Threat Modeling the Internet of Things Part 2: Three Steps to Pizza

Part 1 of this series posited that the Internet of Things (IoT) needs a more rigorous security application than it currently has, lest we end up building another patchy, vulnerability-ridden system like the Internet we have now.

read more

Read more: Threat Modeling the Internet of Things Part 2: Three Steps to Pizza

Story added 7. June 2017, content source with full text you can find at link above.