How to assess IoT risks that fly under the radar

August 14, 2018 Mayuri Kumar

In the last few years, it has become common practice to “improve” almost everything by adding an embedded computer and connecting it to a network.

Just one decade ago, the average enterprise network primarily consisted of PCs, servers and network devices. The only endpoint devices that were treated differently were the printers and multi-function devices, which have been the cause of much pain over the years.

John Nye's full article was published here.

Previous Video
Assessing Medical Device and IoT Security  4 Questions You Should Ask Yourself
Assessing Medical Device and IoT Security 4 Questions You Should Ask Yourself

The number of devices connected to a single hospital network is overwhelming. For example, a typical hospit...

Next Article
Web Application Penetration Testing
Web Application Penetration Testing

I have been writing about penetration testing and its related skills for some time now but haven’t yet take...