Endpoints Disguised as 'Stuff'

Security’s Greatest Enemy: Endpoints Disguised as ‘Stuff’

When considering the security of the devices that make up the internet of things (IoT), all endpoints must be considered in the risk equation. For years the standard model for non-traditional IT assets—such as printers, IoT, ICS, and anything connected to the network that is not directly managed by IT—is ... Read More
Security Boulevard