TPU Inference Servers for Efficient Edge Data Centers - DOWNLOAD

Edge Security

Edge security refers to both technology and services that are used to protect assets such as data, as well as the issues associated with ensuring an organization’s assets and intellectual property are protected. In terms of products and services, edge security refers to where compute, network and storage resources are used to help secure applications, devices, and services.

 

March ends like a lion for edge-related news from CDN vendors

Three product announcements from content delivery network vendors CenturyLink, StackPath, and Limelight Networks that touch on edge services popped up…

 

Edge device security the focus of FIDO Alliance effort

In its ongoing fight to secure the IoT with FIDO passwordless authentication, the FIDO Alliance has established a dedicated IoT…

 

Monnit boosts IoT security with end-to-end data authentication platform

Monnit has introduced SensorPrints, an end-to-end IoT data authentication platform for low-power wireless sensors based on a unique device fingerprint,…

 

Security Roundup: edge security at risk following disinterest in mobile security, malware-free attack growth

With a growing attack surface and an elaborate threat landscape, securing edge environments is a critical consideration for enterprises. Malware-free…

 

Nok Nok offers up edge device authentication for IoT

This article originally appeared on BiometricUpdate.com. IoT devices can be a security nightmare for businesses and consumers, and now that…

 

Money in bank, CybelAngel sets about adding capabilities for data leak detection, remediation services

CybelAngel, a provider of digital risk management services is introducing a number of enhancements to its data leak detection platform…

 

ICS, OT-targeted attacks register 2,000% increase, Mirai hits enterprise-grade hardware

Targeted cybersecurity attacks launched against Industrial Control Systems (ICS) and Operational Technology (OT) assets have gone up more than 2,000%…

 

Confidential Computing Consortium promises data-in-use encryption, researcher warns encrypted traffic remains vulnerable

While public cloud services are affordable and flexible, some of the risks around lax security and reduced control over data…

 

Trusted Computing Group releases software, firmware guidelines for IoT systems

Amid growing industry interest in IoT security, the Trusted Computing Group (TCG) has released an updated set of recommendations addressing…

 

NIST looking for partners to develop data security and confidentiality best practices

The National Institute of Standards and Technology is starting two projects focused on data security and confidentiality best practices, according…

Featured Edge Computing Company

Edge Ecosystem Videos

Latest News