Too Long; Didn't Read
In part 1 of this blog series, we covered some of the characteristics that make security different at the edge compared to the cloud. The next generation of computing is now upon us, representing both a return to the familiar distributed model and a breakthrough in rethinking how we handle data. In this blog, we’ll be going over ten baseline recommendations for securing IoT edge deployments. For example, the Mirai botnet attack that leveraged a DDoS attack that took down a portion of the internet in 2016 involved millions of cameras that shared a small number of common credentials.