Security News > 2017 > October > Threat Modeling the Internet of Things: Part 4 - Weak Authentication

Threat Modeling the Internet of Things: Part 4 - Weak Authentication
2017-10-04 12:20

For the first time, one of the largest cyber security conferences in the ASEAN region, the Singapore Internet CyberSecurity Week (SICW), had a track devoted just to the Internet of Things. One highlighted session at the track was an invitation-only panel of IoT security specialists. There was so much interest, the session lasted for hours, and everyone left exhausted. read more


News URL

http://feedproxy.google.com/~r/Securityweek/~3/U4I4YRYzYco/threat-modeling-internet-things-part-4-weak-authentication