Immunizing Edge Computing

Categories: Digital TransformationInsightsTechnology

Edge computing aims to take computation execution resources out of traditional data centers and bring them as close as possible to the location where they are needed. Hand-held devices, appliances, or physical units, typically within or at the boundary (edge) of access networks are providing low latency, high bandwidth, and more secure computing and storage.

How can businesses in the telecom, automotive, manufacturing, and IoT industries protect themselves from cyber risks if they employ edge computing? Learn about edge computing in detail, its meaning to different sectors, and security threats such as DDoS, side-channel, malware injection, and authentication and authorization attacks. Each threat description includes possible defense mechanism solutions.

Authors

4aa901e7ab8295f07139911c8bed1ae6?s=256&d=mm&r=g

Author

Ashish Garg

View all Articles

4aa901e7ab8295f07139911c8bed1ae6?s=256&d=mm&r=g

Author

Bipin Gupta

View all Articles

Top Insights

Manchester City Scores Big with GlobalLogic

Manchester City Scores Big with GlobalLogic

AI and MLBig Data & AnalyticsCloudDigital TransformationExperience DesignMobilitySecurityMedia
Twitter users urged to trigger SARs against energy companies

Twitter users urged to trigger SARs against energy...

Big Data & AnalyticsDigital TransformationInnovation
Retail After COVID-19: How Innovation is Powering the New Normal

Retail After COVID-19: How Innovation is Powering the...

Digital TransformationInsightsConsumer and Retail

Top Authors

Yuriy Yuzifovich

Yuriy Yuzifovich

Chief Technology Officer, AI

Chet Kolley

Chet Kolley

SVP & GM, Medical Technology BU

Amit Handoo

Amit Handoo

Vice President, Client Engagement

Richard Lett

Richard Lett

VP of Healthcare Technology

Top Insights Categories

  • URL copied!