paint-brush
Securing the IoT Edge (Part 1)by@jasonshepherd
268 reads

Securing the IoT Edge (Part 1)

by Jason Shepherd3mSeptember 30th, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

In this two-part blog series, we will review the unique security implications of a distributed edge and how organizations can secure the edge. Not all edge locations are created equally when it comes to security. Practices for securing deployments at the cloud edge and within secured telecommunications infrastructure (e.g., cell tower facilities), modular data centers, etc., tend to be quite similar to traditional data centers. As edge deployments get closer to the physical world, they face unique security challenges. The IoT edge is inherently heterogeneous, comprised of a variety of technologies including sensors, communication protocols, hardware types, operating systems, control systems, networks.

Company Mentioned

Mention Thumbnail
featured image - Securing the IoT Edge (Part 1)
Jason Shepherd HackerNoon profile picture
Jason Shepherd

Jason Shepherd

@jasonshepherd

VP of Ecosystem, ZEDEDA

Learn More
LEARN MORE ABOUT @JASONSHEPHERD'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Jason Shepherd HackerNoon profile picture
Jason Shepherd@jasonshepherd
VP of Ecosystem, ZEDEDA

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite