IOT306-R: Designing secure IoT solutions from the edge to cloud - a podcast by AWS

from 2021-01-31T22:10:42.023393

:: ::

Connected devices constantly communicate with each other and the cloud using wireless communication protocols. This communication can expose security vulnerabilities and channels for malicious actors or data leaks. To protect users, devices, and companies, IoT devices must be secured and protected. In this session, we cover the technology and security best practices to continually evaluate your attack surface, analyze threat impact, and act on potential threats to your IoT devices, connections, and the data they generate. Learn how to use AWS IoT to keep data secure, restrict access to devices and cloud resources, securely connect to the cloud, and audit device usage.

Further episodes of AWS re:Invent 2019

Further podcasts by AWS

Website of AWS