Securing identity on the Internet of Things

From IoT to IDoT: Securing the Identity of Things

Cover

With devices seeping into everyday work life, the danger to businesses has increased, and companies should worry about who is bringing what into the workplace and which corporate devices pose risks.

Determining which devices should access a network is a daunting task, however, because device identity management can be context dependent.

That’s why this issue of Information Security focuses on the Identity of Things security problem, and how you can solve it.

Also in this issue:

• Former White House cybersecurity policy director talks about threats, the vulnerability equities process and lawful use of exploit toolkits
• Tips from IT security pro Dave Shackleford on communicating ROI for cloud investments
• And more

Vendor:
SearchSecurity.com
Posted:
03 Oct 2016
Published:
03 Oct 2016
Format:
PDF
Length:
26 Page(s)
Type:
Ezine
Language:
English
Already a Bitpipe member? Login here

Download this Ezine!