Securing edge devices – how to keep the crooks out of your network

    Date30 Apr 2019
    Posted ByBrittany Day
    Cta Sedge.001

    We spend a lot of our online time out and about these days, using our mobile phones and connecting over cellular networks or public Wi-Fi…

    …but most of us still have a network that we think of as ours, which we treat differently to the rest of the internet, the giant part that’s theirs.

    Whether we’re at work or at home, we still have the notion of an edge to our network – that’s edge as in boundary, where we typically set up a router or a firewall to keep the inside and outside apart.

    LinuxSecurity Poll

    What do you think of the LinuxSecurity Privacy news articles?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"90","title":"Love them!","votes":"53","type":"x","order":"1","pct":86.89,"resources":[]},{"id":"91","title":"I'm indifferent","votes":"6","type":"x","order":"2","pct":9.84,"resources":[]},{"id":"92","title":"Not interested in this topic","votes":"2","type":"x","order":"3","pct":3.28,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.