Debunking cyber security misconceptions about edge computing
The first layer, Network segmentation is essential as the edge perimeter expands. It works by breaking up a computer network into segments, enabling better control of data traffic and also limiting how far an attack can spread.
This can be further improved using data diodes and unidirectional gateways, which allow traffic to flow in one direction only, preventing sensitive data to be leaked should an edge device be compromised.
Next is an intrusion detection system which can identify and alert users of potentially malicious traffic that could damage, disrupt service, or impact availability of systems running on the edge.
Read full article
Blockchain’s Disruptive Potential in Academia is Massive
Blockchain has been receiving considerable attention from a score of industries and audiences due to its promises of immutable, decentralized, and verifiable data management. Despite these characteristics offering a substantial draw for both academia and other industries, it is the social benefits of a trustless system enabling seamless peer-to-peer interaction within a decentralized network, that academic institutions have latched onto. Is there a need for blockchain adoption within universities?
How Oxen Is Using Blockchain to Build a “Private Future for Internet”
Oxen is essentially a developer platform for privacy tools. It offers a wide range of tools, libraries, and end-user products aimed at solving many of the challenging issues plaguing the digital security space.
The Oxen network is powered by the project’s homegrown blockchain, which also facilitates a parallel privacy-friendly cryptocurrency network that guarantees fast and anonymous transactions.
The Oxen Service Nodes, a distributed network of community-operated nodes, powers the platform’s native blockchain. These nodes are instrumental in ensuring that all features and services offered by the network operate smoothly round the clock.
Read full article