Securing the Retail IoT
As retail systems shift toward IP-connected Internet of Things (IoT) devices and the use of containers to process associated data, an entirely new security paradigm must now be considered. Given this, what exactly is it that we are trying to protect in the newly formed landscape of the retail IoT?
This white paper examines features of the new retail IoT landscape and suggests control objectives that may be valuable to InfoSec practitioners in constructing defenses against malicious threats. We recommend edge computing not only as a mechanism for building the retail IoT but also as a means of protecting it.