Professional Speaker - Freelance Technology Writer
Devices must be more secure if IoT is to reach its full potential. The good news is that security policies and procedures can protect enterprise infrastructure, harden IoT configurations, and make the network smarter and more defensible. Here is where to start, in an article that I recently wrote for a new HPE IT site, where I provide what the bottom-line impact will be for enterprise IT folks and digest information from various sources, including the latest reports from the Broadband Internet Technical Advisory Group (BITAG) and the Cloud Security Alliance.
This article explains in detail how to limit IoT exposure like security cameras by starving the IP TTL so they can’t communicate beyond your enterprise.
Notify me of follow-up comments by email.
Notify me of new posts by email.