Monthly Archives: February 2016

IoT (Internet of Things) Security – Router Configuration

Steve Gibson recently described a┬árouter configuration (he calls “3 Dumb Routers”) that will separate your personal network from your IoT device network. ┬áThe setup involves 3 routers setup in a Y configuration. For details watch or listen to Steve’s Security … Continue reading

Posted in CyberSecurity | 1 Comment