Premium Content

Access "A comprehensive guide to securing the Internet of Things"

Issue Overview

Information Security magazine - Special Edition, August 2014

As the number of Internet-connected devices grows, the potential security challenges of the so-called "Internet of Things," or IoT, can no longer be ignored. The web of interconnected devices promises both enormous benefits to users and serious security threats, due to the sensitive data those devices will share.

In this Insider Edition, InfoSec pros will learn about the risks related to the IoT and what they can do to mitigate them. This means, first, understanding how traditional threats, like DDoS attacks, are altered by the IoT, what all-new challenges the IoT creates and what steps must be taken now to get a viable and effective IoT policy in place. Once that's accomplished, the next step is to determine whose job it is to monitor and enforce that policy.

The new interconnectivity of the IoT promises a golden age of the Internet, but securing enterprise systems cannot be neglected.  Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Strategies for a successful data protection program
    data_protection_2014.png
    E-Handbook

    Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...

  • Devices, data and how enterprise mobile management reconciles the two
    ISM_supp_1014.png
    E-Zine

    The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...

  • Putting security on auto-pilot: What works, what doesn't
    security_auto-pilot.png
    E-Handbook

    For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...