Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Grab it
Learn critical edge computing security strategies in this 34-minute conference talk from Erik Nordmark of ZEDEDA. Explore unique security challenges faced in edge computing environments compared to traditional datacenters, focusing on physical access vulnerabilities and supply chain integrity. Discover practical solutions for protecting edge devices from firmware and software attacks, maintaining security with unreliable network connections, and implementing effective supply chain attack prevention. Gain valuable insights from real-world deployments across industries like oil and gas and automotive retail, while understanding how Linux Foundation's EVE-OS specifically addresses edge computing security risks. Master essential security considerations through detailed examination of measured boot remote stations, content inspection proxies, and the three-layer security model, along with guidance on evaluating hardware suppliers and implementing application security measures.
Making the Edge Tamper-Proof: Security Challenges and Solutions in Edge Computing