Controls

IoT: Moving to Security by Design

With device developers rushing to build IoT as fast as they can, security can suffer.
March 27, 2018
1 min. read

With the explosive growth of the Internet of Things, and the increasing threat posed by botnets that leverage IoT, more must be done to ensure IoT devices include security by design, says David Holmes, principal threat researcher at F5 Networks.

The Named Data Networking project can play a critical role, Holmes says in an interview with Information Security Media Group. “It’s a series of protocols which are very much unlike our existing internet protocols,” he says. “They are designed with Internet of Things in mind.”

Read the full article published January 30, 2018 here: https://www.bankinfosecurity.com/interviews/iot-moving-to-security-by-design-i-3860 by Information Security Media Group.

Join the Discussion
Authors & Contributors
David Holmes (Author)
Sr. Threat Research Evangelist

More from Learning Center

What Is Zero Trust Architecture (ZTA)?
What Is Zero Trust Architecture (ZTA)?
article 13 min. read
What Is Access Control?
What Is Access Control?
article 15 min. read
What is Multi-Cloud and How Does It Affect Security?
What is Multi-Cloud and How Does It Affect Security?
article 13 min. read