by Ray Pelosi, EdTech
So, what can universities do — on their own and in league with solutions vendors — to protect against botnet assaults on their IoT devices? Design and Build with Security Top of Mind: For starters, security must be a design consideration instead of an afterthought. “Developers must start thinking about security and building it in,” says Bob Turner, CISO at the University of Wisconsin-Madison. “It should be a bake-it-in, don’t-bolt-it-on approach.” That includes developing security controls that focus on encryption, device authentication, key management, virtual local area network (VLAN) segregation and code signing — and doing so in a timely, cost-effective fashion.
Share on Facebook