Supplier eBooks

Cypress - 7 Experts on IoT Security and Privacy

Issue link: https://resources.mouser.com/i/1516458

Contents of this Issue

Navigation

Page 26 of 32

27 1. The risk that a compromised IoT device poses depends on the type of product and how it is used. That is one of the first security considerations when designing an IoT device. 2. An important part of developing secure products is ensuring that you have a secure supply chain for components, which involves evaluating the cybersecurity practices of suppliers and testing their components, particularly microcontrollers and sensors. THOMAS MOSEL Principal Product and Solution Security Officer (Principal PSSO) Smart Infrastructure, Siemens KEY POINTS

Articles in this issue

view archives of Supplier eBooks - Cypress - 7 Experts on IoT Security and Privacy