Artwork

Content provided by The IOT Review and Industrial IOT Podcast by IrecaMedia. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by The IOT Review and Industrial IOT Podcast by IrecaMedia or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

A Tricky Loophole looming IOT Security - Can we plug it?

23:32
 
Share
 

Manage episode 309968869 series 3030732
Content provided by The IOT Review and Industrial IOT Podcast by IrecaMedia. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by The IOT Review and Industrial IOT Podcast by IrecaMedia or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
A looming threat to Enterprise IOT Security comes from unmanaged IOT "Things" - which are outside the purview of the Enterprise IT. Unless this threat is addressed... securing IOT will remain a unreachable horizon. In this episode we discuss with Bob Hinden, a long-time Internet Expert and Fellow at Checkpoint, to size-up the scope of this threat and explore solutions to plug this tricky security loophole.
  continue reading

5 episodes

Artwork
iconShare
 
Manage episode 309968869 series 3030732
Content provided by The IOT Review and Industrial IOT Podcast by IrecaMedia. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by The IOT Review and Industrial IOT Podcast by IrecaMedia or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
A looming threat to Enterprise IOT Security comes from unmanaged IOT "Things" - which are outside the purview of the Enterprise IT. Unless this threat is addressed... securing IOT will remain a unreachable horizon. In this episode we discuss with Bob Hinden, a long-time Internet Expert and Fellow at Checkpoint, to size-up the scope of this threat and explore solutions to plug this tricky security loophole.
  continue reading

5 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide