From IoT to IDoT: Securing the Identity of Things
With devices seeping into everyday work life, the danger to businesses has increased, and companies should worry about who is bringing what into the workplace and which corporate devices pose risks.
Determining which devices should access a network is a daunting task, however, because device identity management can be context dependent.
That’s why this issue of Information Security focuses on the Identity of Things security problem, and how you can solve it.
Also in this issue:
• Former White House cybersecurity policy director talks about threats, the vulnerability equities process and lawful use of exploit toolkits
• Tips from IT security pro Dave Shackleford on communicating ROI for cloud investments
• And more