IoT Best Practices: A Threat Model for Technology Risk Management
This IDC study provides a process for developing a threat model for IoT architectures to properly identify the attack vectors that an intelligent adversary may use to compromise or disrupt IoT solutions. "Threat modeling is the unsung hero of a risk assessment process," said Pete Lindstrom, vice president of Security Strategies. "It is especially crucial to address the risk associated with the many components and proliferation of IoT solutions."
Learn how to effectively navigate the market research process to help guide your organization on the journey to success.Download eBook