
Computing
Are Security Threats Taking Away The Potential Of Edge Computing?
By Parth Subedhar

Updated on Tue, Mar 14, 2023
Edge computing makes it possible to process information as close to the source as possible. The aim is to reduce the delay in sending information from a source point to data centers for computation to then receive it again. Instead, the processing is done locally, which reduces latency and offers higher efficiency.
(For a more in-depth explanation, read this: edge computing.)
Along with that, edge computing offers advantages in the form of speedy processing (believed to be faster than cloud computing), cost-saving, enhanced privacy and higher reliability among others. Also, by becoming less expensive by the day, more businesses are making use of its advantages in easing everyday operations.
Jake Cowans, Founder and COO of Company Scouts believes, “The majority of businesses' data will be created on-premises by 2023. With edge computing, this data set can be transmitted in what amounts to real-time.”
According to IDC, the global spend on edge computing solutions is expected to reach $274 billion by 2025, while another report suggests its market valuation in 2022 was $44.7 billion and is expected to go past $101.3 billion by 2028. Additionally, experts believe it will soon be a “must-have” rather than a luxury.
Even Kris Lovejoy, Global Security and Resilience Leader at Kyndryl validates, “To stay competitive, companies will be forced to adopt edge computing.”

“However, with a more distributed landscape of advanced IT systems comes a higher risk of unwanted exposure to cyber risks,” Kris Lovejoy added.
Despite its advantages, edge computing comes with a host of security attacks, especially those that can lead to compromises in privacy, integrity, connectivity to central/cloud systems and overall functionality.
Richard Yew, Sr. Director Product Management - Security at Edgio believes edge computing requires stronger security measures. He asks, “What else is also getting distributed? The attacks,” and further added, “Whether data is stored on-premises, in the cloud or at the edge, proper safeguards for authentication and authorization must always be ensured, else (organizations) run the risk of a data breach.”
According to Yew, the biggest attack categories consist of distributed denial-of-service (DDoS) attacks, cache poisoning, side-channel attacks, injection attacks, authentication and authorization attacks and man-in-the-middle (MITM) attacks. He believes these kinds of threats are “not dissimilar to the types of threats to web applications hosted on-premises or in a hybrid cloud environment.”
He added, “Edge computing environments are still subject to many of the same threat vectors that must be managed in cloud computing.” Though, the distributed nature of edge computing opens the door to attacks at different points, i.e., the edge, in the cloud and during transit between the two.

Kris Lovejoy believes zero trust is important in this case, saying, “Zero trust is typically not about implementing more or new security systems, but more to interconnect your existing security tools in a way that they work together. This will require organizations to change operating models from a siloed to more of a collaborative operation.”
Edge computing offers fast and cost-effective solutions for enhanced operations in businesses but also increases exposure to security threats and attacks. What do you think of edge computing’s benefits versus its security flaws? Let us know in the comments below!
First published on Tue, Mar 14, 2023
Liked what you read? That’s only the tip of the tech iceberg!
Explore our vast collection of tech articles including introductory guides, product reviews, trends and more, stay up to date with the latest news, relish thought-provoking interviews and the hottest AI blogs, and tickle your funny bone with hilarious tech memes!
Plus, get access to branded insights from industry-leading global brands through informative white papers, engaging case studies, in-depth reports, enlightening videos and exciting events and webinars.
Dive into TechDogs' treasure trove today and Know Your World of technology like never before!
Disclaimer - Reference to any specific product, software or entity does not constitute an endorsement or recommendation by TechDogs nor should any data or content published be relied upon. The views expressed by TechDogs' members and guests are their own and their appearance on our site does not imply an endorsement of them or any entity they represent. Views and opinions expressed by TechDogs' Authors are those of the Authors and do not necessarily reflect the view of TechDogs or any of its officials. While we aim to provide valuable and helpful information, some content on TechDogs' site may not have been thoroughly reviewed for every detail or aspect. We encourage users to verify any information independently where necessary.
Trending TD NewsDesk
HR Tech: Rippling Raises $450M, New Microsoft AI Features & Awardees Revealed
By TechDogs Bureau
OpenAI Expands Presence In Asia, Announces CEO Of Applications & Enhances ChatGPT’s Deep Research
By TechDogs Bureau
EdTech Company Pearson & SK Telecom Face Hacks As Meta Beats Spyware Firm NSO
By TechDogs Bureau
Apple’s Testimony Wipes Out $150 Billion From Google Amid New AI Model Launch
By TechDogs Bureau
CrowdStrike, IBM, Google & PwC Navigate Continued Layoffs In 2025 Amid AI-Driven Workforce Shifts
By TechDogs Bureau
Join Our Newsletter
Get weekly news, engaging articles, and career tips-all free!
By subscribing to our newsletter, you're cool with our terms and conditions and agree to our Privacy Policy.
Join The Discussion