Works Cited
Burford, Chris, et al. Choose and Implement a Mobile Strategy. Info-Tech Research, 2015,
https://www.infotech.com/research/ss/choose-and-implement-a-mobile-strategy
i. Gartner, Market Trends: IoT Edge Device Security, 2020, Ruggero Contu, Barika Pace, Peter Middleton, Published 3 March 2020
DeLaine, Thomas, et al. Combine Security Risk Management Components Into One Program. Info-Tech Research, 2020,
https://www.infotech.com/research/ss/combine-security-risk-management-components-into-one-program
Mayfield, Paul, and Clay Taylor. “Zero Trust Deployment Guide for Devices.” Microsoft, 2020, https://www.microsoft.com/security/blog/2020/05/26/zero-trust-deployment-guide-for-devices
“Zero Trust Security for the Workforce.” Duo,
https://www.duo.com/solutions/zero-trust-security
ii. Gartner, Segmentation or Isolation: Implementing Best Practices for Connecting ‘All’ Devices, Tim Zimmerman, Published 26 September 2019