Looking beyond devices for complete IoT security
In the Internet of Things, attackers try to find the weakest links wherever possible. We, the security testers, should also look at the whole system. Unfortunately, assessments often stop at the device itself, excluding backend cloud services and applications.