{"id":43357,"date":"2021-10-12T09:00:00","date_gmt":"2021-10-12T09:00:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/"},"modified":"2021-10-12T09:00:00","modified_gmt":"2021-10-12T09:00:00","slug":"edge-computing-5-potential-pitfalls","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/","title":{"rendered":"Edge computing: 5 potential pitfalls"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2021\/10\/spot_edgecomputing_nww_by_andre_popov_shutterstock_2400x1600_primary-6-100906318-large.jpg?auto=webp\" class=\"ff-og-image-inserted\"><\/div>\n<p>Edge computing is gaining steam as an enterprise IT strategy with organizations looking to push storage and analytics closer to where data is gathered, as in IoT networks. But it\u2019s got its challenges.<\/p>\n<aside class=\"sidebar medium\">\n<h3 class=\"body\">Tech Spotlight: <br \/><a href=\"https:\/\/www.networkworld.com\/article\/3636499\/edge-computing-the-architecture-of-the-future.html\">Edge Computing<\/a><\/h3>\n<\/aside>\n<p>Its potential upsides are undeniable, including improved latency as well as reduced WAN bandwidth and transmission costs. As a result, enterprises are embracing it. Revenues in the edge-computing market were $4.68 billion in 2020 and are expected to reach $61.14 billion by 2028, according to a May 2021 report by Grand View Research.<\/p>\n<p>But the edge is also fraught with potential difficulties, and companies need to be prepared to address them if they expect to reap the benefits. Here are some of the hurdles organizations could face when deploying <a href=\"https:\/\/www.networkworld.com\/article\/3224893\/what-is-edge-computing-and-how-it-s-changing-the-network.html\">edge computing<\/a>, some of which might not be obvious.<\/p>\n<h2>Choosing the best approach<\/h2>\n<p>Because edge computing is still relatively new there\u2019s no established base of success stories or metrics that prove its worth to IT decision makers.<\/p>\n<p>\u201cI think the one of the biggest challenges for edge decisions right now that no one really talks about is that there is very little real-world performance data available to help drive edge-deployment decisions,\u201d says Jennifer Cooke, research director, edge strategies, at IDC.<\/p>\n<p>Plus, there are many options to pick from\u2014on-prem, hosted on-prem, managed by ISPs or cloud providers\u2014and sorting through them may be beyond the capabilities of many enterprises.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id> <\/aside>\n<p>\u201cThere\u2019s a myriad of choices out there, but it&#8217;s often overwhelming for organizations to navigate,\u201d Cooke says. \u201cThe reality is that edge solutions require a lot of coordination across different providers\u2014from the database and applications to the infrastructure and then the connectivity.&nbsp;For this reason, many organizations are turning to partners to assemble the ecosystem for them.\u201d<\/p>\n<p>As part of the process, these organizations should seek edge-integration partners that can quantify the increased performance and cost reductions that vendors tout.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id> <\/aside>\n<p>\u201cI\u2019ve also observed a recent shift from a [do-it-yourself] attitude on edge deployments to accepting that it\u2019s often better to lean on partners to manage edge resources,\u201d Cooke says. \u201cThe pandemic actually accelerated this trend, showing organizations that remote monitoring and leaning on partners for management actually worked pretty well.\u201d<\/p>\n<h2>Security risks and expertise<\/h2>\n<p>As with anything else related to IT, the edge has its own set of security threats and vulnerabilities.<\/p>\n<p>\u201cHow does an organization fully consider the many layers and subsegments and achieve a <a href=\"https:\/\/www.networkworld.com\/article\/3487720\/the-vpn-is-dying-long-live-zero-trust.html\">zero-trust environment<\/a>?\u201d says Matt Kimball, senior analyst,&nbsp;data center, at&nbsp;Moor Insights &amp; Strategy.<\/p>\n<p>\u201cThis has to include infrastructure, networking, the full software stack, and the integration of all these different elements with each other, the cloud, and management and monitoring consoles,\u201d Kimball says. \u201cThis market segment is so layered and in some ways so nichey that CISOs and IT executives need to invest heavily in the people that are tasked with designing and implementing a holistic strategy. And <a href=\"https:\/\/www.networkworld.com\/article\/3633191\/gartner-it-skills-shortage-hobbles-cloud-edge-automation-growth.html\">those people are hard to find<\/a>.\u201d<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id> <\/aside>\n<p>The security risks that organizations should keep in mind before formulating an edge strategy include the potentially enormous number of IoT devices and supporting infrastructure the edge requires, as well as the massive volumes of data they generate\u2014all of which need to be defended to protect data and the network.<\/p>\n<p>Some vendors provide tools to help bolster edge security, Kimball says. \u201cBut again, the challenge is finding the people that can make sense of all of these challenges, competing solutions, and design a zero-trust environment\u2014one that is fully integrated from the device to the edge to the cloud to the data center,\u201d he says.