Technology Cybersecurity January 30, 2019updated 07 Feb 2019 4:27pm How to Cover Security Holes Left by Edge Computing Edge computing is beneficial, but it can lead to gaps in security via unpatched devices. Quest Software's Jennifer LuPiba joined Global Data's Kathryn Weldon to discuss the issues... By CBR Staff Writer View all newsletters Sign up to our newsletters Data, insights and analysis delivered to you By The Tech Monitor team Sign up here Content from our partners Powering AI’s potential: turning promise into reality Unlocking growth through hybrid cloud: 5 key takeaways How businesses can safeguard themselves on the cyber frontline Topics in this article : Jennifer LuPiba , Quest Software CBR Staff Writer CBR Online legacy content