The Truths and Lies of IoT Security: Monitoring Connected Devices
Enterprises across every industry are making the dash for the Internet of Things (IoT), but how do they get in the game without jeopardizing security? Yesterday’s security techniques and legacy networks don’t always transition well into the new world of IoT. This game of “truth or lie” exposes the certainties and the snare traps of IoT security.
- Explore the difference between monitoring endpoints vs. “things”
- Get a list of key security considerations for IoT
- Understand how network segmentation applies