PRO+ Premium Content/Business Information
Access your Pro+ Content below.
IoT, edge computing spawn new security issues
This article is part of the Business Information issue of April 2018, Vol. 6, No. 2
In the beginning, the internet was created. It was thought to be good and evolved into internet of things that compute collected data out on the edge. Then, the edge begat fog computing, and the fog brought forth many new concerns about data security and privacy. The breathe-in, breathe-out cycle of enterprise processing power -- that endless loop of centralize and decentralize that defined the past few decades -- has always heralded in new security paradigms. So as we watch IoT and edge computing morph into fog computing and as the enterprise necessarily becomes more dependent on mobile computing to get its daily chores done, we shouldn't be at all surprised to see yet another layer of security developing around us. In simple terms, the more doors and windows that are placed in a building, the more breaking and entering avenues are created for thieves. Which begs the question: How are we securing all these doors and windows? Sudden vulnerability as fog sets in A brief Google search reveals that the biggest security threats to ...
Features in this issue
-
GDPR requirements put focus on data ethics, governance
The General Data Protection Regulation makes privacy paramount and reinforces the practice of good data governance. Will a new focus on data ethics be an important side effect?
-
Data integrity protection spurs greater security spending
As hacking, ransomware and malware attacks mount, companies place big data protection and integrity among the primary reasons for increased spending on security software.
Columns in this issue
-
U.S. data protection laws fall short in the age of big data
Data breaches and a history of data abuse led the EU to adopt GDPR, but it might take massive scale data security crises for the U.S. to legislate similar data protection laws.
-
IoT, edge computing spawn new security issues
As real-time big data increasingly hitches up to internet of things, edge computing power and fog nodes, a whole new layer of security threats emerges.