Security Intelligence Podcast

Welcome to the Security Intelligence Podcast, where we discuss cyber security industry analysis, tips and success stories. Join co-hosts Pam Cobb and David Moulton, security thought leaders and industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security. For even more security content, visit https://securityintelligence.com. 095940

https://securityintelligence.com

subscribe
share






IoT Security Fact #4: Weak Configurations Will Persist


This episode of the "Five Indisputable Facts about IoT Security" podcast looks at Fact #4: Weak configurations will persist. Changing the default configurations of an IoT device takes thought and effort, and for this very reason it too often does not happen. Rather than leaving security in the hands of the end user, device manufacturers should ensure that security options are enabled either by default or as part of an initial setup process. To learn about all five indisputable facts of IoT security, listen to all the podcasts in this series at bit.ly/2on03cK and view the accompanying infographic at ibm.co/2nwL6oR.


fyyd: Podcast Search Engine
share








 April 11, 2017  13m