Babel of IoT Authentication Poses Security Challenges

With more than 80 different schemes for authenticating devices either proposed or implemented, best practices and reference architectures are sorely needed, experts say.

from Dark Reading: https://ift.tt/3bxtCyK
via IFTTT