Posted on
in Presentations
Current methods for provisioning IoT device credentials can leave networks vulnerable to unauthorized devices and devices vulnerable to being taken over by unauthorized networks. This session will discuss how trusted network-layer onboarding can improve the security of IoT devices and integrate with attestation, application-layer onboarding, and MUD to protect devices throughout their lifecycles.
Share With Your Community