Download pdf
How can the makers of IoT products manage security risk in their legacy products? Despite progress in securing new products, companies face significant challenges with their legacy portfolio. How do you identify weaknesses, respond to customers, engage researchers or prepare for a vulnerability? We will explore these challenges and provide practical recommendations for how to manage these risks.