In Part 1 of this blog series Understanding IoT Security, we looked at IoT cyber security architecture from a device and communication layer perspective. In this post, we shift our focus to the cloud and lifecycle management, which present entirely different challenges and risks.
Read full news article on Dzone