

If IoT devices are improperly managed due to lack of code signing, secure communications and mutual authentication they could be vulnerable to exploit. A good example is if an unauthorized person can physically access a device, they can install malicious firmware onto a vulnerable device. If that device does not have proper code signing or secure bootloading implemented, it could be impacted. This kind of scenario could result in a national security issue that, at minimum, would hinder
.....Read More
This year, the proliferation of IoT and inherent security risks have become a larger focus for CIOs in enterprise. Security has always been a concern, but with a growing reliance on IoT for broader business operations - especially in our remotely connected world - keeping IoT secure is priority.
Expect to see the conversation focus on device production and what IoT device makers are doing to build security into devices at design and ensure security through the device lifecycle. First and
.....Read More
