From IoT to IDoT: Securing the Identity of Things

Cover Image

With devices seeping into everyday work life, the danger to businesses has increased, and companies should worry about who is bringing what into the workplace and which corporate devices pose risks.

Determining which devices should access a network is a daunting task, however, because device identity management can be context dependent.

That’s why this issue of Information Security focuses on the Identity of Things security problem, and how you can solve it.

Also in this issue:

• Former White House cybersecurity policy director talks about threats, the vulnerability equities process and lawful use of exploit toolkits
• Tips from IT security pro Dave Shackleford on communicating ROI for cloud investments
• And more

Vendor:
TechTarget Security
Posted:
Feb 8, 2021
Published:
Oct 3, 2016
Format:
PDF
Type:
Ezine
Already a Bitpipe member? Log in here

Download this Ezine!