5 Steps For Securing IoT Deployments
IoT Agenda, October 28th, 2019
October 28, 2019,
Volume 259, Issue 5
Focusing the right people, processes and technology on IoT cybersecurity is a win-win; it can improve security operations and the success of IoT initiatives
"IoT represents a cybersecurity vulnerability that organizations can address with five steps to create an IoT-specific security strategy.
Organizations risk security when groups outside of IT deploy IoT without informing IT admins, as well as when their IoT initiative is a formal project in pursuit of defined business goals..."
Read More ...