Security & the Internet of Things: IoT, OT, IIoT
1.4K views | +0 today
Follow
 
Scooped by Judy Curtis / SIPR
onto Security & the Internet of Things: IoT, OT, IIoT
March 6, 2018 8:51 AM
Scoop.it!

Securing the Web of Wearables, Smartphones & Cloud

Securing the Web of Wearables, Smartphones & Cloud | Security & the Internet of Things: IoT, OT, IIoT | Scoop.it
Why security for the Internet of Things demands that businesses revamp their software development lifecycle.
Judy Curtis / SIPR's insight:

Developing for the IoT: What to Keep in Mind
Two best practices for IoT businesses to prioritize as they create and connect new products. The first task is getting the security and product teams on the same page.

Second:  IoT developers should look at existing vulnerabilities from an IoT point of view. Often, old flaws can have a "butterfly effect" in the IoT and lead to wearable devices getting bricked. Furthermore, vulnerabilities in some parts of the IoT — for example, a smartphone — can affect other connected devices.

No comment yet.
Security & the Internet of Things: IoT, OT, IIoT

Curated by Judy Curtis / SIPR