Authenticate Like a Boss
The road to hell may be paved with good intentions but the road to IoT security hell is paved with unknown intentions. Intent is a tricky thing– poorly defined, misunderstood, and chaotically implemented as part of authentication controls. Yet, when we don’t know the technology or what it’s really doing it’s impossible to properly secure all these new “Things” on our part of the Internet. Without understanding intent, we can’t authenticate the good and block the bad for as long as we may need to. So we will look at the ongoing research into understanding “intent”, the insights, the breakthroughs, the applications, and let you walk away with a new tool for threat detection.