White Paper - Internet of Things : Risk & Mitigation
Highlights:

Today's cyber security landscape is an ever-changing environment where the greatest vector of attack is our normal activities, E-mail, Surfing, etc. The adversary can and will continue to use Mobile apps, E-mail (phishing scam), the web (redirects) and other tools of our day-to-day activities to get intellectual property, personal information, and other sensitive data.Hactivists, criminals, and terrorists use this information to gain un-authorized access to systems and sensitive data. Hactivists commonly use this information that is gathered during attacks to support and convey messages that support their agenda.