Tag archive

IoT security

// by Kylie Bielby

Comments Sought on Proposal to Mitigate IoT Attacks

The paper describes for IoT product developers and implementers an approach that uses Manufacturer Usage Description (MUD) to automatically limit IoT devices to sending and receiving only the traffic that they require to perform their intended functions. Keep Reading

Like HSToday?  Want to Keep the News, Commentary, and Practitioner Insights Coming? The COVID emergency has hit us hard and as a non-profit 501(c)(6) we are ineligible for any relief.

Please support us with a donation of $5 so we don't need to lay anyone off!

Thank you in advance for your consideration!

DONATE NOW
Go to Top
X