Connect-and-Protect: Building a trust-based Internet of Things for business-critical applications

The end game with IoT is to make better informed decisions by mining the vast treasure troves of Internet-of-Things generated data. If IoT was comprised of trusted resources our task would be far simpler, but that isn’t how it has patched itself together. Its roots predate the Internet yet even the newest devices are subject to cyberattack. Without intervention, the data generated by the devices that make up IoT aren’t sufficiently trustworthy for business-critical decisions to rest upon.