Mender blog
Security updates for the Internet of Things (part 2)
Part two of two - part one is available here.
The Internet of Things are:
Resource constrained Field-deployed These devices are beyond the “safety” of the corporate firewall Manually repairing a “bricked” device is prohibitively expensive May be responsible for human safety, such as medical devices or connected carsGiven these constraints, having a robust process for securi...
Read the articleSecurity updates for the Internet of Things (part 1)
Part one of two - part two is available here.
A decade ago, managing security patches was not a top priority for most IT security personnel. Vulnerable systems were rarely updated and when they were it was an after thought. In the early 2000’s, most security professionals relied on network security to defend vulnerable systems and most assumed they could build strong defenses around vulnerabl...
Read the article