Securing the edge: 5 best practices

For a growing number of companies, the “edge” of the enterprise network is an increasing focal point of IT investments. This is where they are aiming to bolster data storage, processing, and analytics capabilities to generate business insights from data gathered from...

4 ways edge computing changes your threat model

Many organizations have begun moving processing capabilities to edge locations or closer to where data is generated. This trend could open them up to new cyber risks that their threat models will need to take into account.The biggest concerns include an expanded...

Know your Edge Chromium security options

For those of you still using Windows 7, there’s a new browser on the block that you’ll need to start planning to deploy — and it’s not Edge. Well, it is an Edge browser, but not the Edge browser you are thinking of.Microsoft is scrapping its Edge browser based on the...