C h a p t e r 1
As edge computing expands, organizations
are discovering the necessity of
embedding robust security mechanisms
into their systems.
Edge devices, which operate outside
traditional centralized security
infrastructures, face unique risks
because of their decentralized and often
remote nature. From smart factories and
healthcare applications to autonomous
vehicles and critical infrastructure, edge
devices are integral to daily operations.
However, this increased reliance on
edge technology comes with growing
concerns about security vulnerabilities,
making compliance with emerging
regulations essential.
Edge computing creates a larger attack
surface because of its distribution
across multiple environments—many
of which are beyond an organization's
direct control. Unlike cloud servers, edge
devices are often deployed in less secure
locations such as on factory floors, in
homes, or in transportation networks,
exposing them to both hardware and
software attacks. If these devices are
compromised, attackers can infiltrate
larger networks or execute cascading
attacks across interconnected systems.
THE NEED FOR SECURITY
AND COMPLIANCE
Rasma Araby
Managing Director, atsec information AB
Edge computing connects a vast
array of devices, significantly
expanding the potential attack
surface. Each edge device, node,
and communication channel
creates a new point of vulnerability
that attackers can exploit."
6
7 Experts Discuss Managing Security Risk and Regulatory Compliance at the Edge