Securing Static Vulnerable Devices

Many computing devices today are deployed with a static configuration that cannot be modified. Some are due to governance restrictions (e.g., FDA-approved medical devices) while others are legacy systems or embedded devices. This excludes these devices from operating system, anti-virus, and...
Chris Farrell
September 17, 2013

All papers are copyrighted. No re-posting of papers is permitted