Author : Vish Pai
-
An end-to-end approach is needed for IoT device security
As IoT Devices Proliferate, the Vulnerabilities Scale Linearly
Most of the "things" connected to the Internet of Things (IoT) are produced companies not accustomed to thinking in terms of connectivity. These manufacturers are experts in water heaters or door locks or coffee makers, but they probably don't know what a really good connected water heater or door lock or coffee maker should be. And they certainly haven't had to worry about the kinds of security threats that come with IoT connectivity.
-
Understanding Ayla Persistent Communication
With the Amazon Kindle, it takes a mere 60 seconds to download a book, and if you purchase a book on Amazon.com, it’s instantly available on your kindle device. Have you ever wondered how this is accomplished?