<\/p>\n<h2>Supporting data management and analytics<\/h2>\n<p>Being able to analyze data at the edge and draw insights from the analytics is one of the appealing aspects of this environment, but the process is not easy for enterprises.<\/p>\n<p>\u201cThe edge is basically a large-scale distributed data-management problem statement,\u201d says Vijoy Pandey, vice president of engineering and CTO, emerging technologies and incubation, at Cisco.<\/p>\n<aside class=\"nativo-promo nativo-promo-3 tablet desktop smartphone\" id> <\/aside>\n<p>Data management and data science are as important as security to the business success of organizations, Kimball says. \u201cIt should be no surprise that the company that can more quickly derive nuggets of intelligence out of the mounds of data being generated every second is the company best positioned to win,\u201d he says.<\/p>\n<p>Like security, data science is hard and practitioners scarce, Kimball says. \u201cAnd I believe this is equal parts technical and art,\u201d he says.&nbsp;\u201cThe tools must be in place to glean the best insights. But a good data scientist understands the nuances of what data [is] most important to the business. And like security, the folks that are good at this are in high demand.\u201d<\/p>\n<p>This is an area where organizations can benefit from an outside perspective, Kimball says. \u201cThere are consulting organizations, VARs, and specialists that get this space very well and have had success in deploying the data edge,\u201d he says. \u201cAs an ex-IT executive, I can tell you that I despised having to go outside my organization to drive IT initiatives. But I also knew that relying on outside help for uncharted waters always paid off.\u201d<\/p>\n<h2>Prepping the IT infrastructure<\/h2>\n<p>Creating a network to support edge computing takes time, money, and knowledge\u2014resources that not every organization has enough of.<\/p>\n<p>\u201cIT is used to shipping a few servers and implementing the backup necessary for home-office connectivity,\u201d Kimball says. \u201cLook at any chain [retailer], and you\u2019ll see a couple of servers that are used to connect to the home office and run operations locally in the event of a break in connectivity.\u201d<\/p>\n<p>But with IoT deployments and the need for more complex storage and data processing at the edge, now those environments have to do more than simply run the back office, Kimball says.&nbsp;\u201cAs a result, deploying and managing these environments is more critical and challenging than ever,\u201d he says.<\/p>\n<p>In general, a good practice is to keep things simple when it comes to infrastructure and IT operations, Kimball says. \u201cI believe most of the IT-solutions vendors have viable and solid offerings from a hardware and software infrastructure perspective,\u201d he says.<\/p>\n<p>Because of this, he suggests that when IT executives are looking to invest in edge infrastructure, they should start by considering the vendors they already know.<\/p>\n<p>\u201cIf you\u2019re an IT shop that has standardized on Dell, it is probably your best starting point for edge infrastructure,\u201d Kimball says.&nbsp;\u201cLikewise HPE, Lenovo, Cisco, Supermicro, etc.\u201d<\/p>\n<p>Duos Technologies, which provides automated edge systems for railway operators, faces challenges providing connectivity and power when it deploys those systems in remote areas.<\/p>\n<p>\u201cBut these are relatively straightforward obstacles to scale in most cases,\u201d says Scott Carns, Duos\u2019 chief commercial officer. More challenging is finding ruggedized servers that can operate in the same environment. \u201cMost servers are designed to be installed in data centers and IT environments that are brick and mortar, with perfect power and environmental control systems.\u201d<\/p>\n<p>Edge computing for Duos Technologies\u2019 applications requires robust, well-designed hardware. While its servers are mounted in traditional cabinets or racks, \u201cthe operating environment does not have the same level of continuity and protection a <a href=\"https:\/\/www.networkworld.com\/article\/3599213\/what-are-data-centers-how-they-work-and-how-they-are-changing-in-size-and-scope.html\">data center<\/a> would provide,\u201d Carns says.<\/p>\n<h2>Scaling without creating complexity<\/h2>\n<p>The edge has the potential to be extraordinarily complex, given the number of systems, devices, and applications involved.<\/p>\n<p>\u201cMost edge investments [have been] driven by the need to solve a specific business problem by a non-IT business owner,\u201d says Gil Shneorson, senior vice president, edge portfolio, at Dell.<\/p>\n<p>As a result, organizations may have multiple individual edge devices performing specific tasks and operating off their own infrastructure. Each solution was bought, deployed, managed, and secured independently over time, leading to inefficient infrastructure sprawl at the edge, Shneorson says.<\/p>\n<p>\u201cWe\u2019re seeing a transition in the industry where IT is called in earlier in the process so they can apply IT best practices and strategic thinking to the edge environment across multiple use cases,\u201d he says.