TL;DR —
The recent news of the Verkada hack that breached 150,000 surveillance cameras sent shockwaves through the security world. As intelligent systems increasingly expand into the field, we’ll see more and more attacks of this sort if we continue to leverage the same security stance and tools that we used for decades. In this article, I will go through a few of the widely-cited edge breaches in the industry and highlight how a zero trust security model optimized for the unique challenges of the edge would have helped prevent them from happening.
[story continues]
Written by
@jasonshepherd
VP of Ecosystem, ZEDEDA
Topics and
tags
tags
hack|iot|zero-trust|stuxnet|edge|edge-computing|security|cybersecurity
This story on HackerNoon has a decentralized backup on Sia.
Transaction ID: TJJaX0U8C_qPhjHc9K1qbgH3D9hF6KNV5MT8nZqDXLk
