Technology Cybersecurity January 30, 2019updated 07 Feb 2019 4:27pm How to Cover Security Holes Left by Edge Computing Edge computing is beneficial, but it can lead to gaps in security via unpatched devices. Quest Software's Jennifer LuPiba joined Global Data's Kathryn Weldon to discuss the issues... By CBR Staff Writer View all newsletters Sign up to our newsletters Data, insights and analysis delivered to you By The Tech Monitor team Sign up here Content from our partners The hidden complexities of deploying AI in your business When it comes to AI, remember not every problem is a nail An evolving cybersecurity landscape calls for multi-layered defence strategies Topics in this article : Jennifer LuPiba , Quest Software CBR Staff Writer CBR Online legacy content