Articles
‘Crowd Control’ Takes Many Forms to Secure Fog Computing and IoT
2 min read
Crowd Attestation uses fog computing to provide security services to resource-constrained devices and systems.
Malware Defense is a Team Sport, Best Played by Collaborative Fog Nodes
3 min read
In my previous blog, I shared an overview of fog-based security services. At the center of these services—and critical for moving the needle on the Internet of Things—is a requirement for ubiquitous malware defense for a large number of devices with vastly diverse capabilities. Through fog, this is possible. Malware-defense tasks, which require heavy resources, […]
Fog Boosts Capabilities to Add More Things Securely to the Internet
3 min read
Host-based security mechanisms and cloud-based security services are our primary means to secure endpoints. However, these methods alone will fall short for meeting the security challenges in the emerging Internet of Things, where we must support a significantly larger number of endpoints, many of which are highly resource-constrained.
A New Security Paradigm Needed to Support the Internet of Things
2 min read
Shutdown. Cleanup. Restart. This “incident response” approach to cyber security was designed primarily for enterprise networks, data centers, and consumer electronics. It companies perimeter-based protection that uses firewalls, intrusion detection systems (IDS) and intrusion prevention systems (IPS) to prevent security threats. When threats penetrate perimeter-based protections, human operators typically shut down the compromised system, clean […]