The intersection of edge computing and cloud is creating new ways to leverage distributed and centralized computing. iStock
The age-old saying that “beauty is in the eye of the beholder” may help explain why virtually everyone has their own view on what we can expect from computing at the edge. For some it’s the realization of autonomous vehicles; for others it may be industrial automation or more effective monitoring of patient health. The reality is that edge is a concept that is subjective to an individual’s experience and vision, with applications and use cases still taking shape and many more not yet on the drawing board.
Were there cybersecurity blind spots revealed as a result of the COVID disruptions? Oh yeah:
Exploding amount of assets added. Used to be able to account for a laptop and maybe a phone. Now bc of WFH (work from home), people are adding multiple comps/ipads/etc. and accessing on their own networks. Need a tool that can find all assets and see if they present any danger Nick Gonzalez@nickg1421
easy… portable and flexible IAM (identity and access management). With consumption of services, use of legacy systems, and the remote environment, a robust IAM program is paramount. Going password-less, addressing trust models, and generally unify auth and identity proofing is key. Amélie E. Koran@webjedi