The Second Law of IoT: Not All “Things” that Can Be Connected Should Be Connected
By Eric Wenger In Part One of this Cybersecurity for IoT Blog Series, I noted that we should assume that everything will someday be connected—even those “things” designed without any networking capability. However, we should also be deliberate when deciding what to attach and what to isolate. When a link is established, we should know not only that […]
Source:: Cisco Security Notice