<\/p>\n<p>Being called in earlier is a good idea, but for many IT teams, that means having to architect a single, flexible, efficient infrastructure to support more edge tasks. IT needs to consolidate even as the edge expands, \u201cby modernizing their edge technology foundation and data pipelines with consistent hybrid-cloud architecture, operations, and management, so they can derive the most value from data across use cases, sites, and clouds,\u201d Shneorson says. Meeting that challenge is a major step forward.<\/p>\n<div class=\"end-note\"> <!-- blx4 #2005 blox4.html --> <\/p>\n<div id class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">Join the Network World communities on <a href=\"https:\/\/www.facebook.com\/NetworkWorld\/\" target=\"_blank\" rel=\"noopener\">Facebook<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/network-world\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a> to comment on topics that are top of mind. <\/div>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3634191\/edge-computing-5-potential-pitfalls.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nEdge computing is gaining steam as an enterprise IT strategy with organizations looking to push storage and analytics closer to where data is gathered, as in IoT networks. But it\u2019s got its challenges.<br \/>\nTech Spotlight: Edge Computing<\/p>\n<p>Proving the value of analytics on the edge (CIO)<br \/>\nThe cutting edge of healthcare: How edge computing will transform medicine (Computerworld)<br \/>\nSecuring the edge: 4 trends to watch (CSO)<br \/>\nHow to choose a cloud IoT platform (InfoWorld)<br \/>\nEdge computing: 5 potential pitfalls (Network World)<\/p>\n<p>Its potential upsides are undeniable, including improved latency as well as reduced WAN bandwidth and transmission costs. As a result, enterprises are embracing it. Revenues in the edge-computing market were $4.68 billion in 2020 and are expected to reach $61.14 billion by 2028, according to a May 2021 report by Grand View Research.To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":43358,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[9686,376,1061,762],"class_list":["post-43357","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-edge-computing","tag-internet-of-things","tag-network-security","tag-networking"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Edge computing: 5 potential pitfalls 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Edge computing: 5 potential pitfalls 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-12T09:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/edge-computing-5-potential-pitfalls.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Edge computing: 5 potential pitfalls\",\"datePublished\":\"2021-10-12T09:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/\"},\"wordCount\":1426,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/edge-computing-5-potential-pitfalls.jpg\",\"keywords\":[\"Edge Computing\",\"Internet of Things\",\"Network Security\",\"Networking\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/\",\"name\":\"Edge computing: 5 potential pitfalls 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/edge-computing-5-potential-pitfalls.jpg\",\"datePublished\":\"2021-10-12T09:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/edge-computing-5-potential-pitfalls.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/edge-computing-5-potential-pitfalls.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Edge Computing\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/edge-computing\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Edge computing: 5 potential pitfalls\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Edge computing: 5 potential pitfalls 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/","og_locale":"en_US","og_type":"article","og_title":"Edge computing: 5 potential pitfalls 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-10-12T09:00:00+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/edge-computing-5-potential-pitfalls.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Edge computing: 5 potential pitfalls","datePublished":"2021-10-12T09:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/"},"wordCount":1426,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/edge-computing-5-potential-pitfalls.jpg","keywords":["Edge Computing","Internet of Things","Network Security","Networking"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/","url":"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/","name":"Edge computing: 5 potential pitfalls 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/edge-computing-5-potential-pitfalls.jpg","datePublished":"2021-10-12T09:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/edge-computing-5-potential-pitfalls.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/edge-computing-5-potential-pitfalls.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/edge-computing-5-potential-pitfalls\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Edge Computing","item":"https:\/\/www.threatshub.org\/blog\/tag\/edge-computing\/"},{"@type":"ListItem","position":3,"name":"Edge computing: 5 potential pitfalls"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43357"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43357\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/43358"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}