Articles
‘Crowd Control’ Takes Many Forms to Secure Fog Computing and IoT
In my previous blog, I shared the importance of ubiquitous malware defense. Specifically, it’s critical as the Internet of Things (IoT) continues to proliferate, connecting a larger number of devices with vastly diverse capabilities. The answer is fog computing, because fog nodes bring more computin…
Malware Defense is a Team Sport, Best Played by Collaborative Fog Nodes
In my previous blog, I shared an overview of fog-based security services. At the center of these services—and critical for moving the needle on the Internet of Things—is a requirement for ubiquitous malware defense for a large number of devices with vastly diverse capabilities. Through fog, this is…
Fog Boosts Capabilities to Add More Things Securely to the Internet
Today, host-based security mechanisms and cloud-based security services are our primary means to secure endpoints. However, these methods alone will fall short for meeting the security challenges in the emerging Internet of Things, where we must support a significantly larger number of endpoints, ma…
A New Security Paradigm Needed to Support the Internet of Things
Shutdown. Cleanup. Restart. This “incident response” approach to cyber security was designed primarily for enterprise networks, data centers, and consumer electronics. It companies perimeter-based protection that uses firewalls, intrusion detection systems (IDS) and intrusion prevention systems (IPS…