The IoT complicates security by adding billions of potential attack vectors. The massive DDoS attack has occurred in large part because of default security configurations on IoT devices. This article explores how the IoT was used in the DDoS attack and describes the steps that organizations can do to mitigate the IoT risks.

Read More

Find how T&VS IoT Certification process ensures products conform to the latest international standards and QA & security testing best practices.