Why the IoT Needs Information-Centric Security Models
Over the past decade, highly publicized cybersecurity breaches have revealed weaknesses in our prevailing IT security models. In 2013, Edward Snowden took 20,000 documents from the NSA without using any sophisticated devices or software. In the same year, hackers stole credit and debit card data from 40 million Target customers by exploiting a vulnerability in the retailer’s building management … Read more