Watch on YouTube
Watch on Vimeo
In this Edge Field Day roundtable discussion, the delegates take on the delicate balance between privacy and security, particularly in the context of data privacy at the edge. The vulnerabilities of widely distributed data and remote devices were highlighted, with examples like the Pegasus spyware serving as stark reminders of potential threats. The ‘zero trust’ approach was emphasized for continuous verification of edge device security. The conversation explored the physical security aspects of devices and the potential for edge devices to enhance authentication security, citing Apple’s pass-key technology. It also considered the challenges and prospects of using edge computing for security, particularly focusing on the impact of privacy, law enforcement surveillance, and the ethical dimensions of technology. The overarching message stressed the importance of prioritizing societal benefits as technology continues to evolve.
Personnel: Tom Hollingsworth
Thank you for being part of the Tech Field Day community! Our mailing list is a great way to stay up to date on our events and technical content, and we appreciate your signup.
We promise that we’ll never spam you, send ads, or sell your information. This list will only be used to communicate with our community about our events and content. And we’ll limit it to no more than one message per week.
Although we only need your email address, it would be nice if you provided a little more information to help us get to know you better!