Where should we point the gun of risk mitigation when it comes to IoT?
I recently spoke to a colleague who wondered how easy it would be to plug some cables in to a smart device for the oilfield and extract the data from it, without the client being aware. This is of course eminently possible, but it doesn’t really point the gun of risk mitigation where it should be.