Access "Internet of Things security: Who is responsible and how is it done?"
This article is part of the Special Edition, August 2014 issue of A comprehensive guide to securing the Internet of Things
Advocates say the Internet of Things is a multitrillion dollar business opportunity, but it's also a potential disaster for privacy and safety. Before we connect everything around us to the Internet, we need to think about security. Internet of Things security is difficult to discuss because the concept is so immense. When you make "everything" IP-connected, how do you lock all of that down? Cars, cows, oil rigs, medical devices, refrigerators. There is no perimeter that can encircle all of that. "The challenge we have is that each of those areas is really pretty separate," said Bret Hartman, "The technologies working in those areas tend to focus specifically on their own area. It's not going to be one-size-fits-all for [Internet of Things] security." Companies and individuals will also find that they lose a lot of control over where their data is and where it is going. When consumerization struck the enterprise, power and control over data and connectivity shifted from IT to the user. IT is still adapting to that shock. Now another shift is coming. "Power ... Access >>>
Premium Content for Free.
Internet of Things (IOT): Seven enterprise risks to consider
by Ajay Kumar, Contributor
The Internet of Things is a growing enterprise threat. Learn about the seven key IoT risks to prepare for before implementing an IoT policy.
- Internet of Things (IOT): Seven enterprise risks to consider by Ajay Kumar, Contributor
Securing the Internet of Things
by Kevin Beaver, Network Security
The Internet of Things is coming; is your security program in place? If not, it's time to start the planning process.
- Securing the Internet of Things by Kevin Beaver, Network Security
Internet of Things security: Who is responsible and how is it done?
by Shamus McGillicuddy
Securing the Internet of Things is almost too big a problem to think about. Who's responsible and how will they do it?
- Internet of Things security: Who is responsible and how is it done? by Shamus McGillicuddy
More Premium Content Accessible For Free
Does Windows 8.1 meet the demands of the BYOD age?
The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...
Application security policy after Heartbleed
Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...
Devising a security strategy for the modern network
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...