Step 3: Eliminate the Use of Passwords
According to the Open Web Application Security Project (OWASP), a worldwide not-for-profit charitable organization focused on improving the security of software, "attackers use weak passwords, insecure password recovery mechanisms, poorly protected credentials or lack of granular access control to access a particular interface."
As the connected world expands, each layer of technology needs to incorporate identity to secure the object and its access.
Securing IoT requires a technology that is compatible with all devices, especially considering that some existing "dumb" devices can be made "intelligent," creating a mix of old and new machines running on disparate systems and technologies that must communicate.
Security must be open, scalable, and proven trustworthy. The solution lies in this equation:
Card + Cert + PIN