Edge (Part 1)

Written by jasonshepherd | Published 2020/09/30
Tech Story Tags: iot | internet-of-things | security | edge-computing | technology | edge | iot-applications | iot-services

TLDR In this two-part blog series, we will review the unique security implications of a distributed edge and how organizations can secure the edge. Not all edge locations are created equally when it comes to security. Practices for securing deployments at the cloud edge and within secured telecommunications infrastructure (e.g., cell tower facilities), modular data centers, etc., tend to be quite similar to traditional data centers. As edge deployments get closer to the physical world, they face unique security challenges. The IoT edge is inherently heterogeneous, comprised of a variety of technologies including sensors, communication protocols, hardware types, operating systems, control systems, networks.via the TL;DR App

no story

Written by jasonshepherd | VP of Ecosystem, ZEDEDA
Published by HackerNoon on 2020/09/30