Since the Mirai attacks in late October, my customer conversations on the topic of securing the Internet of Things have now come to the forefront. Past experiences in addressing technology trends, like mobile and cloud, with limited resources continues to generate these fundamental questions:
- Do you have an IoT strategy?
- How do you manage access and control to new devices and networks?
Given the high interest, I thought the following 3-part series blog would start a good discussion on the shared interest of How to Secure the Internet of Things in the Enterprise.
Part 1: Securing the IoT Challenge
Sign up to receive IoT Best Practices guide.