Access your Pro+ Content below.
IoT, edge computing spawn new security issues
This article is part of the Business Information issue of April 2018, Vol. 6, No. 2
In the beginning, the internet was created. It was thought to be good and evolved into internet of things that compute collected data out on the edge. Then, the edge begat fog computing, and the fog brought forth many new concerns about data security and privacy. The breathe-in, breathe-out cycle of enterprise processing power -- that endless loop of centralize and decentralize that defined the past few decades -- has always heralded in new security paradigms. So as we watch IoT and edge computing morph into fog computing and as the enterprise necessarily becomes more dependent on mobile computing to get its daily chores done, we shouldn't be at all surprised to see yet another layer of security developing around us. In simple terms, the more doors and windows that are placed in a building, the more breaking and entering avenues are created for thieves. Which begs the question: How are we securing all these doors and windows? Sudden vulnerability as fog sets in A brief Google search reveals that the biggest security threats to ...
Access this PRO+ Content for Free!
Features in this issue
The General Data Protection Regulation makes privacy paramount and reinforces the practice of good data governance. Will a new focus on data ethics be an important side effect?
As hacking, ransomware and malware attacks mount, companies place big data protection and integrity among the primary reasons for increased spending on security software.
Data security needs to be addressed upfront in deployments of big data systems -- and users are likely to find they have to build some security capabilities themselves.
Columns in this issue
Data breaches and a history of data abuse led the EU to adopt GDPR, but it might take massive scale data security crises for the U.S. to legislate similar data protection laws.
Data privacy expert and SAP consultant Stephen Lofthouse outlines a six-step process that data managers can follow to be compliant with GDPR regulations.
As real-time big data increasingly hitches up to internet of things, edge computing power and fog nodes, a whole new layer of security threats emerges.